Quantum Secure Communication
Book online today or, if you need help choosing the right course or would like to discuss business discounts, call us on 0113 220 7150.
Virtual
From £4,150 +VAT
Sorry, there are currently no dates available to book. Submit an enquiry to hear from one of our team about when dates might become available.
Overview
As the field of quantum communication continues to evolve and advance, there is a growing need for professionals with the knowledge and skills to tackle the complex challenges and opportunities it presents.
The course covers the fundamental concepts of quantum communication, including the properties of qubits and quantum registers, the manipulation of quantum states through quantum gates, and the principles and implementations of quantum key distribution.
Additionally, the course delves into various quantum communication protocols and their respective approaches, and the security challenges in quantum communication, such as attacks against quantum key distribution protocols, and the potential applications and future developments of a quantum internet.
Topics covered in the course;
- Introduction to quantum communication
- Qubit and quantum register
- Quantum gates
- Quantum key distribution
- Quantum communication protocols
- Quantum key distribution approaches
- Attacks against QKD protocols
- Quantum internet
Prerequisites
Fundamental knowledge of quantum computing.
Delegates will learn how to
You will;
- Be able to apply their knowledge of quantum key distribution
- Be equipped to utilise key distribution protocols
- Be able to comply with existing quantum communication standards and secure quantum networking
- Be able to explain active & passive quantum security attacks
- Be able to explain physical attacks on quantum key distribution protocols
Outline
Day 1
What is quantum communication about?
Qubit and quantum register
- Four postulates
IBM Quantum
How to prepare a superposition?
- Preparing an arbitrary quantum state
No cloning theorem
- No Cloning Theorem - Proof
Entanglement
- Decomposition exercise
- Entangled states
- Difference between product and entangled states
- What does entanglement mean?
- Famous entanglement pairs
- How to produce entangled pairs?
- Changing the bases of an entangled pair
- CNOT gate
- Bell state generator
- Generalized quantum entangler
- How to create entangled qubits physically? - An example
Implementation examples for qubits
- Physical qubits
- Di Vincenzo criteria
- Superconducting qubits
- Trapped ions
- Photonic qubits
Day 2
Quantum key distribution over optical fiber
- From theory to the real world
- Protocol stack of QKD
Two important quantum communication protocols
- Quantum Communication – the players
- Superdense coding
- Teleportation
- Superdense coding and Teleportation
Quantum Medium Access Control
- Medium Access Control in distributed environment - quantum WIFI
- Quantum WIFI - MAC
- Quantum MAC - JOIN
- Quantum MAC - LEAVE
- Quantum MAC - TRANSFER
- Quantum MAC - generalization
- Rebalacing
- Quantum periodic table
Density matrix and its application in quantum communications
- Decomposition exercise
- Introduction to density matrix formalism
- Calculation of density matrices
- Mixed states
- Geometrical representation
- Are density matrices unique?
- Partial trace
- Postulates with density matrices
- Teleportation
- State vs. density matrix formalisms
Why do we need quantum key distribution?
- Problem formulation
- Symmetric Keys
- Symmetric Keys – problems and solutions
- Asymmetric Key System
- Problem formulation
- Problem formulation – Quantum Key Distribution
Quantum key distribution approaches
- Two types of QKD
- In real life, quantum channel is not ideal
- BB84, the first QKD protocol
- SARG04 protocols
- B92 protocol
- Entanglement based QKD
- E91 protocol
Passive and active attacks
- Passive attack
- Active attack
- Attack types
- Denial of service attack
- Man-in-the-middle attack
Day 3
Non idealistic channels
- Why realistic quantum channels are important?
- General model of communication
- AWGN
- Channel capacity
- A suprising example
- Various quantum capacities
- Basic quantum channel models
- Effects in real fibers
Interesting QKD approaches
- Chicago Quantum Exchange
- Chinese Quantum Network: More than 4600 kilometers
- UK Quantum Communications Hub
- EuroQCI
- Companies: ID Quantique
- Companies: MagiQ
- Companies: Quintessence Labs
Technical study: implementing BB84
- High level overview
- Physical realization
Quantum key distribution via free-space
- Why to use free-space instead of fiber-based solution?
Errors in free-space quantum channels
- Quantum signals on free-space channels
- There are equations behind everything
- But this is what is important
Prepare-and-measure QKD vs entanglement-based QKD
- Prepare-and-measure QKD -advantages
- Prepare-and-measure QKD -disadvantages
- Entanglement-based QKD -advantages
- Entanglement-based QKD -disadvantages
Physical attacks on quantum key distribution protocols
- Intercept and resend
- Faked states attack
- Photon number splitting attack
- Trojan Horse Attack (Light Injection Attack)
- Using a beam splitter
Interesting free-space QKD approaches
- Scenarios for satellite based quantum communicatoins
- How to use an entanglement-based satellite system?
- Quantum Experiments at Space Scale (QUESS)
- Singapore’s mission in 2019
- SpooQy 1
- European answer: SAGA
- A draft concept of the European SAGA system
- Timeline for the SpaceQCI (from European Comission)
- Timeline for the SAGA mission (from ESA)
- Security threats to a satellite QKD system
Quantum Secure Network, Quantum Information Network
- Stages to achieve a global quantum internet
Ingredients of future's quantum internet
- Challenges
- Entanglement swapping
- Entanglement swapping - remarks
- Routing
Overview of standardization
- Working on standards
- Working on quantum communications standards
- ETSI Quantum-Safe Cryptography (QSC) working group
- ETSI - Quantum-Safe Cryptography (QSC)
- ETSI Industry Specification Group (ISG)
- ETSI QKD
- ETSI Standards – An example
- IETF QIRG – Standards for quantum internet
- IETF QIRG – Two dradts
Quantum communication: implementation challenges
- Technical study: implementing CV-QKD system
A Hungarian CV-QKD system
- Technical study: implementing quantum random number generator (QRNG)
The simplest QRNG
- A Hungarian QRNG system
Summary and outlook
- Future's satellite system
- QKD and autonomous vehicles
- QKD and 5G
In partnership with our Secure Coding partner Scademy.
Click here to view all our Scademy courses.
QA is an approved training provider for ELCAS, proud to support service leavers in their transition into the tech industry.
NCSC Assured Training
Why choose QA
- Award-winning training, top NPS scores
- Nearly 300,000 learners in 2020
- Our training experts are industry leaders
- Read more about QA
Related courses
Cyber Security learning paths
Want to boost your career in cyber security? Click on the roles below to see QA's learning pathways, specially designed to give you the skills to succeed.
Secure Engineering learning paths
Want to boost your career in Secure Engineering? View QA's learning pathway below, specially designed to give you the skills to succeed.
Frequently asked questions
See all of our FAQsHow can I create an account on myQA.com?
There are a number of ways to create an account. If you are a self-funder, simply select the "Create account" option on the login page.
If you have been booked onto a course by your company, you will receive a confirmation email. From this email, select "Sign into myQA" and you will be taken to the "Create account" page. Complete all of the details and select "Create account".
If you have the booking number you can also go here and select the "I have a booking number" option. Enter the booking reference and your surname. If the details match, you will be taken to the "Create account" page from where you can enter your details and confirm your account.
Find more answers to frequently asked questions in our FAQs: Bookings & Cancellations page.
How do QA’s virtual classroom courses work?
Our virtual classroom courses allow you to access award-winning classroom training, without leaving your home or office. Our learning professionals are specially trained on how to interact with remote attendees and our remote labs ensure all participants can take part in hands-on exercises wherever they are.
We use the WebEx video conferencing platform by Cisco. Before you book, check that you meet the WebEx system requirements and run a test meeting (more details in the link below) to ensure the software is compatible with your firewall settings. If it doesn’t work, try adjusting your settings or contact your IT department about permitting the website.
Learn more about our Virtual Classrooms.
How do QA’s online courses work?
QA online courses, also commonly known as distance learning courses or elearning courses, take the form of interactive software designed for individual learning, but you will also have access to full support from our subject-matter experts for the duration of your course. When you book a QA online learning course you will receive immediate access to it through our e-learning platform and you can start to learn straight away, from any compatible device. Access to the online learning platform is valid for one year from the booking date.
All courses are built around case studies and presented in an engaging format, which includes storytelling elements, video, audio and humour. Every case study is supported by sample documents and a collection of Knowledge Nuggets that provide more in-depth detail on the wider processes.
Learn more about QA’s online courses.
When will I receive my joining instructions?
Joining instructions for QA courses are sent two weeks prior to the course start date, or immediately if the booking is confirmed within this timeframe. For course bookings made via QA but delivered by a third-party supplier, joining instructions are sent to attendees prior to the training course, but timescales vary depending on each supplier’s terms. Read more FAQs.
When will I receive my certificate?
Certificates of Achievement are issued at the end the course, either as a hard copy or via email. Read more here.