What is quantum cryptography?
quantum cryptography is a form of cryptography that relies on the principles of quantum mechanics to ensure data and detection of eavesdropping. Like all forms of cryptography, quantum cryptography is potentially broken, but is theoretically very reliable, which could cause it to be suitable for very sensitive data. Unfortunately, it also requires the possession of some very specialized equipment that could prevent the spread of quantum cryptography.
Cryptography includes the exchange of coded messages. The sender and recipients have the ability to decode messages to determine the content. The key and message are generally sent separately because one is useless without the other. In the case of quantum cryptography or quantum distribution of keys (QKD), as is sometimes known, the quantum mechanics is involved in generating the key to make it private and safe.
quantum mechanics is an extremely complex field, but an important thing to know about Tomvztah to cryptography is that observation of something causes a fundamental changeIn it, which is the key to the way in which quantum cryptography works. The system includes the transmission of photon, which is sent by polarized filters, and reception of polarized photons on the other side, using the corresponding set of filters to decodate the message. Photons create an excellent tool for cryptography because they can be assigned a value of 1 or 0 depending on their alignment and creating binary data.
The sender and would start replacement of data by sending a series of randomly polarized photons that could be polarized directly and cause either vertical or horizontal orientation, or diagonally, in this case the photon would lean one or the other. These photons would arrive at the recipient B to use a randomly assigned line of straightforward or diagonal filters to receive a message. If B used the same filter as for a particular photon, the alignment would match, but if it did not do so,The alignment would differ. Furthermore, two would exchange information about the filters they used and eliminated photons that did not match and maintained those that made the keys to generate.
When two exchange information generates shared key, they can publish filters they use but do not publish the alignment of the protons involved. This means that this public information cannot be used to decodate a message, because eavesdropping would lack a critical part of the key. More critical, the exchange of information would also reveal the presence of eavesdropping, C. If C wants to eavesdrop on to obtain the key, it will have to capture and observe protons, changing and alerting A and B to the presence of eavesdropping. Both can simply repeat the process and generate a new key.
As soon as the key is generated, there may be an encryption algorithm to generate a message that can be safely sent through the public channel because it is encrypted.