YoVDO

Hacking Quantum Key Distribution Hardware

Offered By: Hackaday via YouTube

Tags

Quantum Key Distribution Courses Cybersecurity Courses Quantum Computing Courses Hardware Hacking Courses

Course Description

Overview

Explore quantum key distribution hardware vulnerabilities in this 24-minute Hackaday conference talk. Delve into the world of quantum devices and their potential security risks as Dr. Sarah Kaiser shares her successful attempts to breach quantum key distribution systems using powerful lasers. Learn about key exchange, the BB84 protocol, random link generation, and potential countermeasures. Gain insights into the characterization process and the implications for the future of quantum computing security.

Syllabus

Intro
Welcome
Key Exchange
Quantum Key Distribution
BB84
Random Link
Countermeasures
Lasers
Characterization


Taught by

HACKADAY

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network