{"id":271,"date":"2022-11-28T19:46:37","date_gmt":"2022-11-28T19:46:37","guid":{"rendered":"http:\/\/learnlearn.uk\/ibcs\/?page_id=271"},"modified":"2022-11-28T19:46:37","modified_gmt":"2022-11-28T19:46:37","slug":"quantum-cryptography","status":"publish","type":"page","link":"https:\/\/learnlearn.uk\/ibcs\/quantum-cryptography\/","title":{"rendered":"Quantum Cryptography"},"content":{"rendered":"<div class=\"responsive-tabs\">\n<h2 class=\"tabtitle\">Introduction<\/h2>\n<div class=\"tabcontent\">\n\n<h3><strong>How it works<\/strong><\/h3>\n<div class=\"nv-iframe-embed\">\n<div class=\"container-lazyload preview-lazyload container-youtube js-lazyload--not-loaded\"><a href=\"https:\/\/www.youtube.com\/watch?v=uiiaAJ3c6dM\" class=\"lazy-load-youtube preview-lazyload preview-youtube\" data-video-title=\"Quantum Cryptography in 6 Minutes\" title=\"Play video &quot;Quantum Cryptography in 6 Minutes&quot;\">https:\/\/www.youtube.com\/watch?v=uiiaAJ3c6dM<\/a><noscript>Video can&#8217;t be loaded because JavaScript is disabled: <a href=\"https:\/\/www.youtube.com\/watch?v=uiiaAJ3c6dM\" title=\"Quantum Cryptography in 6 Minutes\">Quantum Cryptography in 6 Minutes (https:\/\/www.youtube.com\/watch?v=uiiaAJ3c6dM)<\/a><\/noscript><\/div>\n<\/div>\n<div class=\"nv-iframe-embed\">\n<div class=\"container-lazyload preview-lazyload container-youtube js-lazyload--not-loaded\"><a href=\"https:\/\/www.youtube.com\/watch?v=fLJ9mvTS68Y\" class=\"lazy-load-youtube preview-lazyload preview-youtube\" data-video-title=\"What is Quantum Cryptography?\" title=\"Play video &quot;What is Quantum Cryptography?&quot;\">https:\/\/www.youtube.com\/watch?v=fLJ9mvTS68Y<\/a><noscript>Video can&#8217;t be loaded because JavaScript is disabled: <a href=\"https:\/\/www.youtube.com\/watch?v=fLJ9mvTS68Y\" title=\"What is Quantum Cryptography?\">What is Quantum Cryptography? (https:\/\/www.youtube.com\/watch?v=fLJ9mvTS68Y)<\/a><\/noscript><\/div>\n<\/div>\n\n<\/div><h2 class=\"tabtitle\">Advantages<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Advantages of Quantum Cryptography<\/h3>\n<ul>\n<li>Quantum Cryptography has the potential to minimize the risks to encryption posed by every increasing computer power and quantum computing.<\/li>\n<li>It allows secure communication to continue even when standard encryption is no longer regarded as secure.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n\n<\/div><h2 class=\"tabtitle\">Disadvantages<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Drawbacks \/ limitations of Quantum Cryptography<\/h3>\n<ul>\n<li>Quantum cryptography is currently prohibitively expensive for most potential use cases.<\/li>\n<li>At present quantum cryptography has a limited range (200km for fiber optic connections). This means that for distances further than 200km relays would have to be used and therefore open the system up to an attack vector that would allow a <strong>man-in-the-middle attack.<\/strong><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n\n<\/div><h2 class=\"tabtitle\">Applications<\/h2>\n<div class=\"tabcontent\">\n\n<p><strong>Applications of Quantum Cryptography<\/strong><\/p>\n<p>Currently due the cost and logistical issues quantum cryptography is most limited in application to military or high-level government communication, as can be seen in the Chinese government&#8217;s deployment in Beijing and else.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>How it works https:\/\/www.youtube.com\/watch?v=uiiaAJ3c6dMVideo can&#8217;t be loaded because JavaScript is disabled: Quantum Cryptography in 6 Minutes (https:\/\/www.youtube.com\/watch?v=uiiaAJ3c6dM) https:\/\/www.youtube.com\/watch?v=fLJ9mvTS68YVideo can&#8217;t be loaded because JavaScript is disabled: What is Quantum Cryptography? (https:\/\/www.youtube.com\/watch?v=fLJ9mvTS68Y) Advantages of Quantum Cryptography Quantum Cryptography has the potential to minimize the risks to encryption posed by every increasing computer power and quantum computing. It&hellip;&nbsp;<a href=\"https:\/\/learnlearn.uk\/ibcs\/quantum-cryptography\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Quantum Cryptography<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":70,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Quantum Cryptography - IB Computer Science<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/learnlearn.uk\/ibcs\/quantum-cryptography\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Quantum Cryptography - IB Computer Science\" \/>\n<meta property=\"og:description\" content=\"How it works https:\/\/www.youtube.com\/watch?v=uiiaAJ3c6dMVideo can&#8217;t be loaded because JavaScript is disabled: Quantum Cryptography in 6 Minutes (https:\/\/www.youtube.com\/watch?v=uiiaAJ3c6dM) https:\/\/www.youtube.com\/watch?v=fLJ9mvTS68YVideo can&#8217;t be loaded because JavaScript is disabled: What is Quantum Cryptography? (https:\/\/www.youtube.com\/watch?v=fLJ9mvTS68Y) Advantages of Quantum Cryptography Quantum Cryptography has the potential to minimize the risks to encryption posed by every increasing computer power and quantum computing. It&hellip;&nbsp;Read More &raquo;Quantum Cryptography\" \/>\n<meta property=\"og:url\" content=\"https:\/\/learnlearn.uk\/ibcs\/quantum-cryptography\/\" \/>\n<meta property=\"og:site_name\" content=\"IB Computer Science\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/learnlearn.uk\/ibcs\/quantum-cryptography\/\",\"url\":\"https:\/\/learnlearn.uk\/ibcs\/quantum-cryptography\/\",\"name\":\"Quantum Cryptography - IB Computer Science\",\"isPartOf\":{\"@id\":\"https:\/\/learnlearn.uk\/ibcs\/#website\"},\"datePublished\":\"2022-11-28T19:46:37+00:00\",\"dateModified\":\"2022-11-28T19:46:37+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/learnlearn.uk\/ibcs\/quantum-cryptography\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/learnlearn.uk\/ibcs\/quantum-cryptography\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/learnlearn.uk\/ibcs\/quantum-cryptography\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"IB Computer Science\",\"item\":\"https:\/\/learnlearn.uk\/ibcs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Quantum Cryptography\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/learnlearn.uk\/ibcs\/#website\",\"url\":\"https:\/\/learnlearn.uk\/ibcs\/\",\"name\":\"IB Computer Science\",\"description\":\"- learnlearn..uk\",\"publisher\":{\"@id\":\"https:\/\/learnlearn.uk\/ibcs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/learnlearn.uk\/ibcs\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/learnlearn.uk\/ibcs\/#organization\",\"name\":\"IB Computer Science\",\"url\":\"https:\/\/learnlearn.uk\/ibcs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/learnlearn.uk\/ibcs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2022\/09\/LearnLearnLogowhite-300x41.png\",\"contentUrl\":\"https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2022\/09\/LearnLearnLogowhite-300x41.png\",\"width\":300,\"height\":41,\"caption\":\"IB Computer Science\"},\"image\":{\"@id\":\"https:\/\/learnlearn.uk\/ibcs\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Quantum Cryptography - IB Computer Science","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/learnlearn.uk\/ibcs\/quantum-cryptography\/","og_locale":"en_GB","og_type":"article","og_title":"Quantum Cryptography - IB Computer Science","og_description":"How it works https:\/\/www.youtube.com\/watch?v=uiiaAJ3c6dMVideo can&#8217;t be loaded because JavaScript is disabled: Quantum Cryptography in 6 Minutes (https:\/\/www.youtube.com\/watch?v=uiiaAJ3c6dM) https:\/\/www.youtube.com\/watch?v=fLJ9mvTS68YVideo can&#8217;t be loaded because JavaScript is disabled: What is Quantum Cryptography? (https:\/\/www.youtube.com\/watch?v=fLJ9mvTS68Y) Advantages of Quantum Cryptography Quantum Cryptography has the potential to minimize the risks to encryption posed by every increasing computer power and quantum computing. It&hellip;&nbsp;Read More &raquo;Quantum Cryptography","og_url":"https:\/\/learnlearn.uk\/ibcs\/quantum-cryptography\/","og_site_name":"IB Computer Science","twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/learnlearn.uk\/ibcs\/quantum-cryptography\/","url":"https:\/\/learnlearn.uk\/ibcs\/quantum-cryptography\/","name":"Quantum Cryptography - IB Computer Science","isPartOf":{"@id":"https:\/\/learnlearn.uk\/ibcs\/#website"},"datePublished":"2022-11-28T19:46:37+00:00","dateModified":"2022-11-28T19:46:37+00:00","breadcrumb":{"@id":"https:\/\/learnlearn.uk\/ibcs\/quantum-cryptography\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/learnlearn.uk\/ibcs\/quantum-cryptography\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/learnlearn.uk\/ibcs\/quantum-cryptography\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"IB Computer Science","item":"https:\/\/learnlearn.uk\/ibcs\/"},{"@type":"ListItem","position":2,"name":"Quantum Cryptography"}]},{"@type":"WebSite","@id":"https:\/\/learnlearn.uk\/ibcs\/#website","url":"https:\/\/learnlearn.uk\/ibcs\/","name":"IB Computer Science","description":"- learnlearn..uk","publisher":{"@id":"https:\/\/learnlearn.uk\/ibcs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/learnlearn.uk\/ibcs\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/learnlearn.uk\/ibcs\/#organization","name":"IB Computer Science","url":"https:\/\/learnlearn.uk\/ibcs\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/learnlearn.uk\/ibcs\/#\/schema\/logo\/image\/","url":"https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2022\/09\/LearnLearnLogowhite-300x41.png","contentUrl":"https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2022\/09\/LearnLearnLogowhite-300x41.png","width":300,"height":41,"caption":"IB Computer Science"},"image":{"@id":"https:\/\/learnlearn.uk\/ibcs\/#\/schema\/logo\/image\/"}}]}},"rttpg_featured_image_url":null,"rttpg_author":{"display_name":"learnlearnadmin","author_link":"https:\/\/learnlearn.uk\/ibcs\/author\/learnlearnadmin\/"},"rttpg_comment":0,"rttpg_category":null,"rttpg_excerpt":"How it works https:\/\/www.youtube.com\/watch?v=uiiaAJ3c6dMVideo can&#8217;t be loaded because JavaScript is disabled: Quantum Cryptography in 6 Minutes (https:\/\/www.youtube.com\/watch?v=uiiaAJ3c6dM) https:\/\/www.youtube.com\/watch?v=fLJ9mvTS68YVideo can&#8217;t be loaded because JavaScript is disabled: What is Quantum Cryptography? (https:\/\/www.youtube.com\/watch?v=fLJ9mvTS68Y) Advantages of Quantum Cryptography Quantum Cryptography has the potential to minimize the risks to encryption posed by every increasing computer power and quantum computing. It&hellip;&nbsp;Read&hellip;","_links":{"self":[{"href":"https:\/\/learnlearn.uk\/ibcs\/wp-json\/wp\/v2\/pages\/271"}],"collection":[{"href":"https:\/\/learnlearn.uk\/ibcs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/learnlearn.uk\/ibcs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/learnlearn.uk\/ibcs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/learnlearn.uk\/ibcs\/wp-json\/wp\/v2\/comments?post=271"}],"version-history":[{"count":1,"href":"https:\/\/learnlearn.uk\/ibcs\/wp-json\/wp\/v2\/pages\/271\/revisions"}],"predecessor-version":[{"id":272,"href":"https:\/\/learnlearn.uk\/ibcs\/wp-json\/wp\/v2\/pages\/271\/revisions\/272"}],"wp:attachment":[{"href":"https:\/\/learnlearn.uk\/ibcs\/wp-json\/wp\/v2\/media?parent=271"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}