Hacking Quantum Key Distribution Hardware
Offered By: Hackaday via YouTube
Course Description
Overview
Explore quantum key distribution hardware vulnerabilities in this 24-minute Hackaday conference talk. Delve into the world of quantum devices and their potential security risks as Dr. Sarah Kaiser shares her successful attempts to breach quantum key distribution systems using powerful lasers. Learn about key exchange, the BB84 protocol, random link generation, and potential countermeasures. Gain insights into the characterization process and the implications for the future of quantum computing security.
Syllabus
Intro
Welcome
Key Exchange
Quantum Key Distribution
BB84
Random Link
Countermeasures
Lasers
Characterization
Taught by
HACKADAY
Related Courses
Quantum Information Science I, Part 3Massachusetts Institute of Technology via edX Физические основы квантовой информатики
National Research Nuclear University MEPhI via edX Основы квантовой криптографии
National Research Nuclear University MEPhI via edX Cryptography: Boolean functions and related problems
Novosibirsk State University via Coursera Quantum Networking
Purdue University via edX