Information Security and Quantum Cryptography 2019-03-04T08:31:39+00:00

Information Security and Quantum Cryptography

Maria Nenova


Keywords: cryptographic protocols; information theory; quantum cryptography; quantum computing

H2020 challenge:   Secure societies – protecting freedom and security of Europe and its citizens

Knowledge and skills (P: prerequisite; D: desirable, but not necessary): Communication protocols (P); Cryptography (P); Information theory (P); Analytical way of thinking (P); Cryptographic protocols (D); Quantum cryptography (D); Quantum computing (D); Programming abilities (D).

Security of information is one of the main tasks in our days. The desire for protection of health records, personal data, and communications is a great opportunity to advance the technology for that. One of the most effective and reliable ways to protect data spread through a communication media is the use cryptography. Classical crypto methods are symmetric and asymmetric ones. The PKI is also a developing area.

The next level of development in cryptography – quantum cryptography – is a big challenge for universities, researchers, technical labs (it started there), organizations and industry (lasers, equipment). This new area takes in a different level the protection of data. The basis is not a mathematical but all the idea is based on the specific feature of photons – the polarization.


[2] Charles H. Bennett, Gilles Brassard, “Quantum cryptography: Public key distribution and coin tossing”,;

[3] Accenture Labs and 1QBit Work with Biogen to Apply Quantum Computing to Accelerate Drug Discovery | Accenture Newsroom”. Retrieved 2017-10-04.

[4] Tovey, Alan (2015-12-26). “Airbus’s quantum computing brings Silicon Valley to the Welsh Valleys”ISSN 0307-1235. Retrieved 2017-11-02.

[5] Horwitz, Josh. “Alibaba is plowing $15 billion into R&D with seven new research labs worldwide”. Quartz. Retrieved 2017-11-01.

[6] Jian Li, Na Li, Yu Zhang, Shuang Wen, Wei Du, Wei Chen, Wenping Ma, “A Survey on Quantum Cryptography”, Chinese Journal of Electronics ( Volume: 27 , Issue: 2 , 3 2018 ), Page(s): 223 – 228,  ISSN: 1022-4653.

[7] Omer K. JasimSafia AbbasEl-Sayed M. El-HorbatyAbdel-Badeeh M. Salem, Cloud Computing Cryptography “State-of-the-Art”, (DOI):

[8] Richard J. Hughes, D. M. Alde, P. Dyer, G. G. Luther, G. L. Morgan & M. Schauer (1995) Quantum cryptography, Contemporary Physics, 36:3, 149-163, DOI: 10.1080/00107519508222149

[9] Charles H. Bennett, François Bessette, Gilles Brassard, Louis Salvail, John Smolin, Experimental quantum cryptography, Journal of Cryptology, 1992, Volume 5, Number 1, Page 3.

Quantum computing principles
Quantum computing principles
Quantum Turing Machine
Quantum Turing Machine

Questions that need answers

Student teams will need to identify and provide more details about specific technologies which can be used within quantum cryptography:

  • What are the main issues in the security of information from engineering point of view?
  • What is the basis of cryptography, main challenges and algorithms to implement it?
  • What models of a whole quantum cryptosystem (blocks and subsystems) exist?
  • What is the technology behind the quantum cryptography?
  • What equipment is needed to perform it?
  • What are quantum cryptography protocols?
  • What are quantum computers?
  • What protocols are used in quantum computing?
  • Which attacks and vulnerabilities against the cryptosystem and the cryptoprotocol exist?
  • Technology used – prices and curent situation on the market for main parts of the quantum machines;
  • Cost of the devices and elements for quantum computing and cryptosystems;
  • Existing business models in the domain of cryptosystems.
  • What will be the impact of such a big change in the cryptography system model?
  • What will be the impact on the market, for example of computers?
  • How can one enterprise for quantum computers or quantum cryptosystem components work?
  • What will be the qualification of the people and working environment?
  • What will hapen with the digital world taking into account described changes in the domain of cryptosystems?

Entrepreneurial Case Expert

Maria Nenova does not have a photo :(

Maria Nenova

TeamSoc21 Entrepreneurial Case Expert

Case study students (Group 1)

Iva Borisova does not have a photo :(

Iva Borisova

TeamSoc21 Valencia2019 Student

Maros Gonda does not have a photo :(

Maros Gonda

TeamSoc21 Valencia2019 Student

Valentin Patalau does not have a photo :(

Valentin Patalau

TeamSoc21 Valencia2019 Student

Case study students (Group 2)

Alvaro Ravelo Medero does not have a photo :(

Alvaro Ravelo Medero

TeamSoc21 Valencia2019 Student

Blaz Jurisic does not have a photo :(

Blaz Jurisic

TeamSoc21 Valencia2019 Student

Iva Topolovac does not have a photo :(

Iva Topolovac

TeamSoc21 Valencia2019 Student

Zornitsa Terneva does not have a photo :(

Zornitsa Terneva

TeamSoc21 Valencia2019 Student

Skip to content