People don’t care enough about secure communication and we do not know enough about it. With almost everyday tasks (for example, online logging, phone calls), we let some information be easily accessible to the anyone who has the interest to find information about our private life. This made me thinking about how to avoid eavesdroppers or how to find out, that the message was intercepted.
Quantum encryption allows secure communication, as the transfer of the encryption key takes place with the help of an indivisible particle - a photon, which means that any intrusion or eavesdropping will be noticeable.
In this thesis, we will learn about protocols for QKD, how they function and their beginnings, which date back to the early 20th century. Basically, most of them are derived from the first most effective BB84 protocol. However, the rapid progress also appeared deficiencies, which hackers use. But a few crucial “weaknesses” have been completely eliminated and proved quantum communication is a robust solution to protect next-generation telecommunications, for large giant companies using huge amounts of personal data as well as for private small talk with friends.
|