Quantum Communication – Module 2

Quantum Key Distribution (QKD)

Quantum communication is regarded as a key technology for the next generation of secure communication systems. It fundamentally changes the way information is transmitted because the laws of quantum physics provide a very high level of security. Quantum Key Distribution (QKD) plays a central role: it allows encryption keys to be exchanged between sender and receiver in a way that is immune to eavesdropping. Unlike conventional methods that rely on computationally intensive mathematics, QKD draws its security from physical principles, making it fundamentally different and significantly more secure.

 

The practical basic scheme of quantum key distribution is usually the same: there are two communication partners, Alice (person A) and Bob (person B), as well as a potentially eavesdropping party called Eve (from “eavesdropper”). Alice and Bob use a specific protocol to exchange quantum objects and jointly generate a key. In this scenario, the potential eavesdropper Eve attempts to tap the communication channel. At the end, Alice and Bob exchange classical information to check whether Eve has listened in on the channel or not.

 

This module of the quantum communication course introduces Quantum Key Distribution (QKD). QKD comprises several protocols, all designed to detect any eavesdropping attack immediately. In this way, a level of security is achieved that cannot be matched by classical methods. The module presents the best-known QKD protocols. It begins with the pioneering BB84 protocol (Chapter 1), which laid the foundation for secure quantum communication. This is followed by the E91 protocol (Chapter 2), which exploits entanglement, one of the most fascinating quantum phenomena. The decoy-state protocol (Chapter 3) provides another method for increasing the security of the communication channel. Finally, continuous-variable QKD (CV-QKD, Chapter 4) is presented, offering a fundamentally different approach to quantum key distribution.

 

In principle, two approaches are distinguished in QKD: discrete-variable QKD (DV-QKD) and continuous-variable QKD (CV-QKD). Chapters 1 to 3 of this module cover DV-QKD protocols, while Chapter 4 deals with CV-QKD.

 

This module is among the more challenging parts of the course. It explains key technical terms from Module 1 in greater depth and uses videos and visualisations to clarify the processes of the protocols. At the same time, it builds a foundation for the following modules: understanding Module 3 partly depends on concepts from this module, and together with Module 3 it forms the basis for understanding and grasping the application scenarios in Module 4.

 

We wish you every success as you work through this module!