Explore tens of thousands of sets crafted by our community.
Quantum Cryptography Basics
30
Flashcards
0/30
Quantum Non-Demolition Measurement
A type of measurement in quantum mechanics which allows the measurement of a quantum system without destroying its original state.
Decoy State Protocol
A strategy used in quantum key distribution to detect eavesdropping by introducing additional states or pulses to disguise the actual quantum bits being transmitted.
Grover's Algorithm
A quantum algorithm that provides a quadratic speedup for searching an unsorted database compared to classical algorithms.
Shor's Algorithm
A quantum algorithm for integer factorization which would enable a quantum computer to break systems that are currently based on the difficulty of factoring large numbers, like RSA encryption.
Heisenberg's Uncertainty Principle
A very important concept in quantum mechanics, it states that certain pairs of physical properties of a particle, such as position and momentum, cannot be simultaneously measured and known exactly.
No-Cloning Theorem
A theorem in quantum mechanics that states it is impossible to create an identical copy of an arbitrary unknown quantum state.
Quantum Entanglement
A physical phenomenon that occurs when pairs or groups of particles are generated or interact in a way that the quantum state of each particle cannot be described independently of the others.
Dense Coding
A protocol that allows the transmission of two classical bits of information by sending only one qubit, using the property of quantum entanglement.
Quantum Teleportation
A technique for transferring quantum information from one location to another, with the help of classical communication and previously shared entanglement between the sending and the receiving location.
Forward Secrecy
A feature of some cryptographic protocols where a unique key is used for each session, ensuring that even if one key is compromised, previous communications remain secure.
Quantum Channel
The medium used to transmit quantum bits between parties in a quantum communication system, typically optical fibers or free space.
Bell Test Experiments
Experiments designed to demonstrate the real effects of quantum entanglement and to rule out local hidden variable theories by violating Bell's inequality.
Quantum Cryptanalysis
The study of how quantum algorithms can be used to break cryptographic codes and security systems, which is especially relevant with the rise of quantum computing.
Uncertainty Principle
In quantum mechanics, the principle that certain pairs of physical properties, like position and momentum, cannot both be known to arbitrary precision.
Eavesdropping Detection
The quantum cryptography process of checking for third-party presence during the key exchange process because any measurement will disturb the quantum system.
Photonic Qubits
Quantum bits that use the quantum states of photons to represent the 0s and 1s of binary data, commonly used in quantum key distribution.
Post-Quantum Cryptography
Cryptographic algorithms that are thought to be secure against an attack by a quantum computer, based on problems that have no known efficient solution by a quantum algorithm.
Quantum Key Distribution (QKD)
A secure communication method which uses quantum mechanics to generate and distribute a cryptographic key.
Privacy Amplification
A method that allows two parties to distill a secret key from a common shared but partially secret random variable, removing partial information that might be known to an eavesdropper.
Quantum Key Growing
The technique of expanding a short, initial quantum-secure key into a longer key that can be used for encryption or other cryptographic purposes.
BB84 Protocol
First and one of the most famous QKD protocols proposed by Charles Bennett and Gilles Brassard in 1984, which uses polarized photons to transmit information.
Quantum Repeater
A device used in quantum communications to extend the distance over which quantum cryptography can be used, without degradation of the quantum signal.
Quantum Direct Communication
The transfer of information in quantum states directly from sender to receiver, without the need for a shared secret beforehand and with the security provided by the laws of quantum mechanics.
Quantum Secure Direct Communication (QSDC)
A form of secure communication where quantum mechanics ensures that information is transmitted directly between parties, without being decrypted along the channel.
Quantum Bit (qubit)
The basic unit of quantum information, representing a two-state (or two-level) quantum-mechanical system, such as the polarization direction of a photon.
Quantum Error Correction
The process of protecting quantum information from errors due to decoherence and other quantum noise, essential for the operation of quantum computers and communication systems.
Quantum Random Number Generation
The generation of truly random numbers based on the inherent unpredictability in the measurement of quantum systems, providing a high level of security for cryptographic protocols.
Superposition
A fundamental principle of quantum mechanics that allows particles like atoms and electrons to be in multiple states or places at the same time
Bennett-Brassard-Mermin 1992 (BBM92)
A quantum key distribution protocol which is a modification of the BB84 protocol, using entangled photon pairs instead of single photons.
Quantum Networks
Networks that use quantum signals or entanglement to connect devices and transmit information, forming the basis for a future quantum internet.
© Hypatia.Tech. 2024 All rights reserved.