10.7. Quantum cryptography

Besides the revolution in cryptography that has been wrought by public key cryptography we should also mention what could in time become the next major development, arguably even more profound than that of public-key cryptography. Various techniques have been proposed for using quantum mechanical effects in information security. By and large this are still restricted to laboratory experiments, but some are reaching the stage at which real use is in prospect.

Using properties of quantum mechanics, a number of schemes have been proposed to provide confidential communication, either directly by encrypting messages or indirectly by allowing secure key establishment, which can then be used with conventional cryptographic ...

Get The Modelling and Analysis of Security Protocols: the CSP Approach now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.