DEV Community

bhagvan kommadi
bhagvan kommadi

Posted on

QKD as a service

QKD as a service is based on key agreement protocols, McEliece Cryptosystem, and encrypted OTP. Quantum key distribution algorithms will be quantum-resistant. Quantum Key distribution as a service will cater to multiple users and generate keys in parallel. Quantum key distribution signals can be generated simultaneously and sent using an optical channel. This is using the key management service pattern which is available in Google, Amazon, and Microsoft cloud. The key states are managed through the key management services. The states are generated, used, rotated, and destroyed. QKD as a service helps in avoiding attacks and errors. Qubits cannot be replicated because of the law of physics. The secret key is not saved in the Quantum key distribution data stores. The key security is improved because of not saving the quantum keys.

Quantum keys are based on the photon properties for sharing bits between source and destination. The quantum information is used for the generation of the keys. The interception of the key is identified as there is a change in the quantum state. The keys which are corrupted will be rejected. The randomness of the keys will be real and hackproof.

Many countries are doing research into developing post-quantum public key cryptography to tackle and defend real-world communications systems from the threat of a future quantum computer
The limitations of the existing QKD systems are because of the short effective range of transmission, and the fact that BB84* and similar proposals are fundamentally point-to-point protocols . Some of them are trying to integrating QKDwith classical network devices. This approach invalidates any claimed guarantee of security. Since this is based on the laws of quantum mechanics, and creates an array of new concerns about the security properties of the ancillary network devices.

The the hardware-based approach is expensive for maintenance. The software can be patched remotely and at a lesser cost. The software can be replaced when it degrades and vulnerabilities are discovered. We are creating a device-independent QKD which will be a key differentiator in the QKD market space. We plan to constantly work on adding features to tackle quantum resistance. We are working on making QKD handle Denial of Service attacks that are not supported by other QKD systems.

Top comments (0)