Updated October 2004
Cryptography: Potentially Perfect Security
report examines the current state of quantum cryptography, organizes
key issues and puts them in context, and succinctly explains how
the technology works.
Quantum cryptography uses traits of individual photons to distribute
random mathematical keys that can be used to encrypt and decrypt
communications, providing theoretically perfect security. Rudimentary
commercial systems are available now, and the first-generation systems
make it possible to establish secure communications between two
points in metropolitan areas.
The report includes an executive summary, a list of 16 developments
to look for as this cutting-edge technology takes shape, and a section
of 25 researchers to watch, including links to their Web pages.
It also includes a quick tour of 21 recent developments in six areas
and a section of 15 in-depth news stories from TRN.
The stories are organized into six categories: quantum cryptography
systems, single-photon sources, photon detectors, quantum repeaters,
entangled photons and advances in related technologies.
Making the Future reports contain live links, and can
be read on a computer, printed and archived.
the Quantum Cryptography
report for $89.
You will receive download instructions via
How It Works:
stories, including 3 images
Table of Contents:
The first generation
What it's good for
Going the distance
Making perfect perfect
What's really needed
How It Works
quantum key distribution
In-Depth Story Categories
Advances in related technologies
a look at all
available Making the Future reports.
View a four-page sample of the Making
the Future report (pdf).