From the course: Quantum Networking by Pearson

Unlock this course with a free trial

Join today to access over 25,500 courses taught by industry experts.

Comparing QKD protocols

Comparing QKD protocols

Now, this is one of our briefer lessons, because all we're going to do is kind of give you a summary of what we've talked about in the previous lessons where we've looked at everything from BB84 to CAL, SYN, NOT, SYN, and many others. Let's give you an overview, a comparison. Now this chart is a really nice one to start looking at some of the mainstream protocols, the more exotic ones we talked about in Lesson 5. It tells you specifically how the security is done. How do we get the photons? What do we know about detector security? So for example BB84 is vulnerable to side-channel attacks. MDI QKD, as we discussed, fully removes the measurement device trust. What is the finite key security. We can see the T12 has tight finite size bounds. E91 is difficult due to entanglement. And SNS, send not send, quantum key distribution, it does support this. We also compare the security. We compare the distance, what algorithms or what protocols work best at long distance. You can see the send not…

Contents