QKD represents a revolutionary leap in secure communication, grounded in the principles of quantum mechanics. The process unfolds through four distinct stages: State Preparation, Transmission, Measurement, and Post-Processing. Each stage embodies the elegance of quantum theory while contributing to the creation of a shared, secret cryptographic key.
1. State Preparation
At the heart of QKD lies the preparation of quantum states, which serve as carriers of information. A sender, typically referred to as Alice, encodes bits of information onto quantum states such as polarized photons or weak laser pulses. Sometimes, these states are simply referred to as "qubits". For example, in the widely used BB84 protocol [ https://en.wikipedia.org/wiki/BB84 ], Alice prepares photons in one of four polarization states: horizontal, vertical, diagonal, or anti-diagonal. These states correspond to binary values (0 & 1), with the choice of basis (rectilinear or diagonal) adding an additional layer of unpredictability.
The principle of quantum superposition ensures that these states cannot be perfectly copied or predicted without direct interaction, forming the foundation for QKD's security [https://www.youtube.com/watch?v=2kdRuqvIaww&ab_channel=QuantumVisions, https://www.youtube.com/watch?v=LaLzshIosDk&ab_channel=CentreforQuantumTechnologies ].
2. Transmission
Once the quantum states are prepared, they are transmitted through a quantum channel, typically an optical fiber or free-space link. The delicate nature of quantum states means that they are highly susceptible to external disturbances, such as photon loss or environmental noise. This fragility is not a flaw but a security feature: any eavesdropping attempt by an adversary, typically named "Eve", would inevitably disturb the quantum states due to the no-cloning theorem and Heisenberg's [ https://en.wikipedia.org/wiki/No-cloning_theorem ] uncertainty principle [ https://www.youtube.com/watch?v=TQKELOE9eY4&ab_channel=TED-Ed ].
This intrinsic sensitivity transforms the transmission phase into a sentinel, alerting Alice and the receiver, Bob, to any interception attempts.
3. Measurement
Upon receiving the transmitted quantum states, Bob measures them using a randomly chosen basis—either matching or differing from Alice's preparation basis. The measurement collapses the quantum states into definite classical values, aligning with the probabilistic nature of quantum mechanics.
In cases where Bob's basis matches Alice's, the measurement yields correct results. Conversely, mismatched bases introduce randomness, which is later filtered out during the post-processing phase. The security of this stage lies in the fact that any eavesdropping attempt introduces detectable errors which are then identified during the post-processing, ensuring the integrity of the communication channel.
4. Post-Processing
The final stage, post-processing, converts raw quantum data into a usable cryptographic key. Both Alice and Bob publicly compare subsets of their data to identify matching bases, discarding results from mismatched bases. This process, called sifting, yields a shared key candidate known as the "sifted key." It also lets Alice and Bob detect the potential presence of an attacker.
To address potential errors caused by noise or eavesdropping, error-correction protocols, such as Cascade, are employed to reconcile discrepancies between Alice's and Bob's sifted keys. Following this, privacy amplification techniques reduce any information that Eve might have intercepted, producing a final key with enhanced security.
The result of post-processing is a shared, identical cryptographic key that is ready for use in encrypting and decrypting sensitive information.
back: about QKD next: Technical aspect of QKD