In this chapter we’ll continue on the emerging science of quantum key distribution (QKD). This is a key technology and will undoubtedly play a big part in many a person’s life in the near future. The concepts introduced in the last chapter will be greatly expanded upon, including the hardware side of things. But first, we’ll cover various types of QKD-focused cryptographic attacks as these unfortunately will be an issue.
Breaking QKD
Although representative of the next generation of computing, QKD is not impervious to malicious activities. Some of these ...