Quantum Cryptography
La cryptographie post-quantique développe des algorithmes qui résistent aux attaques quantiques, assurant la sécurité à long terme des données sensibles.
La cryptographie post-quantique étudie les algorithmes et protocoles sécurisés contre les adversaires quantiques capables d'exécuter l'algorithme de Shor. Elle couvre les cryptosystèmes à clé publique, les signatures numériques et les protocoles cryptographiques. L'objectif est d'assurer la confidentialité, l'intégrité et l'authenticité même lorsque des ordinateurs quantiques tolérants aux pannes à grande échelle deviendront réalisables.
graph LR
Center["Quantum Cryptography"]:::main
Pre_cryptography["cryptography"]:::pre --> Center
click Pre_cryptography "/terms/cryptography"
Rel_cryptography["cryptography"]:::related -.-> Center
click Rel_cryptography "/terms/cryptography"
Rel_encryption["encryption"]:::related -.-> Center
click Rel_encryption "/terms/encryption"
Rel_antimatter_propulsion["antimatter-propulsion"]:::related -.-> Center
click Rel_antimatter_propulsion "/terms/antimatter-propulsion"
classDef main fill:#7c3aed,stroke:#8b5cf6,stroke-width:2px,color:white,font-weight:bold,rx:5,ry:5;
classDef pre fill:#0f172a,stroke:#3b82f6,color:#94a3b8,rx:5,ry:5;
classDef child fill:#0f172a,stroke:#10b981,color:#94a3b8,rx:5,ry:5;
classDef related fill:#0f172a,stroke:#8b5cf6,stroke-dasharray: 5 5,color:#94a3b8,rx:5,ry:5;
linkStyle default stroke:#4b5563,stroke-width:2px;
🧒 Explique-moi comme si j'avais 5 ans
It's like sending a secret message using special invisible ink that changes if anyone tries to peek at it, so you know if someone read it.
🤓 Expert Deep Dive
Quantum cryptography primarily encompasses Quantum Key Distribution (QKD) and, more theoretically, quantum digital signatures and quantum secure direct communication. QKD protocols, like BB84, utilize properties of photons to establish a shared secret key between two parties (Alice and Bob). In BB84, Alice encodes bits onto photon polarization states (e.g., rectilinear basis $\{|0\rangle, |1\rangle\}$ and diagonal basis $\{|+\rangle, |- angle\}$), where $|+\rangle = \frac{1}{\sqrt{2}}(|0\rangle + |1\rangle)$ and $|-\rangle = \frac{1}{\sqrt{2}}(|0\rangle - |1\rangle)$. Bob randomly chooses a basis to measure each incoming photon. After transmission, Alice and Bob publicly compare their basis choices. They discard measurements where bases didn't match and keep the rest, forming a raw key. Any eavesdropper (Eve) attempting to intercept and measure the photons will inevitably disturb their quantum state due to the no-cloning theorem and the probabilistic nature of quantum measurement. This disturbance introduces errors into the raw key, which Alice and Bob can detect through error rate analysis and privacy amplification techniques. Post-processing steps like error correction (e.g., Cascade protocol) and information reconciliation are crucial to distill a secure, shared secret key from the noisy quantum channel. Advanced protocols like E91 utilize entanglement to enhance security. The security of QKD is rooted in the fundamental laws of physics, not computational complexity, making it resistant to future advances in computing, including quantum computers.