| ▲ | er4hn 6 hours ago | |||||||||||||||||||||||||||||||
This page came about because of how long it took PQC to get standardized. This was a slow enough process that a whole slew of QKD vendors arose and sold a lot of products promising this as a solution to dealing with quantum computers and harvest now decrypt later attacks. Many of those products did not do a great job at actually preventing listening in on their lines since QKD is an ongoing field of research where new issues are routinely being discovered. | ||||||||||||||||||||||||||||||||
| ▲ | amluto 6 hours ago | parent [-] | |||||||||||||||||||||||||||||||
> QKD is an ongoing field of research where new issues are routinely being discovered. This always bothers me a bit. QKD is on a very solid theoretical footing — if you have an authenticated classical communication channel and an actual quantum communication channel that sends actual qubits that are genuinely only in the basis you think they’re in, then it’s secure, full stop. It’s been proven for decades. But this is hard (hint: a commercially useful quantum computer does not exist yet), so people fudge it with optical techniques that approximate, poorly, what is needed. And the result is not secure. | ||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||