Quantum Cryptography
Kryptografia postkwantowa rozwija algorytmy odporne na ataki kwantowe, zapewniając długoterminowe bezpieczeństwo wrażliwych danych.
Kryptografia postkwantowa bada algorytmy i protokoły, które są bezpieczne przed przeciwnikami kwantowymi zdolnymi do uruchamiania algorytmów typu Shora. Obejmuje kryptosystemy z kluczem publicznym, podpisy cyfrowe i protokoły kryptograficzne. Celem jest zapewnienie poufności, integralności i autentyczności, nawet gdy wielkoskalowe, odporne na błędy komputery kwantowe staną się wykonalne.
graph LR
Center["Quantum Cryptography"]:::main
Pre_cryptography["cryptography"]:::pre --> Center
click Pre_cryptography "/terms/cryptography"
Rel_cryptography["cryptography"]:::related -.-> Center
click Rel_cryptography "/terms/cryptography"
Rel_encryption["encryption"]:::related -.-> Center
click Rel_encryption "/terms/encryption"
Rel_antimatter_propulsion["antimatter-propulsion"]:::related -.-> Center
click Rel_antimatter_propulsion "/terms/antimatter-propulsion"
classDef main fill:#7c3aed,stroke:#8b5cf6,stroke-width:2px,color:white,font-weight:bold,rx:5,ry:5;
classDef pre fill:#0f172a,stroke:#3b82f6,color:#94a3b8,rx:5,ry:5;
classDef child fill:#0f172a,stroke:#10b981,color:#94a3b8,rx:5,ry:5;
classDef related fill:#0f172a,stroke:#8b5cf6,stroke-dasharray: 5 5,color:#94a3b8,rx:5,ry:5;
linkStyle default stroke:#4b5563,stroke-width:2px;
🧒 Wyjaśnij jak 5-latkowi
It's like sending a secret message using special invisible ink that changes if anyone tries to peek at it, so you know if someone read it.
🤓 Expert Deep Dive
Quantum cryptography primarily encompasses Quantum Key Distribution (QKD) and, more theoretically, quantum digital signatures and quantum secure direct communication. QKD protocols, like BB84, utilize properties of photons to establish a shared secret key between two parties (Alice and Bob). In BB84, Alice encodes bits onto photon polarization states (e.g., rectilinear basis $\{|0\rangle, |1\rangle\}$ and diagonal basis $\{|+\rangle, |- angle\}$), where $|+\rangle = \frac{1}{\sqrt{2}}(|0\rangle + |1\rangle)$ and $|-\rangle = \frac{1}{\sqrt{2}}(|0\rangle - |1\rangle)$. Bob randomly chooses a basis to measure each incoming photon. After transmission, Alice and Bob publicly compare their basis choices. They discard measurements where bases didn't match and keep the rest, forming a raw key. Any eavesdropper (Eve) attempting to intercept and measure the photons will inevitably disturb their quantum state due to the no-cloning theorem and the probabilistic nature of quantum measurement. This disturbance introduces errors into the raw key, which Alice and Bob can detect through error rate analysis and privacy amplification techniques. Post-processing steps like error correction (e.g., Cascade protocol) and information reconciliation are crucial to distill a secure, shared secret key from the noisy quantum channel. Advanced protocols like E91 utilize entanglement to enhance security. The security of QKD is rooted in the fundamental laws of physics, not computational complexity, making it resistant to future advances in computing, including quantum computers.