Quantum and Post-Quantum Cryptography

green laser beam intersecting a beamsplitter

Secure communication is currently achieved with schemes that rely on security through computational complexity. The invention of quantum processors necessitates the development of new cryptographic schemes to protect against quantum decryption. Some of these schemes are classical and rely on post-quantum complexity assumptions. Alternative schemes are quantum and rely on the laws of physics - a quantum state cannot be copied, and in some settings cannot be measured without the sender and receiver detecting the eavesdropper. 

Related Faculty