Quantum key distribution: Difference between revisions

From ACT Wiki
Jump to navigationJump to search
(Expand quote - source - NCSC - https://www.ncsc.gov.uk/whitepaper/quantum-security-technologies)
(Expand definition.)
Line 1: Line 1:
''Information technology - cybersecurity.''
''Information technology - cybersecurity - UK National Cyber Security Centre (NCSC).''


(QKD).
(QKD).
The UK's National Cyber Security Centre (NCSC) defines Quantum key distribution as follows:


"Quantum Key Distribution is a mechanism for agreeing encryption keys between remote parties, relying on the properties of quantum mechanics to ensure that key has not been observed or tampered with in transit.
"Quantum Key Distribution is a mechanism for agreeing encryption keys between remote parties, relying on the properties of quantum mechanics to ensure that key has not been observed or tampered with in transit.


Since traditional public key cryptography algorithms may be vulnerable to a future large-scale quantum computer, new approaches are required that do not share this vulnerability. QKD claims to offer a potential mitigation since its security properties are based on the laws of physics rather than the hardness of some underlying mathematical problems.
Since traditional public key cryptography algorithms may be vulnerable to a future large-scale quantum computer, new approaches are required that do not share this vulnerability.
 
QKD claims to offer a potential mitigation since its security properties are based on the laws of physics rather than the hardness of some underlying mathematical problems.
 
 
QKD protocols provide a mechanism for two remote parties to agree a shared secret key, where the key cannot be observed or tampered with by an adversary without alerting the original parties.
 
However, because QKD protocols do not provide authentication, they are vulnerable to physical man-in-the-middle attacks in which an adversary can agree individual shared secret keys with two parties who believe they are communicating with each other.
 


QKD protocols provide a mechanism for two remote parties to agree a shared secret key, where the key cannot be observed or tampered with by an adversary without alerting the original parties. However, because QKD protocols do not provide authentication, they are vulnerable to physical man-in-the-middle attacks in which an adversary can agree individual shared secret keys with two parties who believe they are communicating with each other.
For this reason, QKD protocols must be deployed alongside cryptographic mechanisms that ensure authentication.  


For this reason, QKD protocols must be deployed alongside cryptographic mechanisms that ensure authentication. These cryptographic mechanisms must also be secure against the quantum threat."
These cryptographic mechanisms must also be secure against the quantum threat."


''(Source - Quantum security technologies - UK National Cyber Security Centre.)''
''(Source - Quantum security technologies - UK National Cyber Security Centre.)''
Line 15: Line 26:


== See also ==
== See also ==
* [[Authentication]]
* [[Cryptography]]
* [[Cryptography]]
* [[Cybersecurity]]
* [[Cybersecurity]]
Line 40: Line 52:
==Other resource==
==Other resource==
*[https://www.ncsc.gov.uk/whitepaper/quantum-security-technologies Quantum security technologies - UK National Cyber Security Centre]
*[https://www.ncsc.gov.uk/whitepaper/quantum-security-technologies Quantum security technologies - UK National Cyber Security Centre]
[[Category:Accounting,_tax_and_regulation]]
[[Category:Identify_and_assess_risks]]
[[Category:The_business_context]]


[[Category:Accounting,_tax_and_regulation]]
[[Category:Accounting,_tax_and_regulation]]
[[Category:Identify_and_assess_risks]]
[[Category:Identify_and_assess_risks]]
[[Category:The_business_context]]
[[Category:The_business_context]]

Revision as of 01:08, 3 February 2024

Information technology - cybersecurity - UK National Cyber Security Centre (NCSC).

(QKD).

The UK's National Cyber Security Centre (NCSC) defines Quantum key distribution as follows:


"Quantum Key Distribution is a mechanism for agreeing encryption keys between remote parties, relying on the properties of quantum mechanics to ensure that key has not been observed or tampered with in transit.

Since traditional public key cryptography algorithms may be vulnerable to a future large-scale quantum computer, new approaches are required that do not share this vulnerability.

QKD claims to offer a potential mitigation since its security properties are based on the laws of physics rather than the hardness of some underlying mathematical problems.


QKD protocols provide a mechanism for two remote parties to agree a shared secret key, where the key cannot be observed or tampered with by an adversary without alerting the original parties.

However, because QKD protocols do not provide authentication, they are vulnerable to physical man-in-the-middle attacks in which an adversary can agree individual shared secret keys with two parties who believe they are communicating with each other.


For this reason, QKD protocols must be deployed alongside cryptographic mechanisms that ensure authentication.

These cryptographic mechanisms must also be secure against the quantum threat."

(Source - Quantum security technologies - UK National Cyber Security Centre.)


See also


Other resource