Sign Up

Have an account? Sign In Now

Sign In

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Have an account? Sign In Now

Sorry, you do not have a permission to ask a question, You must login to ask question.

Forgot Password?

Need An Account, Sign Up Here
Sign InSign Up

Edufavor

Edufavor
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Home
  • Learn
  • Categories
  • Stories
  • Search
  • FAQs
Home / Questions /Q 2570
Next
Answered
Khushboo
Khushboo

Khushboo

  • Lucknow,
  • 300 Questions
  • 0 Answers
  • 0 Best Answers
  • 343 Points
View Profile
Khushboo
Asked: October 27, 20212021-10-27T12:29:23+05:30 2021-10-27T12:29:23+05:30In: GENERAL

What is Quantum Key Distribution (QKD)?

What is Quantum Key Distribution (QKD)?

current affairesscience & technology
  • 0
  • 1
  • 315
Answer
Share
  • Facebook

    1 Answer

    • Recent
      • 0 Questions
      • 307 Answers
      • 60 Best Answers
      • 0 Points
      View Profile
      Best Answer
      [Deleted User]
      2021-10-27T12:34:21+05:30Added an answer on October 27, 2021 at 12:34 pm

      DRDO achieves milestone in key Quantum Technology

      Context:

      The Defence Research and Development Organisation (DRDO) achieved a milestone in Quantum Key Distribution (QKD) technology.

      What is Quantum Key Distribution (QKD)?

      • QKD is a secure communication method that uses cryptographic protocol involving components of quantum mechanics.
      • The technology enables two communicators to produce a random secret key known only to them and later it can be used to encrypt and decrypt messages.

      What makes QKD unbreakable?

      • The security of QKD stems from the ability to detect any intrusion on the QKD transmission.
      • Because of the unique and fragile properties of photons, any third party who tries to read or copy the photons in any way will change the photons’ state.
      • The change will be detected by the endpoints, alerting them that the key has been tampered with and must be discarded.
      • A new key is then transmitted. Moreover, since the keys generated are truly random, they are protected from future hacking attempts.
      • 1
      • Reply
      • Share
        Share
        • Share on Facebook
        • Share on Twitter
        • Share on WhatsApp

    Leave an answer
    Cancel reply

    You must login or register to add a new answer.

    Related Questions

    • Tell us about different types of Orbits.
    • What are salt secreting Mangroves?

    Sidebar

    Ask A Question

    Explore

    • Home
    • Learn
    • Categories
    • Stories
    • Search
    • FAQs

    Footer

    EDUFAVOR

    A destined place on Internet where one can find a company of good peoples, where everyone grows together, love each other and enjoy flavored learning.

    Important Links

    Privacy Policy

    FOLLOW US

    © 2021 Edufavor. All Rights Reserved.

    Insert/edit link

    Enter the destination URL

    Or link to existing content

      No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.