Hacking Quantum Key Distribution Hardware
Offered By: Hackaday via YouTube
Course Description
Overview
Explore quantum key distribution hardware vulnerabilities in this 24-minute Hackaday conference talk. Delve into the world of quantum devices and their potential security risks as Dr. Sarah Kaiser shares her successful attempts to breach quantum key distribution systems using powerful lasers. Learn about key exchange, the BB84 protocol, random link generation, and potential countermeasures. Gain insights into the characterization process and the implications for the future of quantum computing security.
Syllabus
Intro
Welcome
Key Exchange
Quantum Key Distribution
BB84
Random Link
Countermeasures
Lasers
Characterization
Taught by
HACKADAY
Related Courses
Intro to Computer ScienceUniversity of Virginia via Udacity Quantum Mechanics for IT/NT/BT
Korea University via Open Education by Blackboard Emergent Phenomena in Science and Everyday Life
University of California, Irvine via Coursera Quantum Information and Computing
Indian Institute of Technology Bombay via Swayam Quantum Computing
Indian Institute of Technology Kanpur via Swayam