September 2021

Let's Talk Quantum Cryptography Pt 2

Overview

In the last quantum cryptography blog post we looked at the popular BB84 protocol and discussed how it is, at least theoretically, a secure protocol. 

This time we’ll see how, when put into practice, physical implementations of the protocol can introduce vulnerabilities that we can exploit to undermine the entire key exchange!

When testing these types of systems, vulnerabilities can be broken down into two broad classes:

Tags