{"id":2199,"date":"2026-04-07T10:09:48","date_gmt":"2026-04-07T08:09:48","guid":{"rendered":"https:\/\/www.milq.info\/?page_id=2199"},"modified":"2026-04-07T12:17:53","modified_gmt":"2026-04-07T10:17:53","slug":"module1-chapter2","status":"publish","type":"page","link":"https:\/\/www.milq.info\/en\/qti\/qcomm\/module1-chapter2\/","title":{"rendered":"Quantum Communication &#8211; Module 1 Chapter 2"},"content":{"rendered":"<div id=\"bsf_rt_marker\"><\/div><p><\/p>\n<h1>Cryptography<\/h1>\n<p>This chapter is an audio chapter. This means that the content of the audio file and the content of the text are identical. It is up to you if you only listen to the audio file, only read the text or if you do both listening to the audio file and reading the text.<\/p>\n<p>Additionally, you are allowed to download the audio file. This way you can listen to it without an internet connection. Alternatively, you are allowed to listen it here on the website of course.<\/p>\n<hr \/>\n<p style=\"text-align: center;\"><a class=\"button\" href=\"\/QTIndu\/QComm\/en-1-0-audio-0.mp3\" download=\"Audio Module 1\"> Download audio module 1 <\/a><\/p>\n<p style=\"text-align: center;\"><a class=\"button\" href=\"\/QTIndu\/QComm\/en-1-2-audio-1.mp3\" download=\"Audio Chapter 2\"> Download audio chapter 2 <\/a><\/p>\n<hr \/>\n<h2>Audio Chapter 2:<\/h2>\n<p><audio src=\"\/QTIndu\/QComm\/en-1-2-audio-1.mp3\" controls=\"controls\" data-mce-fragment=\"1\"><span data-mce-type=\"bookmark\" class=\"mce_SELRES_start\">\ufeff<\/span><span data-mce-type=\"bookmark\" class=\"mce_SELRES_start\">\ufeff<\/span> Dein Browser unterst\u00fctzt dieses Audioformat nicht. Your browser does not support the audio. <\/audio><\/p>\n<hr \/>\n<p>Before we fully dive into the world of quantum mechanics and especially quantum communication, we will first take a look at cryptography as a whole. The main goal here is to determine why classical cryptography and the encryption methods we know are slowly becoming obsolete and should even be renewed. Furthermore, we will find out which possible alternatives exist and are being developed.<\/p>\n<p>&nbsp;<\/p>\n<h3>Overview<\/h3>\n<p>With the increasing dependence on digital systems, the demand for robust cybersecurity measures is rising. The classical encryption methods used so far \u2013 such as RSA, Diffie-Hellman, and AES \u2013 have been the backbone of our secure communication for decades. RSA is an abbreviation for Rivest, Shamir, Adleman, the developers of this method. AES stands for Advanced Encryption Standard. Diffie-Hellman is a method that was developed by Diffie and Hellman. These methods are based on complex mathematical problems, such as prime factorization or solving discrete logarithms, and thus ensure the security of our data. To illustrate this more clearly, let\u2019s take an example: prime factorization.<\/p>\n<p>&nbsp;<\/p>\n<h3>Prime factorization &#8211; an example<\/h3>\n<p>Every number can be described as a unique product of prime numbers.<\/p>\n<p>For example, 4 is the product of 2 times 2.<\/p>\n<p>6 is the product of 2 times 3.<\/p>\n<p>39 is the product of 3 times 13.<\/p>\n<p>The arrangement of prime numbers is definite in each case; there is no number other than 4 whose prime factorization is also 2 times 2. Likewise, there is no number other than 39 whose prime factorization is also 3 times 13. The crucial point is the following: multiplication is a simple operation. Even elementary school children can do it. Finding the prime factorization, meaning the prime numbers whose product results in a given number, is difficult. Let\u2019s take the number 210 as an example. What is its prime factorization? Now, we \u2013 or rather, a computer \u2013 would have to go through all possible variations that can result in 210. 2 times 105, 3 times 70, 6 times 35, and so on. The computer also has to check whether the respective numbers are prime numbers. However, once the prime factorization is determined, meaning we know the prime numbers whose product results in the number, everything becomes easy. In this case, the prime numbers are 2, 3, 5, and 7. Calculating their product is simple: 2 times 3 is 6, 6 times 5 is 30, 30 times 7 is 210. If two communication partners now have the prime numbers 2, 3, 5, and 7, it is easy for them to break the code 210. An eavesdropper \u2013 someone trying to listen in on the communication \u2013 on the other hand, would have to go through all possible constellations. This takes time\u2026 and computing power.<\/p>\n<p>Of course, this was a highly simplified representation; the actual method varies somewhat. But at the moment, the goal is to understand the principle.<\/p>\n<p>&nbsp;<\/p>\n<h3>Current state<\/h3>\n<p>Our current encryption is based on mathematically complex problems \u2013 problems that today\u2019s computers cannot solve, at least not in a reasonable time. The computers of tomorrow \u2013 quantum computers \u2013 will, however, be able to solve them. Today\u2019s encryption measures thus face an existential threat: the emerging power of quantum computers. Classical encryption algorithms are becoming increasingly vulnerable. With the rapid rise of quantum computers, these encryption schemes could soon become obsolete. When considering the exponential increase in data generated and transmitted worldwide, the urgency of the situation becomes clear: according to recent estimates, the number of connected devices is expected to reach 30 billion by 2030. Global data production is projected to rise to an astonishing 181 zettabytes by 2025. To put this into perspective: 1 zettabyte equals one billion terabytes! Such an enormous data flood requires improved security measures, especially since current encryption methods may soon become inadequate. Under these conditions, quantum communication \u2013 or at least some alternative to our current systems \u2013 is not just an innovation; it is a necessity.<\/p>\n<p>&nbsp;<\/p>\n<h3>Shor and the vulnerability of the classical approaches<\/h3>\n<p>The rise of quantum computers brings about a paradigm shift. Quantum algorithms \u2013 especially Shor\u2019s algorithm \u2013 can solve the mathematical problems on which our current encryption systems are based exponentially faster than classical algorithms. This poses a direct threat to current cryptographic protocols. Shor\u2019s algorithm is a quantum algorithm capable of factoring large numbers into their prime factors.<\/p>\n<p>Let\u2019s consider the RSA protocol, one of the most widely used encryption systems today. The security of RSA is based on the difficulty of factoring a product of two large prime numbers. A classical computer would take thousands of years to break such an encryption key. A sufficiently powerful quantum computer, however, could solve this problem in mere seconds using Shor\u2019s algorithm. This is no longer just a theoretical concern: experts estimate that quantum computers will be able to break RSA-2048 encryption as early as the early 2030s. Some estimates even suggest there is a 50% chance that this could happen as early as 2031. This emerging reality signals a countdown to the era of classical encryption \u2013 at least as we know it.<\/p>\n<p>A similar fate awaits the Diffie-Hellman key exchange. So far, it has enabled the sharing of cryptographic keys over public channels but is becoming increasingly vulnerable. Diffie-Hellman relies on the difficulty of calculating discrete logarithms. Quantum computers can efficiently solve this problem as well.<\/p>\n<p>With advancements in quantum technology, the foundation of our current cryptographic systems is slowly but surely eroding. This presents an urgent call to seek alternatives that can withstand quantum technology.<\/p>\n<p>&nbsp;<\/p>\n<p>But what could such alternatives look like? What options do we have? And are the solutions only to be found in the world of quantum mechanics?<\/p>\n<p>&nbsp;<\/p>\n<h3>Post-Quantum-Cryptography (PQC)<\/h3>\n<p>Interestingly, among the possible alternatives, there are also classical solutions. This pertains to the development of so-called post-quantum cryptography, often abbreviated as PQC. Post-quantum cryptographic algorithms are classical in nature. They are classical approaches \u2013 not quantum cryptography but rather classical cryptography. This means they could also be integrated into our current infrastructure and systems; they do not require any quantum upgrade. Post-quantum cryptography is considered secure against the computational power of quantum computers \u2013 at least, it is based on mathematical problems that are believed to be resistant to quantum computing. One example is the NewHope algorithm.<\/p>\n<p>The NewHope algorithm is based on the difficulty of Learning with Errors problems. These involve solving linear equations with added errors. These problems are believed to be resistant to attacks from quantum computers because they are computationally intensive \u2013 even for advanced algorithms such as Shor\u2019s algorithm. The NewHope algorithm uses lattice-based cryptography. Lattice-based cryptography generates public and private keys based on the mathematical structure of lattices. These structures make it more difficult for quantum computers to solve the underlying problems, thus offering strong security against potential quantum computer attacks.<\/p>\n<p>Other types of cryptography:<\/p>\n<p>Add bulleted list:<\/p>\n<ul>\n<li>hash based<\/li>\n<li>code based<\/li>\n<li>multivariate polynomial cryptography<\/li>\n<\/ul>\n<p>In this course, PQC plays little to no role; we primarily want to focus on quantum communication. In this section of the course, we have only briefly introduced PQC to make you aware that there are other alternatives as well. Furthermore, in the fourth module\u2014when discussing specific application fields and industrial sectors\u2014PQC will also be covered.<\/p>\n<p>&nbsp;<\/p>\n<h3>Quantum cryptography and QKD<\/h3>\n<p>This course focuses on quantum communication and, in connection with that, primarily quantum key distribution. Quantum key distribution \u2013 in short QKD \u2013 offers a fundamentally different approach that provides future-proof and technology-independent security. In quantum key distribution, QKD, the goal is to distribute a key for encrypting messages, data, or other information between two communication parties using the principles of quantum physics. QKD is future-proof because it is based on fundamental physical laws. QKD relies on the principles of quantum physics, such as superposition and entanglement. It exploits the properties of photons as well as quantum objects in general. This is primarily the inherent unpredictability of measurement results. If I measure a quantum object in a superposition state, I cannot predict the measurement result; it is genuinely random. This property helps to detect a potential eavesdropping attack since any intermediate measurement causes disturbances. Technology-independent security, on the other hand, means that QKD will remain secure even with the emergence of more advanced technologies. The previous, classical methods are, for example, not technology-independent in terms of security. With the advent of higher computing power, they become obsolete. QKD, however, is immune to such advancements because its security is based on physics and not on the absence of sufficient computing power.<\/p>\n<p>&nbsp;<\/p>\n<h3>Information-theoretic security<\/h3>\n<p>One of the most significant advantages of QKD is that it also offers information-theoretic security. This means that security does not rely on assumptions regarding computing power.<\/p>\n<p>Information-theoretically secure are those methods\u2026<\/p>\n<p>Add bulleted list:<\/p>\n<ul>\n<li>where it is impossible to break the encryption.<\/li>\n<li>where it is impossible to determine the encrypted message or file based on the encryption itself.<\/li>\n<li>that remain secure regardless of the capabilities of the eavesdropper.<\/li>\n<\/ul>\n<p>The previous encryption methods \u2013 RSA, Diffie-Hellman \u2013 are not information-theoretically secure. Their security is based on the assumption that no devices exist that provide enough computing power to break the encryption. QKD, on the other hand, is information-theoretically secure \u2013 at least in theory and if implemented in its ideal form, meaning without errors, without losses, without noise. It remains secure regardless of the technological level of the eavesdropper, even in the case that the eavesdropper possesses a quantum computer. The security of QKD does not rely on making calculations complicated. It is based on the fact that every measurement of a quantum system changes and influences the quantum system, making unnoticed eavesdropping attacks impossible. In classical encryption, data could be intercepted and potentially cracked as soon as the necessary computing power is available. With QKD, however, this is not possible, as eavesdropping attacks and even the interception of encryption keys can be detected in real-time. It is as if you have a safe that cannot be opened without triggering some kind of alarm. Additionally, QKD generates encryption keys that are truly random \u2013 thanks to the unpredictable nature of quantum physics. In classical encryption, truly random keys cannot be created because the randomness is simulated and, in theory, could be calculated and predicted.<\/p>\n<p>&nbsp;<\/p>\n<h3>Conclusion and Outlook<\/h3>\n<p>QKD represents a critical advancement in secure communication. It addresses the imminent vulnerability of classical encryption in the era of quantum computing. By leveraging the principles of quantum physics, QKD provides a proactive and robust defense against the evolving landscape of cyber threats. With advancements in quantum computing, QKD will not only be a technological option but a strategic necessity. It will empower organizations and governments to protect their most valuable information in a fundamentally secure way. This makes QKD an essential technology for secure communication, especially in the face of an era where traditional encryption methods can be effortlessly broken by quantum computers.<\/p>\n<hr \/>\n<h2>Exercises:<\/h2>\n<div class=\"h5p-iframe-wrapper\"><iframe id=\"h5p-iframe-50\" class=\"h5p-iframe\" data-content-id=\"50\" style=\"height:1px\" src=\"about:blank\" frameBorder=\"0\" scrolling=\"no\" title=\"QTI-EN-QComm-1-2\"><\/iframe><\/div>\n<p style=\"text-align: right;\"><a class=\"button\" href=\"https:\/\/www.milq.info\/en\/qti\/qcomm\/module2\/\">Continue to Module 2<\/a><\/p>\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>Cryptography This chapter is an audio chapter. This means that the content of the audio file and the content of the text are identical. It is up to you if you only listen to the audio file, only read the text or if you do both listening to the audio file and reading the text.&hellip; <a href=\"https:\/\/www.milq.info\/en\/qti\/qcomm\/module1-chapter2\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Quantum Communication &#8211; Module 1 Chapter 2<\/span><\/a><\/p>\n","protected":false},"author":8,"featured_media":0,"parent":2181,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2199","page","type-page","status-publish","hentry","without-featured-image"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Quantum Communication - Module 1 Chapter 2 - milq<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.milq.info\/qti\/qcomm\/module1-chapter2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Quantum Communication - Module 1 Chapter 2 - milq\" \/>\n<meta property=\"og:description\" content=\"Cryptography This chapter is an audio chapter. This means that the content of the audio file and the content of the text are identical. It is up to you if you only listen to the audio file, only read the text or if you do both listening to the audio file and reading the text.&hellip; Continue reading Quantum Communication &#8211; Module 1 Chapter 2\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.milq.info\/qti\/qcomm\/module1-chapter2\/\" \/>\n<meta property=\"og:site_name\" content=\"milq\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-07T10:17:53+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"21 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.milq.info\\\/qti\\\/qcomm\\\/module1-chapter2\\\/\",\"url\":\"https:\\\/\\\/www.milq.info\\\/qti\\\/qcomm\\\/module1-chapter2\\\/\",\"name\":\"Quantum Communication - Module 1 Chapter 2 - milq\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.milq.info\\\/#website\"},\"datePublished\":\"2026-04-07T08:09:48+00:00\",\"dateModified\":\"2026-04-07T10:17:53+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.milq.info\\\/qti\\\/qcomm\\\/module1-chapter2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.milq.info\\\/qti\\\/qcomm\\\/module1-chapter2\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.milq.info\\\/qti\\\/qcomm\\\/module1-chapter2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.milq.info\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"QTIndu &#8211; Quantum Technologies Courses for Industry\",\"item\":\"https:\\\/\\\/www.milq.info\\\/qti\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Quantenkommunikation &#038; Quantennetzwerke\",\"item\":\"https:\\\/\\\/www.milq.info\\\/qti\\\/qcomm\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Quantenkommunikation &#8211; Modul 1 Kapitel 2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.milq.info\\\/#website\",\"url\":\"https:\\\/\\\/www.milq.info\\\/\",\"name\":\"milq\",\"description\":\"Quantenphysik in der Schule\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.milq.info\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Quantum Communication - Module 1 Chapter 2 - milq","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.milq.info\/qti\/qcomm\/module1-chapter2\/","og_locale":"en_US","og_type":"article","og_title":"Quantum Communication - Module 1 Chapter 2 - milq","og_description":"Cryptography This chapter is an audio chapter. This means that the content of the audio file and the content of the text are identical. It is up to you if you only listen to the audio file, only read the text or if you do both listening to the audio file and reading the text.&hellip; Continue reading Quantum Communication &#8211; Module 1 Chapter 2","og_url":"https:\/\/www.milq.info\/qti\/qcomm\/module1-chapter2\/","og_site_name":"milq","article_modified_time":"2026-04-07T10:17:53+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"21 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.milq.info\/qti\/qcomm\/module1-chapter2\/","url":"https:\/\/www.milq.info\/qti\/qcomm\/module1-chapter2\/","name":"Quantum Communication - Module 1 Chapter 2 - milq","isPartOf":{"@id":"https:\/\/www.milq.info\/#website"},"datePublished":"2026-04-07T08:09:48+00:00","dateModified":"2026-04-07T10:17:53+00:00","breadcrumb":{"@id":"https:\/\/www.milq.info\/qti\/qcomm\/module1-chapter2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.milq.info\/qti\/qcomm\/module1-chapter2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.milq.info\/qti\/qcomm\/module1-chapter2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.milq.info\/"},{"@type":"ListItem","position":2,"name":"QTIndu &#8211; Quantum Technologies Courses for Industry","item":"https:\/\/www.milq.info\/qti\/"},{"@type":"ListItem","position":3,"name":"Quantenkommunikation &#038; Quantennetzwerke","item":"https:\/\/www.milq.info\/qti\/qcomm\/"},{"@type":"ListItem","position":4,"name":"Quantenkommunikation &#8211; Modul 1 Kapitel 2"}]},{"@type":"WebSite","@id":"https:\/\/www.milq.info\/#website","url":"https:\/\/www.milq.info\/","name":"milq","description":"Quantenphysik in der Schule","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.milq.info\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.milq.info\/en\/wp-json\/wp\/v2\/pages\/2199","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.milq.info\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.milq.info\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.milq.info\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.milq.info\/en\/wp-json\/wp\/v2\/comments?post=2199"}],"version-history":[{"count":7,"href":"https:\/\/www.milq.info\/en\/wp-json\/wp\/v2\/pages\/2199\/revisions"}],"predecessor-version":[{"id":2337,"href":"https:\/\/www.milq.info\/en\/wp-json\/wp\/v2\/pages\/2199\/revisions\/2337"}],"up":[{"embeddable":true,"href":"https:\/\/www.milq.info\/en\/wp-json\/wp\/v2\/pages\/2181"}],"wp:attachment":[{"href":"https:\/\/www.milq.info\/en\/wp-json\/wp\/v2\/media?parent=2199"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}