Quantum key distribution
Adapted from Wikipedia · Adventurer experience
Quantum key distribution (QKD) is a special way to send secret messages. It uses the rules of tiny particles called quantum mechanics.
It helps two people make a secret code that only they know. This code helps hide their messages from others. The code is very safe because, in quantum mechanics, looking at it changes it. If someone tries to peek at the code, the people sending the message will know. They can then stop the communication to keep things safe.
Unlike normal ways of hiding messages, QKD’s safety comes from the rules of how tiny particles work. This makes it very strong and safe. But QKD needs a regular, safe way to talk to each other before it can start. This is something already used in normal message hiding.
QKD doesn’t send the actual message. It only helps make the secret code needed to hide the message. This code can be used with many different hiding methods. This makes sure only the people who know the code can read the message when it travels through normal communication channels.
Quantum key exchange
Quantum communication uses special particles called qubits instead of regular bits used in normal communication. Often, these qubits are made using particles called photons. Quantum key distribution uses special properties of these qubits to keep information safe.
There are two main ways to do this. In one way, two people, named Alice and Bob, send special signals through a channel. Alice sends these signals, and Bob receives them. Later, they check if the signals match. If they do, it means no one tried to peek. If they don’t, they know someone might be trying to listen in.
In another way, Alice and Bob share pairs of connected particles. These particles are linked, so if someone tries to look at one, it changes both. This helps Alice and Bob know if their secret is safe. Both methods help create a secret code that only they know, keeping their messages private.
| Basis | 0 | 1 |
|---|---|---|
| Alice's random bit | 0 | 1 | 1 | 0 | 1 | 0 | 0 | 1 |
|---|---|---|---|---|---|---|---|---|
| Alice's random sending basis | ||||||||
| Photon polarization Alice sends | ||||||||
| Bob's random measuring basis | ||||||||
| Photon polarization Bob measures | ||||||||
| PUBLIC DISCUSSION OF BASIS | ||||||||
| Shared secret key | 0 | 1 | 0 | 1 | ||||
Information reconciliation and privacy amplification
Quantum key distribution helps two people, Alice and Bob, create a secret code that only they know. Sometimes, small mistakes happen, and their codes don’t match perfectly. These mistakes might be from problems with the equipment used to send the code.
To fix this, Alice and Bob use two special steps. The first step, called information reconciliation, helps them correct mistakes so their codes match. They compare parts of their codes over a public channel, finding and fixing differences.
The second step, called privacy amplification, makes sure that even if someone tried to learn part of the code, they now know almost nothing about the final secret. They use a special method to create a shorter, new code that keeps the secret safe.
Implementations
Experimental
In 1991, scientists showed a way to share secret codes using light. In 2008, they made this very fast over long distances using special light pulses.
Since then, they have kept testing this idea in many places. They have sent secret codes over long distances, even between islands and from satellites in space. In 2024, they sent secret codes through the air between South Africa and China, a distance of over 12,000 kilometers, using a tiny satellite.
Commercial
Many companies now sell this way to share secret codes. In 2004, the first bank used it to send money. Since then, more places have started using it to keep information safe.
Quantum key distribution networks
DARPA
A network in the United States ran for four years to keep information safe.
SECOQC
In 2008, a network in Vienna, Austria, used special light to keep information safe.
SwissQuantum
A network in Geneva, Switzerland, tested this method for almost two years.
Chinese networks
In China, they made a big network that connects many places. In 2016, they used a satellite to send secure messages between China and Austria.
Tokyo QKD Network
A network in Tokyo, Japan, brought together companies and researchers to test this safe way to share information.
Los Alamos National Laboratory
A network in the United States uses a central hub to keep messages safe. Only the hub needs special equipment.
Singapore's National Quantum-Safe Network Plus (NQSN+)
In 2023, Singapore started a new network to help businesses keep their information safe.
Eagle-1
In late 2026 or early 2027, a satellite called Eagle-1 will be launched to test this method from space.
Attacks and security proofs
Sometimes someone might try to interfere by measuring the special signals sent between two friends, Alice and Bob, and then sending new signals to trick them. This can cause mistakes in their secret code. But Alice and Bob can find these mistakes by checking some of their code together.
Another way someone might try to interfere is by pretending to be Alice or Bob. To stop this, Alice and Bob need a secret way to check each other's identity before they start sharing their code.
There are also tricks where an attacker might use extra signals to learn more about the secret code. But Alice and Bob can still make a safe secret code if they use special methods to check for interference.
Because the special signals need a direct path to travel safely, someone could try to block that path. This is why having many paths can help keep communication going even if one path is blocked.
Researchers have studied many ways attackers might try to learn the secret code, and they have shown that with the right safeguards, Alice and Bob can keep their code safe.
| Alice's random bit | 0 | 1 | 1 | 0 | 1 | 0 | 0 | 1 |
|---|---|---|---|---|---|---|---|---|
| Alice's random sending basis | ||||||||
| Photon polarization Alice sends | ||||||||
| Eve's random measuring basis | ||||||||
| Polarization Eve measures and sends | ||||||||
| Bob's random measuring basis | ||||||||
| Photon polarization Bob measures | ||||||||
| PUBLIC DISCUSSION OF BASIS | ||||||||
| Shared secret key | 0 | 0 | 0 | 1 | ||||
| Errors in key | ✓ | ✘ | ✓ | ✓ | ||||
Quantum hacking
People sometimes try to find ways to trick quantum key distribution systems. They look for weak spots in how the system works or in the tools used to build it.
One common trick is called a Trojan horse attack. This trick does not need someone to touch the tools directly. Instead, a person sends extra light toward one of the users. This light can show information about how the user’s tools are set up. But there are ways to notice this trick, like checking for extra light coming into the system.
Researchers have found many other tricks, like faked-state attacks and time-shift attacks. Some of these tricks have even been tried on real quantum key distribution systems. These discoveries help scientists find better ways to keep quantum communications safe.
Main article: Random number generator attack
Main article: Trojan horse
Main article: Norwegian University of Science and Technology
Main article: Max Planck Institute for the Science of Light
Main article: Avalanche photodiodes
Counterfactual quantum key distribution
See also: Counterfactual quantum computation
Scientists have found a way to share secret messages safely, even when the particles carrying the message never actually travel between the two people. This method was created by Tae-Gon Noh. In this method, one person, named Alice, creates a tiny particle of light, called a photon, that exists in two places at once. One path stays with Alice, and the other goes to another person, named Bob. By looking at which particles Bob does not receive, Alice and Bob can create a secret code that others cannot discover. This works because, in the world of tiny particles, just the possibility that something might happen can still have an effect, even if it does not actually happen.
Main article: Interaction-free measurement
Main articles: Bomb testing problem, Counterfactual
History
Quantum cryptography was first suggested by Stephen Wiesner in the early 1970s. He wrote a paper called "Conjugate Coding," which was published in 1983. In this paper, he explained how to send hidden messages using light properties.
Later, Charles H. Bennett and Gilles Brassard built on Wiesner's ideas to create a way for two people to share a secret code safely. Then in 1990, Artur Ekert came up with another method using a special connection between particles.
Stephen Wiesner, Charles H. Bennett, Thomas J. Watson Research Center, Gilles Brassard, University of Montreal, Wolfson College, University of Oxford
Challenges
Quantum key distribution (QKD) has made progress, but there are still problems to solve before it can be used widely. One big problem is that creating, sending, and measuring quantum states is not perfect. Because of this, it can be hard to know if someone is trying to spy or if the mistakes are just normal errors.
These problems affect how fast a secret key can be made, how far it can be sent, how much it costs, and how safe it really is. Even though new ways to do QKD have been suggested, using it for everyone is still hard because of signal loss and other technical issues. Because of these challenges, some governments do not recommend using QKD for important things like military or business communications. To make QKD useful for everyday secure messages, scientists need to find better ways to solve these problems.
Future
Quantum key distribution is mostly used by governments and big companies that need very strong security. These systems can tell if someone tries to spy on the secret keys they create.
But quantum key distribution has some problems. It is expensive, needs special equipment, and isn't easy to use for everyone. Some important groups, like the USA National Security Agency and the European Union Agency for Cybersecurity, suggest using other methods called "post-quantum cryptography" instead. These methods are cheaper and can work better with existing technology. While quantum key distribution is interesting, it may not be the best choice for everyone right now.
Related physical layer technologies
Quantum Key Distribution (QKD) helps create secure keys, but other technologies focus on protecting the actual data being sent. Some new methods, like optical chaos or optical steganography, hide the data by mixing it with noise.
These methods make the data look like normal static, so attackers cannot record or save it. Tests have shown this can work quickly over long distances in regular networks, keeping data safe without needing special setup.
Related articles
This article is a child-friendly adaptation of the Wikipedia article on Quantum key distribution, available under CC BY-SA 4.0.
Safekipedia