This document provides an introduction to quantum cryptography and the BB84 protocol. It explains that quantum cryptography can be used to distribute encryption keys with perfect secrecy by exploiting properties of quantum mechanics. The BB84 protocol is described, including how Alice and Bob can detect eavesdropping by Eve during key exchange by comparing measurements of test bits sent in random polarization bases. Current research at Warwick on formally specifying and verifying quantum cryptography protocols is also mentioned.