- Published: November 2002
Quantum Cryptography: Potentially Perfect Security
- Technology Research News
This report examines the current state of quantum cryptography, organizes key issues and puts them in context, and succinctly explains how the technology works.
Quantum cryptography uses traits of individual photons to distribute random mathematical keys that can be used to encrypt and decrypt communications, providing theoretically perfect security. Rudimentary commercial systems are available now, and the first-generation systems make it possible to establish secure communications between two points in metropolitan areas.
The report includes an executive summary, a list of 16 developments to look for as this cutting-edge technology takes shape, and a section of 25 researchers to watch, including links to their Web pages. It also includes a quick tour of 21 recent developments in six areas and a section of 15 in-depth news stories from TRN.
The stories are organized into six categories: quantum cryptography systems, single-photon sources, photon detectors, quantum repeaters, entangled photons and advances in related technologies.
<P>How It Works</P>
<P>Main Report Topics<BR>· Real-world ready?<BR>· The first generation<BR>· What it's good for<BR>· Going the distance<BR>· Quantum networks<BR>· Making perfect perfect<BR>· What's really needed</P>
<P>How It Works Topics:<BR>· Single-photon quantum key distribution</P>
|Electronic||The report will be emailed to you.|