Quantum Secure Communication
Provided by QA
Overview
As the field of quantum communication continues to evolve and advance, there is a growing need for professionals with the knowledge and skills to tackle the complex challenges and opportunities it presents.
The course covers the fundamental concepts of quantum communication, including the properties of qubits and quantum registers, the manipulation of quantum states through quantum gates, and the principles and implementations of quantum key distribution.
Additionally, the course delves into various quantum communication protocols and their respective approaches, and the security challenges in quantum communication, such as attacks against quantum key distribution protocols, and the potential applications and future developments of a quantum internet.
Topics covered in the course;
Prerequisites
Fundamental knowledge of quantum computing.
+
Delegates will learn how to
You will;
Outline
Day 1
What is quantum communication about?
Qubit and quantum register
How to prepare a superposition?
Quantum key distribution over optical fiber
Non idealistic channels
As the field of quantum communication continues to evolve and advance, there is a growing need for professionals with the knowledge and skills to tackle the complex challenges and opportunities it presents.
The course covers the fundamental concepts of quantum communication, including the properties of qubits and quantum registers, the manipulation of quantum states through quantum gates, and the principles and implementations of quantum key distribution.
Additionally, the course delves into various quantum communication protocols and their respective approaches, and the security challenges in quantum communication, such as attacks against quantum key distribution protocols, and the potential applications and future developments of a quantum internet.
Topics covered in the course;
- Introduction to quantum communication
- Qubit and quantum register
- Quantum gates
- Quantum key distribution
- Quantum communication protocols
- Quantum key distribution approaches
- Attacks against QKD protocols
- Quantum internet
Prerequisites
Fundamental knowledge of quantum computing.
+
Delegates will learn how to
You will;
- Be able to apply their knowledge of quantum key distribution
- Be equipped to utilise key distribution protocols
- Be able to comply with existing quantum communication standards and secure quantum networking
- Be able to explain active & passive quantum security attacks
- Be able to explain physical attacks on quantum key distribution protocols
Outline
Day 1
What is quantum communication about?
Qubit and quantum register
- Four postulates
How to prepare a superposition?
- Preparing an arbitrary quantum state
- No Cloning Theorem - Proof
- Decomposition exercise
- Entangled states
- Difference between product and entangled states
- What does entanglement mean?
- Famous entanglement pairs
- How to produce entangled pairs?
- Changing the bases of an entangled pair
- CNOT gate
- Bell state generator
- Generalized quantum entangler
- How to create entangled qubits physically? - An example
- Physical qubits
- Di Vincenzo criteria
- Superconducting qubits
- Trapped ions
- Photonic qubits
Quantum key distribution over optical fiber
- From theory to the real world
- Protocol stack of QKD
- Quantum Communication - the players
- Superdense coding
- Teleportation
- Superdense coding and Teleportation
- Medium Access Control in distributed environment - quantum WIFI
- Quantum WIFI - MAC
- Quantum MAC - JOIN
- Quantum MAC - LEAVE
- Quantum MAC - TRANSFER
- Quantum MAC - generalization
- Rebalacing
- Quantum periodic table
- Decomposition exercise
- Introduction to density matrix formalism
- Calculation of density matrices
- Mixed states
- Geometrical representation
- Are density matrices unique?
- Partial trace
- Postulates with density matrices
- Teleportation
- State vs. density matrix formalisms
- Problem formulation
- Symmetric Keys
- Symmetric Keys - problems and solutions
- Asymmetric Key System
- Problem formulation
- Problem formulation - Quantum Key Distribution
- Two types of QKD
- In real life, quantum channel is not ideal
- BB84, the first QKD protocol
- SARG04 protocols
- B92 protocol
- Entanglement based QKD
- E91 protocol
- Passive attack
- Active attack
- Attack types
- Denial of service attack
- Man-in-the-middle attack
Non idealistic channels
- Why realistic quantum channels are important?
- General model of communication
- AWGN
- Channel capacity
- A suprising example
- Various quantum capacities
- Basic quantum channel models
- Effects in real fibers
- Chicago Quantum Exchange
- Chinese Quantum Network: More than 4600 kilometers
- UK Quantum Communications Hub
- EuroQCI
- Companies: ID Quantique
- Companies: MagiQ
- Companies: Quintessence Labs
- High level overview
- Physical realization
- Why to use free-space instead of fiber-based solution?
- Quantum signals on free-space channels
- There are equations behind everything
- But this is what is important
- Prepare-and-measure QKD -advantages
- Prepare-and-measure QKD -disadvantages
- Entanglement-based QKD -advantages
- Entanglement-based QKD -disadvantages
- Intercept and resend
- Faked states attack
- Photon number splitting attack
- Trojan Horse Attack (Light Injection Attack)
- Using a beam splitter
- Scenarios for satellite based quantum communicatoins
- How to use an entanglement-based satellite system?
- Quantum Experiments at Space Scale (QUESS)
- Singapore;s mission in 2019
- SpooQy 1
- European answer: SAGA
- A draft concept of the European SAGA system
- Timeline for the SpaceQCI (from European Comission)
- Timeline for the SAGA mission (from ESA)
- Security threats to a satellite QKD system
- Stages to achieve a global quantum internet
- Challenges
- Entanglement swapping
- Entanglement swapping - remarks
- Routing
- Working on standards
- Working on quantum communications standards
- ETSI Quantum-Safe Cryptography (QSC) working group
- ETSI - Quantum-Safe Cryptography (QSC)
- ETSI Industry Specification Group (ISG)
- ETSI QKD
- ETSI Standards - An example
- IETF QIRG - Standards for quantum internet
- IETF QIRG - Two dradts
- Technical study: implementing CV-QKD system
- Technical study: implementing quantum random number generator (QRNG)
- A Hungarian QRNG system
- Future's satellite system
- QKD and autonomous vehicles
- QKD and 5G
Enquire
Start date | Location / delivery | |
---|---|---|
No fixed date | United Kingdom | Book now |
01132207150
01132207150