TABLE OF CONTENTS
S. No. Topic Page No.
1. Abstract 2
2. Introduction 3
3. Secure Communications 4
4. Quantum Concepts: Superposition, 5
Entanglement, And Principles
5. Quantum Cryptography 7
6. Quantum Key Distribution 8
7. Applications of Quantum Cryptography 9
8. Benefits of Quantum Cryptography 12
9. Limitations of Quantum Cryptography 13
10. Post-Quantum Cryptography (Pqc) 15
11. 16
Algorithms
12. 20
Conclusion
13. 21
Reference
1
ABSTRACT
Quantum cryptography represents a paradigm shift in the field of secure communication.
Unlike traditional cryptographic systems that rely on the complexity of mathematical
problems, quantum cryptography leverages the principles of quantum mechanics, such as
superposition and entanglement, to ensure unbreakable encryption. This method not only
offers higher levels of security but also enables the detection of eavesdropping attempts
through fundamental quantum behavior. As quantum computers evolve, traditional
encryption methods are becoming increasingly vulnerable, making it essential to adopt
quantum-safe strategies. Post-quantum cryptography (PQC) addresses this need by
developing algorithms resistant to quantum attacks. This report explores both quantum
cryptography and PQC, highlighting their mechanisms, applications, benefits, limitations,
and real-world implications.
2
INTRODUCTION
Cryptography, derived from the Greek words "kryptos" (hidden) and "graphein" (to
write), has been central to information security for centuries. In the digital age, it ensures
the confidentiality, integrity, and authenticity of information exchanged across networks.
However, the rapid advancement of quantum computing poses a threat to existing
cryptographic protocols. Quantum computers can potentially solve problems like integer
factorization and discrete logarithms exponentially faster than classical computers,
making algorithms like RSA and ECC vulnerable. This has spurred interest in quantum
cryptography — a field that uses the laws of quantum physics to secure data
transmission. The most prominent application is Quantum Key Distribution (QKD),
which enables two parties to generate a shared secret key with unconditional security.
This report dives into the theoretical foundation, practical implementations, and future
landscape of both quantum cryptography and post-quantum cryptography.
3
SECURE COMMUNICATIONS
In the digital era, secure communication is the backbone of personal privacy, business
continuity, and national security. It ensures that messages exchanged between two parties
remain confidential and tamper-proof, protecting them from malicious third-party
interference. Traditional methods of securing communication rely heavily on encryption
techniques and public key infrastructure (PKI). However, with the advent of quantum
computing, these methods are at risk of becoming obsolete.
Quantum cryptography provides a promising solution by using the properties of quantum
mechanics. One of its key advantages is detectable eavesdropping — any attempt to
intercept or observe the quantum communication disturbs the quantum state, alerting the
parties involved. This makes quantum-based secure communications far more resilient
than classical ones.
Organizations are increasingly investing in secure messaging technologies and
cybersecurity awareness. From financial institutions and healthcare systems to military
networks, secure communication now involves both strong encryption and real-time
monitoring to detect any threats.
4
QUANTUM CONCEPTS: SUPERPOSITION,
ENTANGLEMENT, AND PRINCIPLES
Quantum cryptography is deeply rooted in the principles of quantum mechanics. Each of
these concepts enables security in a fundamentally different way than classical
cryptography. Let’s explore them with relatable examples.
1. Superposition
In quantum mechanics, particles such as photons can exist in multiple states at once until
measured.
Example: Imagine a coin spinning in the air — it is not clearly heads or tails. It's in a
superposition of both. Only when it lands (or is observed), it becomes one or the other.
Similarly, a quantum bit (qubit) can be in a combination of 0 and 1, allowing more
complex information encoding.
Use in Cryptography: Qubits in superposition carry information more securely and can
be used to encode secret keys that collapse to specific values only when measured.
2. Entanglement
Entanglement is a phenomenon where two particles become linked, such that the state of
one instantly determines the state of the other, even if separated by large distances.
Example: Think of two dice rolled at opposite ends of the earth. If they are entangled,
rolling a 6 on one automatically means the other shows a 6 — every time, without fail.
Use in Cryptography: Entangled particles are used in QKD to ensure that the keys
shared between Alice and Bob are identical and unaltered. Any interference by a third
party changes the entanglement and alerts them.
5
3. Heisenberg’s Uncertainty Principle
This principle states that you cannot accurately measure both the position and momentum
(or state) of a particle without affecting one of them.
Example: Imagine trying to measure the temperature of boiling water with a metal rod.
The rod affects the water’s heat. Similarly, measuring a quantum particle’s state disturbs
it.
Use in Cryptography: Any eavesdropper (Eve) trying to measure a quantum key
unknowingly alters it, creating discrepancies that expose her.
4. No-Cloning Theorem
The no-cloning theorem states that you cannot create an identical copy of an unknown
quantum state.
Example: Imagine getting a secret recipe from a chef — but the moment you try to
duplicate it exactly, it changes itself. You can’t clone something you don’t fully
understand.
Use in Cryptography: Prevents attackers from duplicating a quantum-encoded key
without altering its state, ensuring absolute privacy.
6
WHAT IS QUANTUM CRYPTOGRAPHY?
Quantum cryptography is a method of securing communication by applying the laws of
quantum mechanics. Unlike traditional cryptographic methods that depend on
computational assumptions, quantum cryptography provides security that is information-
theoretic — meaning it remains secure regardless of the computational power of an
attacker.
The most widely known application is Quantum Key Distribution (QKD). In QKD,
two parties (often referred to as Alice and Bob) share a secure key using a quantum
channel. Any attempt by a third party (Eve) to intercept the communication introduces
anomalies that reveal their presence.
Quantum cryptography is not just a theoretical concept — several experiments and real-
world implementations (e.g., satellite QKD) prove that secure communication using
quantum physics is possible. As the technology becomes more practical and accessible, it
is expected to play a central role in securing next-generation digital infrastructure.
7
QUANTUM KEY DISTRIBUTION (QKD)
Quantum Key Distribution is the most practical and implemented form of quantum
cryptography today. It allows two parties (Alice and Bob) to share a secret key using
quantum channels, with the guarantee that any interception attempt can be detected.
How QKD Works – BB84 Protocol Example:
1. Alice sends photons polarized in one of four directions (vertical, horizontal, +45°,
-45°), each representing binary bits.
2. Bob randomly chooses a polarizer to measure each photon.
3. After transmission, Alice and Bob compare which polarizer bases they used (but
not the result).
4. They discard the mismatches and keep the matched ones as the shared key.
5. If an eavesdropper (Eve) intercepted the photons, her measurement would
introduce detectable errors.
Advantages of QKD:
Guarantees detection of eavesdropping.
Based on laws of physics, not math.
Already tested over fiber networks and satellites (e.g., China’s Micius satellite).
8
APPLICATIONS OF QUANTUM CRYPTOGRAPHY
1. Financial Sector
The financial industry handles enormous volumes of sensitive data every second —
including transactions, personal information, and market strategies. Quantum
cryptography, particularly Quantum Key Distribution (QKD), can protect this data
during transmission between banks, ATMs, financial servers, and trading platforms.
Use Case: Inter-bank communication using QKD ensures that messages or
transaction instructions cannot be intercepted or tampered with.
Impact: Prevents fraud, insider trading, and digital theft in a future where
quantum computers could break RSA-based systems.
2. Military and Government Communication
Classified military and diplomatic communication must remain secure under all
conditions, including cyber warfare and state-sponsored attacks.
Use Case: Quantum communication lines can be deployed between command
centers, embassies, and military bases.
Impact: Any attempt to eavesdrop on or manipulate sensitive data is instantly
detectable, giving these agencies full control over secure operations.
9
3. Healthcare
Healthcare data includes electronic medical records (EMRs), genomic research, and
clinical trial results — all of which must remain private and compliant with strict data
protection regulations.
Use Case: Hospitals and biotech firms can use QKD to encrypt communication
between departments, labs, and cloud storage.
Impact: Prevents unauthorized access to confidential patient data and medical
innovations.
4. Internet of Things (IoT)
IoT devices often lack strong security features, making them easy targets for hackers.
Since these devices connect to critical infrastructure (smart homes, vehicles, factories),
even minor breaches can cause major harm.
Use Case: Integrating lightweight quantum cryptographic protocols into IoT
communication stacks ensures data protection without heavy processing.
Impact: Shields low-power devices from quantum-level cyberattacks, improving
system-wide resilience.
5. Space and Satellite Communication
The challenge of long-distance key sharing is addressed using satellite-based quantum
communication. China’s Micius satellite was the first to demonstrate global QKD via
space.
Use Case: Governments and corporations can use quantum satellites for ultra-
secure international communication.
10
Impact: Opens the door to creating a Quantum Internet, allowing encrypted
messages to travel across continents without interception.
6. Cloud Storage and Data Centers
Data stored in the cloud or transmitted between distributed data centers is vulnerable to
man-in-the-middle attacks and long-term data theft (also called “harvest-now-decrypt-
later” attacks).
Use Case: Cloud providers can use QKD to encrypt data in transit between
clients, servers, and global data centers.
Impact: Ensures confidentiality and protects both enterprise and consumer data
even in the post-quantum world.
11
BENEFITS OF QUANTUM CRYPTOGRAPHY
Quantum cryptography offers several compelling advantages over classical cryptographic
systems, especially as we approach the era of practical quantum computing.
1. Unconditional Security
Unlike classical cryptographic systems whose security depends on the time it takes to
solve a problem (like factoring primes), quantum cryptography’s security is based on the
laws of nature. Any eavesdropping attempt will disturb the quantum state and be noticed.
2. Secure Key Distribution
QKD provides a way for two parties to securely share a cryptographic key — a critical
component in secure communication. This key can then be used in symmetric encryption
systems like AES, ensuring safe message exchange.
3. Eavesdropping Detection
One of the unique benefits of quantum cryptography is its ability to detect intrusion. If a
third party attempts to intercept the key, their interference introduces detectable errors
that Alice and Bob can identify.
4. Resistance to Quantum Attacks
Quantum cryptography is not only secure against classical threats but also against attacks
from quantum computers. It offers long-term data security, ensuring encrypted
information remains secure even decades later.
5. Ideal for High-Security Environments
Government, defense, research institutions, and critical infrastructure can benefit from
quantum-level protection that classical encryption cannot provide.
12
LIMITATIONS OF QUANTUM CRYPTOGRAPHY
While quantum cryptography offers exceptional security benefits, it also comes with
several limitations that currently hinder widespread adoption. These challenges are both
technical and economic, and must be addressed for full-scale deployment.
1. High Implementation Cost
Quantum cryptographic systems require expensive and sensitive hardware like:
Single-photon emitters
Photon detectors
Specialized optical fibers or quantum satellites
2. Distance Limitations
Quantum signals degrade over distance due to photon loss in optical fibers. Without
quantum repeaters (which are still under research), the effective range is limited to
around 100–150 km in practical deployments.
3. Environmental Sensitivity
Quantum states are extremely delicate and can be disturbed by temperature changes,
vibrations, and electromagnetic interference. This makes the hardware setup complex and
sensitive to real-world conditions.
4. Limited Key Rate
Currently, QKD systems have a lower key generation rate compared to classical systems.
This can impact performance in systems requiring very high bandwidths.
13
5. Integration Challenges
Integrating quantum cryptography into existing communication infrastructure requires
significant upgrades, new protocols, and skilled personnel, which increases operational
overhead.
14
POST-QUANTUM CRYPTOGRAPHY (PQC)
What is the Quantum Threat?
As quantum computing progresses, it poses a serious threat to existing cryptographic
systems. Most of today’s encryption schemes (like RSA and ECC) are secure only
because they are hard to break with current classical computers. However, quantum
computers can run specialized algorithms like:
Shor’s Algorithm: Efficiently breaks RSA, ECC, and Diffie–Hellman by
factoring large numbers and solving discrete logarithms.
Grover’s Algorithm: Speeds up brute-force attacks against symmetric encryption
(like AES), effectively halving the key length's strength.
15
ALGORITHMS
1. Lattice-Based Cryptography
Example – CRYSTALS-Kyber (Key Exchange)
A global messaging app wants to secure its chats from future quantum attacks. It
currently uses RSA and ECC, but the company knows these will be breakable with
quantum computers.
To stay ahead, they implement CRYSTALS-Kyber as their new key exchange protocol.
How It Works:
When two users start a chat, the app:
o Uses Kyber to create a shared encryption key between them.
o The server sends an encrypted message containing Kyber public
parameters.
o The recipient replies with a response that allows both users to compute the
same symmetric key.
This key is then used to encrypt the messages with AES.
Why It's Powerful:
Even if a hacker steals the data and stores it, they can’t decrypt it in the future,
because Kyber is based on a lattice problem too complex for both classical and
quantum computers.
It’s like hiding treasure inside a maze with 500 dimensions — and even with a supermap
(quantum computer), no one knows how to navigate it without the private key.
16
2. Code-Based Cryptography
Example – Classic McEliece
A telecom company is building a secure communication system for satellite-to-ground
data links. They need a very fast decryption system that resists quantum attacks and
handles high data loads.
They choose Classic McEliece, which has been around since the 1970s and is still
unbroken.
How It Works:
The satellite uses McEliece’s huge public key to encrypt telemetry data.
The ground station, using its private key, decrypts the data almost instantly.
The strength comes from how hard it is to decode random linear error-
correcting codes without knowing the structure.
Real Impact:
McEliece enables ultra-fast decryption, making it ideal for low-latency
environments like aerospace or telecom.
Imagine receiving a message written in a strange language, scrambled and encoded, with
thousands of spelling errors — unless you have the original dictionary, you’ll never
decode it.
3. Multivariate Polynomial Cryptography
Example – Rainbow (Digital Signatures)
A digital ID platform used by universities for issuing online degrees wants to ensure
their certificates can be verified even 50 years from now. They're concerned about
quantum forgeries.
17
They use Rainbow, a multivariate signature scheme, to sign every degree digitally.
How It Works:
The system generates a set of complex polynomial equations (private key).
When signing a document, it solves the equations with the message’s hash and
outputs a unique signature.
Anyone can verify the signature using the simplified public version of the
equations.
Real Impact:
If a certificate is verified in the future — even in a world with quantum computers
— it remains valid and unforgeable.
Rainbow offers very compact signatures, suitable for large-scale verification
systems.
Imagine solving a jigsaw puzzle with 1,000 pieces that look identical. Only the right
solution (signature) fits the frame. Reversing the process without the picture (private key)
is practically impossible.
4. Hash-Based Cryptography
Example – XMSS (eXtended Merkle Signature Scheme)
A national archive is digitizing legal and historical documents and wants to sign each
file in a way that remains verifiable forever, even if quantum computers become
mainstream.
They use XMSS, a hash-based signature scheme, to ensure future-proof integrity.
How It Works:
A large tree of one-time keys is generated using hash functions (like SHA-256).
For each new document, one leaf of the tree is used to sign.
18
The signature includes both the leaf and a path through the tree that proves it
belongs to the root (the public key).
Real Impact:
XMSS is ideal for applications where documents are signed once and verified
repeatedly.
Its simple design and reliance on secure hash functions make it extremely robust.
Think of signing documents with wax seals made from a unique part of a fingerprint.
Each seal is linked back to your original fingerprint — impossible to fake without the
original hand.
19
CONCLUSION
As we step into the quantum era, traditional cryptographic systems that protect our digital
world are increasingly at risk. Quantum computers, with their ability to break the
mathematical foundations of current encryption methods, present a real and growing
threat. This has given rise to two powerful directions in secure communication: quantum
cryptography and post-quantum cryptography.
Quantum cryptography, particularly through Quantum Key Distribution (QKD) and
protocols like BB84, offers unconditional security based on the laws of physics. It
enables real-time detection of eavesdropping and ensures that secure keys are shared
without the risk of future compromise.
On the other hand, post-quantum cryptography (PQC) provides practical solutions that
can be integrated into today's classical systems. Techniques such as lattice-based, code-
based, hash-based, and multivariate polynomial cryptography are leading the charge
toward quantum-resistant algorithms.
Each approach comes with its own set of advantages and challenges — quantum
cryptography promises ultimate security but requires expensive infrastructure, while PQC
offers a more immediate and accessible transition.
Ultimately, a hybrid approach that combines classical, post-quantum, and quantum
cryptographic methods will likely shape the future of secure digital communication.
Continued research, global collaboration, and proactive adoption are essential to ensure
that our information remains secure in a post-quantum world.
20
REFERENCES
1. GeeksforGeeks. (n.d.). Quantum Cryptography. Retrieved from
https://www.geeksforgeeks.org/computer-networks/quantum-cryptography/
2. GeeksforGeeks. (n.d.). Cryptography and its types. Retrieved from
https://www.geeksforgeeks.org/computer-networks/cryptography-and-its-types/
3. Cloudflare. (n.d.). What is Post-Quantum Cryptography (PQC)? Retrieved from
https://www.cloudflare.com/learning/ssl/quantum/what-is-post-quantum-
cryptography/
4. Wikipedia. (n.d.). Post-quantum cryptography. Retrieved from
https://en.wikipedia.org/wiki/Post-quantum_cryptography
5. Wikipedia. (n.d.). Uncertainty principle. Retrieved from
https://en.wikipedia.org/wiki/Uncertainty_principle
6. Nicole Heron. (2024). Unlocking Secure Communications 101: The
Fundamentals. Cyber Defense Magazine. Retrieved from
https://www.cyberdefensemagazine.com/unlocking-secure-communications-101-
the-fundamentals/
7. ResearchGate. (2021). Timeline of quantum cryptography. Retrieved from
https://www.researchgate.net/figure/Timeline-of-quantum-
cryptography_fig1_357334488
8. Microsoft Quantum. (n.d.). Superposition. Retrieved from
https://quantum.microsoft.com/en-us/insights/education/concepts/superposition
9. Microsoft Quantum. (n.d.). Entanglement. Retrieved from
https://quantum.microsoft.com/en-us/insights/education/concepts/entanglement
10. QuantumXC. (n.d.). Quantum Cryptography, Explained. Retrieved from
https://quantumxc.com/blog/quantum-cryptography-explained/
11. National Institute of Standards and Technology (NIST). (2022). Post-Quantum
Cryptography Standardization. Retrieved from https://csrc.nist.gov/Projects/post-
quantum-cryptography
21