We use our own cookies and third parties ones to offer our services and collect statistical data. If you continue browsing the internet you accept them. More information


Expand your knowledge

Lessons learned from our journey in QKD

Expand your knoweldge
3 mins
Continuous and discrete Quantum Key Distribution (QKD)

Continuous and discrete Quantum Key Distribution (QKD)

02 / 07 / 2021

In general, there are two different QKD methods to generate a secret key, each putting the emphasis on different quantum characteristics of the light. As a result, they both have different performances and applications.
Learn the basic differences and applications of these two types of QKD technologies.

1 min
Standarization of QKD

Standarization of QKD

Standardization and certification of any technology is vital to enable market penetration, ensure equipment interoperability and a strong supply chain.

Learn the basics about the framework around which standardization of QKD technology is done.

Coming next
5 mins
Get the quantum lock

Get the quantum lock

What does quantum mechanics have to do with making sure that some Alice secretly speaks to certain Bob?

Follow us on this mini-webinar about quantum cryptography and its crucial role on today’s communications

Coming next
3 mins
Meet the European Quantum Flagship

Meet the European Quantum Flagship

04 / 27 / 2022

This year at Mobile World Congress Barcelona we had the pleasure to be part of the booth from the Quantum Flagship initiative that was run in this occasion by the outstanding communications team from ICFO.
Don't miss these 3 mins video with key opinions from the true experts behind these Quantum Technologies industries... Enjoy!

Frequently asked questions

What is quantum mechanics, and why is it getting so much attention?

Quantum mechanics is the principle used to explain the behaviour of particles at the atomic and subatomic scales. It all began around the late 1800s and early 1900s when scientists realized from a series of experimental observations that the behaviour of atoms didn’t agree with the rules of classical mechanics, where everyday objects exist in a specific place at a particular time. This changed the traditional concept of an atom with a nucleus surrounded by electrons to orbitals representing the probability of the electrons being in a given range at any given time. Electrons can jump from one orbital to another as they gain or lose energy, but they cannot be found between orbitals. From this idea, and over many decades, the rules of quantum mechanics were unveiled, allowing scientists to build devices that followed those rules. This led to the first quantum revolution with the invention of the transistor, the laser, and the atomic clock, which gave us computers, optical fibre communications and the global positioning system.

It is getting so much attention because we are in the early stages of a second quantum revolution, with scientists now able to control individual atoms, electrons and photons. This allows our scientific community to build high-speed quantum computers, interception-proof quantum communication and hyper-sensitive quantum measurement methods. All are harnessed by solid technological companies worldwide that are now in a frantic race to redefine the limits of our technology and, with it, the fabric of our everyday lives.

How do quantum computers work, and how are they built?

Classical computers have billions of transistors that turn on or off to represent a value of 0 or 1. Hence, in classical computing, we talk about binary digits or bits. In contrast, quantum computers process data using quantum bits or qubits that, unlike classical bits, can exist in simultaneous states or superpositions at the same point in time, thanks to the laws of quantum mechanics. This allows each qubit to be 1, 0, or both states simultaneously.

The magic of quantum computers happens when these qubits are entangled. Entanglement is a type of correlation that ties qubits together, so the state of one qubit is tied to another. Hence, by leveraging superposition and entanglement, quantum computers can speed up computation and do things that classical computers can’t do.

Entangled qubits can be created in many different ways, for example, with superconductors electronic circuits, trapping ionized atoms, or squeezing particles of light (photons). Each technology is currently trying to preserve the quantum effects for as long as possible as they scale up in the number of qubits from the current hundreds to the targeted Million that will forever redefine the boundaries of computing technology.

Is quantum cryptography and post-quantum cryptography the same?

Post-quantum cryptography (also known as quantum-proof, quantum-safe, or quantum-resistant) refers to cryptographic algorithms that are thought to be secure against the attack of quantum computers in the future. These algorithms are called post-quantum because the security of most standard algorithms today relies on solving challenging mathematical problems, sufficient for defending against modern computers but unable to resist the attack of a quantum computer once they reach specific computational power in the number of Qubits. Quantum cryptography, on the other hand, also known as Quantum Key Distribution (QKD), describes the use of quantum effects to enable unconditionally secure key distribution between two legitimate users, guaranteed by the fundamental laws of quantum physics. Although some people think these two technologies are exclusive, they are meant to be allies in securing future communications.

In a few words, how does the quantum key distribution (QKD) system work?

Quantum Key Distribution is a method for two parties in cryptography, Alice and Bob, to securely establish a shared key to encode messages through optical fiber or space. To create the key, first, Alice encrypts random bits into quantum signals (extremely weak photons) and transmits them through the channel. Next, Bob measures the state of the arriving photons and obtains data that is partially correlated to the data encoded by Alice. This data can be used to distill a secret key using error correction and privacy amplification. When a hacker looks at the information encoded into the quantum photons sent by Alice, they will irreversibly change their properties because quantum states cannot be cloned or copied. This means that Bob receives quantum signals that are not correlated to Alice’s as they should be, letting them know that someone has tried to intercept the message. Alice and Bob discard this key that has been compromised, and a new one following the same process is generated until it is guaranteed that it is free from attacks.

What is the fundamental difference between discrete and continuous quantum key distribution (QKD) approaches?

In Discrete Variable QKD (DV-QKD), the emitter (Alice) prepares and sends to a receiver (Bob) quantum signals which consist of single photons with encoded random data. The encoding is done following a specific QKD protocol by using a discrete-valued degree of freedom of the photons, such as polarization, time-bin, or linear momentum. In the receiver, Bob measures the state of the arriving photons using single-photo detectors to distill a secret key. In Continuous Variable QKD (CV-QKD), the quantum signals typically consist of coherent states of light with information encoded in the quadrature of electromagnetic fields. Instead of single-photon detectors, CV-QKD uses coherent homodyne or heterodyne detection (known in telecommunication phase-diversity homodyne detection) to retrieve the quadrature value of the signal and thus distill a secret key. 

What is the status of standardization and certification of quantum key distribution (QKD) technologies?

Standardization and certification of QKD technology are vital to enable market penetration and ensure equipment interoperability and a robust supply chain. For that, the standards are pretty comprehensive as they define frameworks that consider all aspects of the technology and the implementation into a complete system, performance, best operational practices, or security specifications, to name some. All the critical standard organizations worldwide (national, European, and worldwide) already began years ago to write their specifications on QKD systems, which indicates both increased maturity and a strong interest in the application and commercialization of QKD technology. You can read the comprehensive analysis run by OpenQKD here for further information on QKD standardization.

Suppose classical or mathematical, and post-quantum cryptographies advance rapidly. Will they pose a severe threat to the adoption of Quantum Cryptography?

Rather than competing, both mathematical and post-quantum cryptographies are complementary to quantum cryptography. This is emerging when talking to encryption and telecom providers and is supported by the European Commission's plans to deploy EuroQCI. The idea is to continuously monitor the evolution of all these technologies and put together a roadmap for leveraging both physical and mathematical complexity security-based protocols.

Aren’t Quantum Key Distribution (QKD) technologies too complex and expensive, far from telecom-grade usability?

There are numerous European projects, and private companies are investing and researching to make the technology affordable by involving production experts and the know-how of end-user companies and network infrastructure owners.

Europe seems to be behind the rest of the world in photonic component manufacturing. Will this delay the introduction of Quantum Key Distribution (QKD) systems?

European-made technology is desired/preferred for these systems to ensure European sovereignty. For that reason, the European Union itself, through many fund programs and industry consortiums such as the European Quantum Industry Consortium (QuIC), is stimulating potential makers and suppliers to develop and produce all critical components in Europe over the following years.

Frequently asked questions