Abstract
This chapter investigates the security dynamics of Quantum Key Distribution (QKD) by contrasting it with classical security methods and examining the resilience of QKD against various theoretical and practical threats. Initially, it highlights the vulnerabilities of traditional cryptographic systems to quantum computing, noting the potential of quantum algorithms like Shor's to compromise widely used encryption standards such as RSA and Elliptic Curve Cryptography (ECC). It then introduces quantum security techniques, emphasizing QKD's foundational reliance on quantum mechanics' principles—such as the uncertainty principle, the no-cloning theorem, and entanglement—to establish a security paradigm secure against both classical and quantum adversaries. The chapter provides a detailed analysis of common QKD protocols, evaluating their security mechanisms, resistance to eavesdropping, and practical implementation challenges. It discusses the operational principles underlying these protocols and assesses their potential in practical applications, given the current technological constraints and security requirements. Various attacks on QKD, including side-channel and eavesdropping attacks, are reviewed to outline the ongoing necessity for advanced security measures beyond theoretical guarantees. Further, the discussion extends to quantum-resistant algorithms and protocols, which are designed to withstand the power of quantum computers by leveraging problems deemed computationally hard for both classical and quantum systems. It elaborates on the infrastructural needs and challenges of implementing a quantum-resistant framework, critical for a secure transition into the quantum era. This chapter concludes by reflecting on the broader implications of integrating quantum security methodologies like QKD into modern cryptographic practices. It argues for the evolution of security strategies to address emerging risks effectively and explains the importance of continual advancements in quantum technologies and security protocols to safeguard data against the progressively sophisticated landscape of cyber threats.
| Original language | English |
|---|---|
| Title of host publication | Quantum Computing |
| Subtitle of host publication | A Journey into the Next Frontier of Information and Communication Security |
| Publisher | CRC Press |
| Pages | 118-131 |
| Number of pages | 14 |
| ISBN (Electronic) | 9781040272220 |
| ISBN (Print) | 9781032757049 |
| DOIs | |
| State | Published - 1 Jan 2024 |
Bibliographical note
Publisher Copyright:© 2025 selection and editorial matter, Mohammad Hammoudeh, Abdullah T. Alessa, Amro M. Sher- beeni, Clinton M. Firth, and Abdullah S. Alessa; individual chapters, the contributors.
ASJC Scopus subject areas
- General Computer Science
- General Mathematics