Security of information is one of the main tasks in our days. The desire for protection of health records, personal data, and communications is a great opportunity to advance the technology for that. One of the most effective and reliable ways to protect data spread through a communication media is the use cryptography. Classical crypto methods are symmetric and asymmetric ones. The PKI is also a developing area.
The next level of development in cryptography – quantum cryptography – is a big challenge for universities, researchers, technical labs (it started there), organizations and industry (lasers, equipment). This new area takes in a different level the protection of data. The basis is not a mathematical but all the idea is based on the specific feature of photons – the polarization.
 Charles H. Bennett, Gilles Brassard, “Quantum cryptography: Public key distribution and coin tossing”, https://doi.org/10.1016/j.tcs.2014.05.025
 Accenture Labs and 1QBit Work with Biogen to Apply Quantum Computing to Accelerate Drug Discovery | Accenture Newsroom”
. newsroom.accenture.com. Retrieved 2017-10-04.
 Tovey, Alan (2015-12-26). “Airbus’s quantum computing brings Silicon Valley to the Welsh Valleys”
. ISSN 0307-1235
. Retrieved 2017-11-02.
 Horwitz, Josh. “Alibaba is plowing $15 billion into R&D with seven new research labs worldwide”
. Quartz. Retrieved 2017-11-01.
 Jian Li, Na Li, Yu Zhang, Shuang Wen, Wei Du, Wei Chen, Wenping Ma, “A Survey on Quantum Cryptography”, Chinese Journal of Electronics
( Volume: 27 , Issue: 2
, 3 2018 ), Page(s): 223 – 228, ISSN: 1022-4653.
 Omer K. Jasim
, Safia Abbas
, El-Sayed M. El-Horbaty
, Abdel-Badeeh M. Salem
, Cloud Computing Cryptography “State-of-the-Art”, (DOI): doi.org/10.5281/zenodo.108889
 Richard J. Hughes, D. M. Alde, P. Dyer, G. G. Luther, G. L. Morgan & M. Schauer (1995) Quantum cryptography, Contemporary Physics, 36:3, 149-163, DOI: 10.1080/00107519508222149
 Charles H. Bennett, François Bessette, Gilles Brassard, Louis Salvail, John Smolin, Experimental quantum cryptography, Journal of Cryptology, 1992, Volume 5, Number 1, Page 3.