Quantum technology challenges existing security paradigms, but also holds the key to protection from quantum threats. Utilizing Quantum Secure Communication protocols, quantum networks can ensure the confidentiality and integrity of information exchange, providing a level of security that is fundamentally based on the laws of physics and secure against computational advancements - including those expected from quantum computing.
Join Bruno Rijsman, Aliro Fellow, for an overview of protocols used in quantum secure communications (QSC), as well as the fundamental approaches to post-quantum security. In this webinar you will learn:
- The difference between discrete variable versus continuous variable protocols.
- The difference between prepare-and-measure versus entanglement-based protocols, leading to the concept of quantum secure communications (QSC).
- Concrete examples of protocols such as BB84, E91, BBM92, and MDI.
- Side-channel attacks against real-world implementations and mitigation techniques.
- Existing standards and areas where standards are currently missing.
Organizations who are preparing their businesses, security posture, and connectivity for the quantum age are investigating how to plan, design, and implement quantum networking solutions today. This webinar will help prepare you to navigate the quantum future.