Quantum Cryptography
양자 내성 암호는 양자 공격에 저항하는 알고리즘을 개발하여 고전적 위협과 양자 위협 모두에 대해 민감한 데이터의 장기적인 보안을 보장합니다.
양자 내성 암호는 쇼어 알고리즘(Shor's algorithm) 등을 실행할 수 있는 양자 적에 대해 안전한 알고리즘과 프로토콜을 연구합니다. 공개 키 암호 시스템, 디지털 서명 및 암호화 프로토콜을 다룹니다. 목표는 대규모 내결함성 양자 컴퓨터가 실현 가능해지더라도 기밀성, 무결성 및 인증을 보장하는 것입니다. 일반적인 계열로는 격자 기반, 코드 기반, 다변수 및 해시 기반 암호가 있습니다.
graph LR
Center["Quantum Cryptography"]:::main
Pre_cryptography["cryptography"]:::pre --> Center
click Pre_cryptography "/terms/cryptography"
Rel_cryptography["cryptography"]:::related -.-> Center
click Rel_cryptography "/terms/cryptography"
Rel_encryption["encryption"]:::related -.-> Center
click Rel_encryption "/terms/encryption"
Rel_antimatter_propulsion["antimatter-propulsion"]:::related -.-> Center
click Rel_antimatter_propulsion "/terms/antimatter-propulsion"
classDef main fill:#7c3aed,stroke:#8b5cf6,stroke-width:2px,color:white,font-weight:bold,rx:5,ry:5;
classDef pre fill:#0f172a,stroke:#3b82f6,color:#94a3b8,rx:5,ry:5;
classDef child fill:#0f172a,stroke:#10b981,color:#94a3b8,rx:5,ry:5;
classDef related fill:#0f172a,stroke:#8b5cf6,stroke-dasharray: 5 5,color:#94a3b8,rx:5,ry:5;
linkStyle default stroke:#4b5563,stroke-width:2px;
🧒 5살도 이해할 수 있게 설명
It's like sending a secret message using special invisible ink that changes if anyone tries to peek at it, so you know if someone read it.
🤓 Expert Deep Dive
Quantum cryptography primarily encompasses Quantum Key Distribution (QKD) and, more theoretically, quantum digital signatures and quantum secure direct communication. QKD protocols, like BB84, utilize properties of photons to establish a shared secret key between two parties (Alice and Bob). In BB84, Alice encodes bits onto photon polarization states (e.g., rectilinear basis $\{|0\rangle, |1\rangle\}$ and diagonal basis $\{|+\rangle, |- angle\}$), where $|+\rangle = \frac{1}{\sqrt{2}}(|0\rangle + |1\rangle)$ and $|-\rangle = \frac{1}{\sqrt{2}}(|0\rangle - |1\rangle)$. Bob randomly chooses a basis to measure each incoming photon. After transmission, Alice and Bob publicly compare their basis choices. They discard measurements where bases didn't match and keep the rest, forming a raw key. Any eavesdropper (Eve) attempting to intercept and measure the photons will inevitably disturb their quantum state due to the no-cloning theorem and the probabilistic nature of quantum measurement. This disturbance introduces errors into the raw key, which Alice and Bob can detect through error rate analysis and privacy amplification techniques. Post-processing steps like error correction (e.g., Cascade protocol) and information reconciliation are crucial to distill a secure, shared secret key from the noisy quantum channel. Advanced protocols like E91 utilize entanglement to enhance security. The security of QKD is rooted in the fundamental laws of physics, not computational complexity, making it resistant to future advances in computing, including quantum computers.