|
|
Updated October 2004
Quantum
Cryptography: Potentially Perfect Security
25
pages
This
report examines the current state of quantum cryptography, organizes
key issues and puts them in context, and succinctly explains how
the technology works.
Quantum cryptography uses traits of individual photons to distribute
random mathematical keys that can be used to encrypt and decrypt
communications, providing theoretically perfect security. Rudimentary
commercial systems are available now, and the first-generation systems
make it possible to establish secure communications between two
points in metropolitan areas.
The report includes an executive summary, a list of 16 developments
to look for as this cutting-edge technology takes shape, and a section
of 25 researchers to watch, including links to their Web pages.
It also includes a quick tour of 21 recent developments in six areas
and a section of 15 in-depth news stories from TRN.
The stories are organized into six categories: quantum cryptography
systems, single-photon sources, photon detectors, quantum repeaters,
entangled photons and advances in related technologies.
|
TRN's
Making the Future reports contain live links, and can
be read on a computer, printed and archived.
Buy the
the Quantum Cryptography
report for $89.
.
You will receive download instructions via
email.
|
Report
Sections
|
Executive
Summary:
260
words
Main Report:
2,160
words
How It Works:
550
words
In-Depth Stories:
15
stories, including 3 images
|
|
Table of Contents:
Main Report
Real-world
ready?
The first generation
What it's good for
Going the distance
Quantum networks
Making perfect perfect
What's really needed
|
How It Works
Single-photon
quantum key distribution
In-Depth Story Categories
Quantum
cryptography systems
Single-photon sources
Photon detectors
Quantum repeaters
Entangled photons
Advances in related technologies
|
Take
a look at all
available Making the Future reports.
View a four-page sample of the Making
the Future report (pdf).
|