Write
262
edits
Line 8: | Line 8: | ||
== Use Cases == | == Use Cases == | ||
* QKD can replace Diffie-Hellman key agreement protocols. For example in TLS, SSL, IPsec, etc. | * QKD can replace Diffie-Hellman key agreement protocols. For example in TLS, SSL, IPsec, etc. | ||
* If secure key rate is sufficiently high, one can use QKD for information theoretically secure authenticated encryption scheme, e.g. using one-time pad together with an authentication scheme like those presented in [[Quantum Key Distribution #References|[1] ]]. | * If secure key rate is sufficiently high, one can use QKD to generate a secure key that will be used for information theoretically secure authenticated encryption scheme, e.g. using one-time pad together with an authentication scheme like those presented in [[Quantum Key Distribution #References|[1] ]]. | ||
==Protocols== | ==Protocols== |