Overview
Explore quantum key distribution hardware vulnerabilities in this 24-minute Hackaday conference talk. Delve into the world of quantum devices and their potential security risks as Dr. Sarah Kaiser shares her successful attempts to breach quantum key distribution systems using powerful lasers. Learn about key exchange, the BB84 protocol, random link generation, and potential countermeasures. Gain insights into the characterization process and the implications for the future of quantum computing security.
Syllabus
Intro
Welcome
Key Exchange
Quantum Key Distribution
BB84
Random Link
Countermeasures
Lasers
Characterization
Taught by
HACKADAY