Quantum Key Distribution: Difference between revisions

Jump to navigation Jump to search
No edit summary
Line 8: Line 8:
== Use Cases ==
== Use Cases ==
* Can replace Diffie-Hellman key agreement protocols. For example in TLS, SSL, IPsec, etc.
* Can replace Diffie-Hellman key agreement protocols. For example in TLS, SSL, IPsec, etc.
* If secure key rate are sufficiently high, one can use QKD for information theoretically secure authenticated encryption scheme, e.g. One-time pad together with the authentication scheme presented in [[Quantum Key Distribution #References|[1] ]].
* If secure key rate is sufficiently high, one can use QKD for information theoretically secure authenticated encryption scheme, e.g. using one-time pad together with an authentication scheme like those presented in [[Quantum Key Distribution #References|[1] ]].


==Protocols==
==Protocols==