Abstract

Quantum Key Distribution (QKD) is currently being discussed as a technology to safeguard communication in a future where quantum computers compromise traditional public-key cryptosystems. In this paper, we conduct a comprehensive security evaluation of QKD-based solutions, focusing on real-world use cases sourced from academic literature and industry reports. We analyze these use cases, assess their security and identify the possible advantages of deploying QKD-based solutions. We further compare QKD-based solutions with Post-Quantum Cryptography (PQC), the alternative approach to achieving security when quantum computers compromise traditional public-key cryptosystems, evaluating their respective suitability for each scenario. Based on this comparative analysis, we critically discuss and comment on which use cases QKD is suited for, considering factors such as implementation complexity, scalability, and long-term security. Our findings contribute to a better understanding of the role QKD could play in future cryptographic infrastructures and offer guidance to decision-makers considering the deployment of QKD.
Original languageEnglish
Number of pages37
Publication statusPublished - 6 Feb 2025

Funding

This work was in part funded by the Dutch Ministry of Economic Affairs and Climate Policy (EZK) as part of the Quantum Delta NL National Growthfunds on Quantum Technology and by the NWO NWA project FIQCS (NWA.1436.20.005).

FundersFunder number
NWONWA.1436.20.005
Ministerie van Economische Zaken en Klimaat

    Keywords

    • Quantum Key Distribution
    • Quantum communications
    • Quantum cryptography
    • Quantum Network
    • Use-cases
    • Post-Quantum Cryptography
    • Harvest-Now-Decrypt-Later attack

    Fingerprint

    Dive into the research topics of 'A Critical Analysis of Deployed Use Cases for Quantum Key Distribution and Comparison with Post-Quantum Cryptography'. Together they form a unique fingerprint.

    Cite this