8Quantum Networking

This chapter covers networking as specifically done by quantum devices using quantum properties. The quantum-resistant cryptography covered in Chapter 6 and the quantum-based cryptography covered in Chapter 7 can certainly be and often is used but is not a requirement for quantum-based networking. Quantum networking has its own inherent challenges and has been pursued by various companies and nations for well over a decade. Now that quantum supremacy is close to becoming a reality, the rush to find a sustainable quantum networking model is gathering steam. Specifically, this chapter will cover quantum networking components, challenges, and likely applications.

Networking is using an agreed-upon communication protocol to move information and content from source to destination over some sort of transmission medium, be it wireless, wired, or otherwise (e.g., human-based networks). Quantum networking uses quantum devices, properties, algorithms, and protocols to transmit (quantum) information across a network. As with every other quantum technology, quantum networking uses the full gambit of quantum properties, although you will hear the most discussion around superposition, entanglement, and the no-cloning theorem. Quantum networking can be done to link more quantum devices, physically spread apart, into a more powerful collective and to facilitate the transmission of information and content (including quantum teleportation). If done correctly, quantum networking ...

Get Cryptography Apocalypse now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.