QUANTUM CRYPTOGRAPHY: THE
FUTURE OF SECURE
COMMUNICATION
NAME: RIVU SAHA
M.TECH FMD
25PH63R07
CONTENTS
• INTRODUCTION
• WHAT IS QUANTUM CRYPTOGRAPHY?
• WHY IS QUANTUM CRYPTOGRAPHY NEEDED?
• KEY APPLICATIONS OF QUANTUM CRYPTOGRAPHY
• HOW DOES QUANTUM KEY DISTRIBUTION (QKD) WORK?
• CHALLENGES FACING QUANTUM CRYPTOGRAPHY
• THE FUTURE: OUTLOOK FOR QUANTUM CRYPTOGRAPHY
INTRODUCTION
• Quantum cryptography leverages the principles of quantum
mechanics to create ultra-secure communication channels.
• With the rise of quantum computing, traditional encryption is at
risk—making quantum cryptography a critical area in
cybersecurity for 2025 and beyond.
• Objective: Explain quantum cryptography’s foundations,
applications, advances, challenges, and future direction.
WHAT IS QUANTUM
CRYPTOGRAPHY?
• Uses quantum mechanics to exchange secure
encryption keys between parties.
• Any interception attempt disturbs the
system, enabling detection of
eavesdroppers (no-cloning theorem, wave
function collapse).
•Quantum Superposition and Entanglement:
Allow unique features like key integrity
checking and instant detection of tampering.
WHY IS QUANTUM
CRYPTOGRAPHY NEEDED?
• Quantum computers are rapidly evolving soon,
they could break widely-used classical encryption
(RSA, ECC).
•Harvest Now, Decrypt Later: Attackers can store
encrypted data now and decrypt it in the future
when quantum technology matures.
• Quantum Cryptography counters these risks,
offering security based on immutable physical
laws, not complex math problems.
KEY APPLICATIONS
Application Area Description & Benefit
Government, military, and diplomatic data
Secure Communications
protected via QKD
Secures online banking, digital payments, and
Financial Services
stocks
Major telecoms are trialing QKD for robust data
Telecommunications
transmission
Ensures privacy of medical records and
Healthcare
telehealth sessions
Shields infrastructure and connected devices
Smart Grids & IoT
from cyber-attacks
HOW DOES QUANTUM KEY DISTRIBUTION(QKD) WORK?
• QKD Basics:
• Two parties (Alice & Bob) exchange keys using photons.
• If an eavesdropper tries to intercept, the photon’s quantum state changes, alerting
both parties.
• Real World Examples:
• SK Telecom & Samsung: Quantum-secure smartphones.
• Verizon: QKD network trial in Washington, D.C.
• Hyundai: Safeguarding defense blueprints with quantum channels.
CHALLENGES FACING QUANTUM
CRYPTOGRAPHY
• Distance Limitation: QKD struggles over very long
distances due to photon loss and quantum state fragility—
necessitates quantum repeaters and satellites.
• Cost and Infrastructure: High equipment costs and need
for new quantum networks, unlike reusing existing
telecom lines.
• Quantum Noise & Error Rates: Environmental
disturbances can cause errors in quantum channels,
necessitating advanced error correction.
• Operational Hurdles: Integration into current IT systems
and managing larger key sizes increases complexity and
resource use.
• Standardization & Agility: Organizations need "crypto-
agile" systems to adapt swiftly as quantum-resistant
standards evolve.
THE FUTURE: OUTLOOK
• Quantum Internet: Networks of quantum-enabled nodes for global secure
communication.
• Quantum Random Number Generation (QRNG): Delivers truly random keys for
highest-grade encryption.
• Secure transmission for smart cities, healthcare, transportation, and more.
• Ongoing research and rapid standardization suggest quantum cryptography will
become mainstream as quantum threats increase.
THANK YOU