QKD-Enhanced Cybersecurity Protocols

This technology uses Quantum Key Distribution (QKD) techniques in combination with other cryptographic techniques to create a cryptography solution that is resistant to attacks from future quantum computers, addresses shortcomings in QKD and traditional cryptographic solutions, and can be extended to work over larger distances than most quantum cryptography solutions.

Quantum computers are special type of computers with the potential to solve problems dramatically faster than the fastest traditional supercomputer. While this is generally a positive thing, it creates concerns for the future confidentially of data and network communications – it could create a world where encryption can be easily broken, because most standard encryption protocols rely on the difficulty of computations to make the encryption work.

To address these concerns, researchers are developing encryption techniques that can withstand attacks from any quantum computer that might exist in the future. There are two main approaches. The first uses quantum information (such as the state of photons of light), which is inherently resistant to snooping, to exchange encryption information. The second approach is to design new, stronger encryption standards that are expected to withstand quantum computers, but don’t make use of quantum information (so-called “post-quantum cryptography”).

This technology is designed to make use of both approaches, which allows for a secure encryption solution that overcomes the drawback inherent in either approach when used on its own.


  • Secure networking
  • Quantum cryptography
  • Post-quantum cryptography


  • Secure against advanced quantum computer attacks
  • Versatile: works with a variety of security protocols
  • Extendable / effective over larger distances



Contact Information

TTO Home Page: https://arizona.technologypublisher.com

Name: Brett Mortenson

Title: Licensing Manager, College of Engineering

Email: BrettM@tla.arizona.edu