2. Introduction
• The digital era demands robust security for °
sensitive data.Traditional
• cryptography is threatened by advances in
quantum computing
•Quantum cryptography offers a fundamentally
secure alternative
3. Abstract
This project focuses on using Quantum Key
Distribution (QKD) for secure communication.
Unlike traditional cryptography, quantum
cryptography relies on quantum mechanics,
making it highly secure. Using Qiskit, the project
simulates the BB84 protocol to show how
quantum states can securely exchange
encryption keys.
4. Key principle of quantum
cryptography
• Superposition: Quantum bits (qubits) exist in
multiple states simultaneously. • Entanglement:
Linked particles instantly affect each other,
regardless of distance. • No-Cloning Theorem:
Quantum information cannot be copied without
detection.
5. Quantum key distribution (QKD)
• Quantum Key Distribution
(QKD)Allows two parties to generate a
shared secret key,
• Most common protocol: BB84.
• Any eavesdropping attempt disturbs
the system and is detectable
6. Working
(BB84 PROTOCOL)
How QKD Works (BB84 Protocol) Sender (Alice)
encodes bits in photon polarization. Receiver
(Bob) measures photons using random bases.
Alice and Bob compare bases over a public
channel. Matching results form the secret key;
mismatches are discarded. Eavesdropping
introduces detectable errors.
7. Advantage of quantum
cryptography
• Security: Based on physical laws.
• Detection: Any interception is immediately
noticeable.
• Resistant to quantum computer attacks
8. Challenges and limitations
• High implementation costs.Limited
transmission distance (attenuation in
optical fibers)
• .Integration with existing
communication infrastructure.
• transmission distance (attenuation in
optical fibers).
• Integration with existing
communication infrastructure
• Requires specialized hardwareRequires
specialized hardwar.
9. Real world application
•Secure government and military
communications.
•Financial transactions and banking
.
•Healthcare data protection.
•Quantum networks and the quantum
internet.
10. •Ongoing research to extend range
and reduce costs.
•Development of quantum
repeaters and satellite QKD.
•Integration with classical networks
for hybrid security solutions.
•Combine with post quantum
cryptography.
Future
prospects
11. Conclusions
Quantum cryptography is a promising
solution for secure
communication.Overcomes
vulnerabilities of classical encryption.Key
to safeguarding data in the quantum
computing era.
Refrence
Computer Fraud & Security Journal.
(2024).Bennett University Blog.
(2024).SlideServe Quantum Cryptography
PPT. (2025).IJRCAIT Journal Article.
(2024).Quantum Communications Hub.
(2025).
12. CREDITS: This presentation template was created by Slidesgo,
and includes icons, infographics & images by Freepik
Thank you!
Do you have any questions?