{"id":1803,"date":"2025-03-05T08:00:00","date_gmt":"2025-03-05T08:00:00","guid":{"rendered":"https:\/\/www.toshiba.eu\/quantum\/?post_type=insights&#038;p=1803"},"modified":"2025-03-05T08:15:36","modified_gmt":"2025-03-05T08:15:36","slug":"the-importance-of-qkd-and-pqc-for-quantum-security","status":"publish","type":"insights","link":"https:\/\/www.toshiba.eu\/quantum\/insights\/the-importance-of-qkd-and-pqc-for-quantum-security\/","title":{"rendered":"The importance of quantum-safe communication: post quantum cryptography (PQC) and quantum key distribution (QKD)"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\"><strong>Securing Sensitive Data with Public Key Cryptography<\/strong><\/h3>\n\n\n\n<p>In today\u2019s digital world, the protection of sensitive communication relies heavily on <strong>public key cryptography<\/strong>. Developed in the 1970s, this techniques enable secure and scalable communications over the internet and across networks.<\/p>\n\n\n\n<p>The primary functions of <strong>public key cryptography<\/strong> include <strong>key agreement<\/strong>, which establishes a secure <strong>key<\/strong> between parties for encrypting sensitive information, and digital signatures, which verify identity and build trust between entities. The security of <strong>public key cryptography<\/strong> is rooted in complex mathematical algorithms, such as large-number integer factorisation and discrete logarithm calculations. These calculations are extremely challenging for today\u2019s classical computers to solve, ensuring sensitive data and communications remain safeguarded against unauthorised access.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>The Quantum Computing Threat to Long-Term Data Security<\/strong><\/h3>\n\n\n\n<p>While it would take classical computers thousands of years and immense financial and computational resources to break the forms of <strong>public key cryptography <\/strong>that are widely used today, <strong>quantum computers<\/strong> pose a far greater risk. Leveraging the principles of <strong>quantum mechanics<\/strong>, these advanced systems can execute tasks significantly faster than today\u2019s computers. For instance, a sufficiently powerful <strong>quantum computer<\/strong> could utilise Shor\u2019s algorithm to compromise the security provided by all of the commonly-used public key algorithms used to protect communications today.<\/p>\n\n\n\n<p>This capability means that <strong>quantum computing<\/strong> could render the commonly used forms of <strong>public key cryptography<\/strong> insecure, allowing sensitive data to be accessed by malicious actors. Moreover, bad actors can collect and store encrypted data today, with plans to decrypt it later when <strong>quantum computers<\/strong> become widely accessible\u2014a strategy known as harvest-and-decrypt attacks. The implications for long-term data security are profound. Critical data that must remain secret for extended periods, such as <a href=\"https:\/\/www.toshiba.eu\/quantum\/insights\/toshiba-open-sessions-2023-chapter-1-hsbcs-trailblazing-quantum-roadmap-reshaping-bankings-future\/\">financial<\/a> records, <a href=\"https:\/\/www.toshiba.eu\/quantum\/resources\/ensuring-long-term-secure-government-and-medical-communications-with-qkd\/\">medical<\/a> information, corporate data, and infrastructure systems, are particularly vulnerable. Preparing for the <strong>quantum computing<\/strong> era is essential to safeguard these sensitive assets.<\/p>\n\n\n\n<p>To safeguard sensitive data against the risks posed by <strong>quantum computing<\/strong>, it is essential to make communications <a href=\"https:\/\/www.toshiba.eu\/quantum\/\"><strong>quantum safe<\/strong><\/a>\u2014protected from quantum-computing-based cryptographic attacks.<\/p>\n\n\n\n<p>Two primary methods are being developed and implemented today to achieve <strong>quantum-safe encryption<\/strong>: <a href=\"https:\/\/www.toshiba.eu\/quantum\/products\/quantum-key-distribution\/\"><strong>Quantum Key Distribution (QKD)<\/strong><\/a> and <strong>Post Quantum Cryptography (PQC)<\/strong>. These approaches play a crucial role in ensuring the resilience of encryption systems in the face of the growing <strong>quantum computing<\/strong> threat.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"435\" src=\"https:\/\/www.toshiba.eu\/quantum\/wp-content\/uploads\/2024\/05\/banner-finance-1024x435.jpg\" alt=\"An image of a server room.\" class=\"wp-image-1734\" style=\"width:815px;height:auto\" srcset=\"https:\/\/www.toshiba.eu\/quantum\/wp-content\/uploads\/2024\/05\/banner-finance-1024x435.jpg 1024w, https:\/\/www.toshiba.eu\/quantum\/wp-content\/uploads\/2024\/05\/banner-finance-300x128.jpg 300w, https:\/\/www.toshiba.eu\/quantum\/wp-content\/uploads\/2024\/05\/banner-finance-768x326.jpg 768w, https:\/\/www.toshiba.eu\/quantum\/wp-content\/uploads\/2024\/05\/banner-finance.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What is Quantum Key Distribution (QKD)?<\/strong><\/h2>\n\n\n\n<p><strong>Quantum Key Distribution (QKD)<\/strong> is a method for generating and sharing encryption keys that are resistant to attacks from <strong>quantum computing<\/strong>. Unlike traditional methods, QKD leverages physical particles, such as photons, to create fundamentally secure encryption keys that cannot be observed or compromised.<\/p>\n\n\n\n<p>The security of <strong>QKD<\/strong> is grounded in the principles of <strong>quantum physics<\/strong>. By relying on the behaviour of physical particles rather than mathematical algorithms, <strong>QKD<\/strong> is immune to attacks from both <strong>quantum computers<\/strong> and classical computing systems. Globally recognised protocols, such as BB84, form the foundation of <strong>QKD<\/strong> and have been rigorously peer-reviewed with proven security guarantees.<\/p>\n\n\n\n<p>Currently, <strong>QKD<\/strong> is mainly deployed over optical fibres, with potential future applications in satellite communication. A typical deployment involves the exchange of quantum states between two parties (commonly referred to as Alice and Bob), followed by secure processing to generate <strong>quantum-safe keys<\/strong> that encrypt and decrypt sensitive information.<\/p>\n\n\n\n<p><strong>Quantum Key Distribution (QKD)<\/strong> is a method for generating and sharing encryption keys that are resistant to attacks from <strong>quantum computing<\/strong>. Unlike traditional methods, QKD leverages physical particles, such as photons, to create fundamentally secure encryption keys that cannot be observed or compromised.<\/p>\n\n\n\n<p>The security of <strong>QKD<\/strong> is grounded in the principles of <strong>quantum physics<\/strong>. By relying on the behaviour of physical particles rather than mathematical algorithms, <strong>QKD<\/strong> is immune to attacks from both <strong>quantum computers<\/strong> and classical computing systems. Globally recognised protocols, such as BB84, form the foundation of <strong>QKD<\/strong> and have been rigorously peer-reviewed with proven security guarantees.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>What is the Current Status of Quantum Key Distribution (QKD)?<\/strong><\/h3>\n\n\n\n<p>Research and development on <strong>Quantum Key Distribution (QKD)<\/strong> has been ongoing for over 20 years, resulting in the deployment of commercial <strong>QKD systems<\/strong> across various sectors and <a href=\"https:\/\/www.toshiba.eu\/quantum\/resources\/securing-critical-infrastructure-using-trackside-fibre\/\">diverse use cases<\/a> globally. Today, <strong>QKD<\/strong> can be seamlessly integrated into existing fibre networks and data services. This enables organisations to implement <strong>quantum-safe<\/strong> solutions immediately, offering robust protection against <strong>quantum-computing-based cryptographic attacks<\/strong>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>QKD Deployment Considerations<\/strong><\/h3>\n\n\n\n<p>While <strong>Quantum Key Distribution (QKD)<\/strong> offers fundamental security and immunity against <strong>quantum-computing-based cryptographic attacks<\/strong>, it is a hardware-based solution that comes with associated financial costs. Additionally, as an optical technology, <strong>QKD<\/strong> requires deployment over fibre networks, and in the future, satellite networks will further expand its reach. As a result, <strong>QKD<\/strong> is currently best suited for network core, metro, and edge deployments where uncompromising security is essential.<\/p>\n\n\n\n<p>Innovations by <strong>QKD manufacturers<\/strong> are addressing these challenges. For example, <a href=\"https:\/\/opg.optica.org\/optica\/fulltext.cfm?uri=optica-11-10-1385&amp;id=560896\">Twin Field QKD<\/a> is extending the range of <strong>QKD<\/strong> in fibre networks, effectively reducing costs. Similarly, advancements in \u2018QKD systems on a chip\u2019 are dramatically lowering deployment costs, paving the way for <strong>QKD<\/strong> adoption in mass markets.<\/p>\n\n\n\n<p>The future introduction of satellite-based <strong>QKD services<\/strong> will enable global coverage, providing secure <strong>quantum-safe<\/strong> communication even in remote areas where fibre networks are unavailable. This development will significantly enhance connectivity for potential users worldwide.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What is Post Quantum Cryptography (PQC)?<\/strong><\/h2>\n\n\n\n<p><strong>Post Quantum Cryptography (PQC)<\/strong> refers to software-based cryptographic algorithms specifically designed to resist attacks from <strong>quantum computers<\/strong>. <strong>PQC<\/strong> employs new mathematical problems for which no attack with a quantum computer is known.<\/p>\n\n\n\n<p>Some of the most researched <strong>PQC<\/strong> methods include lattice-based, code-based, ECC isogeny, hash-based, and multivariate cryptographic schemes. These approaches are significantly harder to compromise than the mathematical techniques used in current cryptographic systems.<\/p>\n\n\n\n<p>It\u2019s important to note that the security of <strong>PQC algorithms<\/strong> relies on computational and mathematical assumptions, rather than physical principles like <strong>Quantum Key Distribution (QKD)<\/strong>. This means <strong>PQC<\/strong> provides resistance to known <strong>quantum-computing-based cryptographic attacks<\/strong> but may still face vulnerabilities from future advancements in quantum computing or mathematical techniques.<\/p>\n\n\n\n<p>Given the unpredictability of breakthroughs in mathematics and quantum computer science, no mathematics-based encryption scheme can guarantee absolute security. Therefore, <strong>PQC<\/strong> is considered a strong defensive measure, though not an infallible solution, against future <strong>quantum computing<\/strong> threats.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>What is the Current Status of Post Quantum Cryptography (PQC)?<\/strong><\/h3>\n\n\n\n<p>In August 2024, following research that began in 2016, the US-based National Institute of Standards and Technology (<a href=\"https:\/\/www.nist.gov\/news-events\/news\/2024\/08\/nist-releases-first-3-finalized-post-quantum-encryption-standards\"><strong>NIST<\/strong><\/a>) released the first set of <strong>Post Quantum Cryptography (PQC)<\/strong> standards. These include FIPS 203, 204, and 205, which address cryptographic <strong>key exchange<\/strong> and digital signatures to defend against cyberattacks by <strong>quantum computers<\/strong>.<\/p>\n\n\n\n<p>In October 2024, <a href=\"https:\/\/www.nist.gov\/news-events\/news\/2024\/10\/nist-announces-14-candidates-advance-second-round-additional-digital\"><strong>NIST<\/strong> also announced 14 candidate algorithms<\/a> for digital signatures. These algorithms are currently being evaluated for their performance and potential standardisation. Several rounds of assessment are expected before draft standards are developed and formal standards are eventually released.<\/p>\n\n\n\n<p>Real-world trials and pilot implementations of the newly released <strong>PQC standards<\/strong> have already commenced. Organisations are integrating <strong>PQC algorithms<\/strong> into their existing cryptographic infrastructures to test their performance and ensure compatibility. These trials are critical for identifying potential challenges and shaping strategies for large-scale deployments.<\/p>\n\n\n\n<p>As the field progresses, additional <strong>PQC candidates<\/strong> are likely to undergo evaluation, standardisation, and real-world testing, paving the way for widespread deployment across global communication networks.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Post Quantum Cryptography (PQC) Deployment Considerations<\/strong><\/h3>\n\n\n\n<p><strong>Post Quantum Cryptography (PQC)<\/strong> is widely regarded as offering resistance to cryptographic attacks from <strong>quantum computers<\/strong>, but it cannot guarantee absolute security. Future advancements in <strong>quantum computing<\/strong>, computer science, or mathematics may potentially compromise the algorithmic properties of <strong>PQC<\/strong>.<\/p>\n\n\n\n<p>As a software-based solution, <strong>PQC<\/strong> is often viewed as a quick, cost-effective upgrade to enhance a network\u2019s cryptographic capabilities. However, deploying and integrating <strong>PQC algorithms<\/strong> into legacy network infrastructures presents notable challenges.<\/p>\n\n\n\n<p>Today\u2019s networks, IoT ecosystems, and user devices have evolved around today\u2019s forms of <strong>public key cryptography<\/strong>, meaning the transition to <strong>PQC<\/strong> requires careful consideration:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Larger private keys<\/strong>: <strong>PQC private keys<\/strong> are significantly larger than those used currently used in <strong>public key cryptography<\/strong>, necessitating increased storage and bandwidth across networking, edge, and IoT devices.<\/li>\n\n\n\n<li><strong>Increased computational demands<\/strong>: <strong>PQC algorithms<\/strong> may impose higher computational requirements, potentially slowing down network devices or necessitating compute power upgrades.<\/li>\n\n\n\n<li><strong>Integration challenges<\/strong>: Seamlessly incorporating <strong>PQC<\/strong> into existing networking protocols while maintaining compatibility with other methods of <strong>public key cryptography<\/strong> across networks and devices is likely to be an iterative process requiring time and effort.<\/li>\n<\/ul>\n\n\n\n<p>Enterprises are encouraged to proactively consult their IT system and network providers about plans for integrating <strong>PQC<\/strong> into their products. This process may involve partial or full upgrades to networks and user devices, with both financial and logistical implications.<\/p>\n\n\n\n<p>Another critical factor is the time required for a complete cryptographic assessment of the network. Developing a <strong>quantum-safe migration plan<\/strong>, ensuring proper <strong>PQC<\/strong> integration with existing protocols, meeting corporate and regulatory security requirements, and executing phased upgrades are complex and time-intensive tasks. The operational and financial implications of this transition must be thoroughly evaluated and carefully planned.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"435\" src=\"https:\/\/www.toshiba.eu\/quantum\/wp-content\/uploads\/2024\/05\/banner-telecomms-1024x435.jpg\" alt=\"An image of a person using a phone depicting the topic of telecommunications.\" class=\"wp-image-1733\" style=\"width:821px;height:auto\" srcset=\"https:\/\/www.toshiba.eu\/quantum\/wp-content\/uploads\/2024\/05\/banner-telecomms-1024x435.jpg 1024w, https:\/\/www.toshiba.eu\/quantum\/wp-content\/uploads\/2024\/05\/banner-telecomms-300x128.jpg 300w, https:\/\/www.toshiba.eu\/quantum\/wp-content\/uploads\/2024\/05\/banner-telecomms-768x326.jpg 768w, https:\/\/www.toshiba.eu\/quantum\/wp-content\/uploads\/2024\/05\/banner-telecomms.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Strength in Depth<\/strong><\/h3>\n\n\n\n<p>A hybrid approach integrates cryptographic information from both <strong>Quantum Key Distribution (QKD)<\/strong> and <strong>Post Quantum Cryptography (PQC)<\/strong>, representing a critical step toward ensuring long-term security for network infrastructures.<\/p>\n\n\n\n<p>By combining <strong>QKD<\/strong> and <strong>PQC<\/strong>, organisations can base their security on a broader range of cryptographic challenges, effectively mitigating potential <strong>quantum-computing-based attacks<\/strong> and strengthening overall resilience. This hybrid <strong>QKD-PQC key<\/strong> approach ensures that even if one method fails, the combined key remains secure. For an attacker to compromise the secret key, they would need to simultaneously break both <strong>QKD<\/strong> and <strong>PQC<\/strong>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Preparing for the Quantum Transition<\/strong><\/h2>\n\n\n\n<p>Transitioning to <strong>quantum-safe networking<\/strong> is a complex process that may require substantial operational and financial resources. More critically, achieving full <strong>quantum safety<\/strong> could take significant time, leaving organisations vulnerable to the looming threat of <strong>quantum-computing-based attacks<\/strong>. The timeline for when quantum computers will be capable of breaking traditional forms of <strong>public key cryptography<\/strong>, often referred to as \u201cQ-day,\u201d is uncertain. Estimates suggest Q-day could occur within the next five years.<\/p>\n\n\n\n<p>Numerous published guides provide frameworks for developing quantum cryptography migration plans. Common themes across these guides include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Address the quantum threat now<\/strong>: Large organisations should incorporate the risks of <strong>quantum computing-based attacks<\/strong> into their current security strategies.<\/li>\n\n\n\n<li><strong>Raise awareness and define responsibilities<\/strong>: Create organisational awareness of the quantum threat and allocate resources and ownership for assessing the risks and potential solutions.<\/li>\n\n\n\n<li><strong>Assess your cryptographic estate<\/strong>: Map your network, endpoints, applications, and data to identify the cryptographic methods currently securing them.<\/li>\n\n\n\n<li><strong>Prioritise critical systems<\/strong>: Determine which network segments, data paths, and priority systems\u2014such as those processing sensitive data or requiring long-term security\u2014should transition first.<\/li>\n\n\n\n<li><strong>Collaborate with experts<\/strong>: Work with external bodies, vendors, and experts to evaluate available technologies and identify suitable solutions.<\/li>\n\n\n\n<li><strong>Develop a phased migration plan<\/strong>: Start with the most vulnerable, business-critical systems and gradually roll out quantum-safe protections across the entire network.<\/li>\n\n\n\n<li><strong>Leverage QKD and PQC<\/strong>: Combine the strengths of <strong>Quantum Key Distribution (QKD)<\/strong> and <strong>Post Quantum Cryptography (PQC)<\/strong> to secure strategic network segments, reduce implementation time, lower CAPEX, and maintain flexibility.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Securing Sensitive Data with Public Key Cryptography In today\u2019s digital world, the protection of sensitive communication relies heavily on public key cryptography. Developed in the 1970s, this techniques enable secure&hellip;<\/p>\n","protected":false},"author":6,"featured_media":1734,"parent":0,"template":"","tags":[123,61,31,24,37],"product":[15],"industry":[],"content-type":[13],"class_list":["post-1803","insights","type-insights","status-publish","has-post-thumbnail","hentry","tag-post-quantum-cryptography","tag-pqc","tag-qkd","tag-quantum-key-distribution","tag-telecoms","product-quantum-key-distribution","content-type-article"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The importance of quantum-safe communication: post quantum cryptography (PQC) and quantum key distribution (QKD) - Toshiba Quantum Technology<\/title>\n<meta name=\"description\" content=\"QKD and PQC can both be used to protect communications against quantum attacks. But how can they be used together to provide defence in depth?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.toshiba.eu\/quantum\/insights\/the-importance-of-qkd-and-pqc-for-quantum-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The importance of quantum-safe communication: post quantum cryptography (PQC) and quantum key distribution (QKD) - Toshiba Quantum Technology\" \/>\n<meta property=\"og:description\" content=\"QKD and PQC can both be used to protect communications against quantum attacks. But how can they be used together to provide defence in depth?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.toshiba.eu\/quantum\/insights\/the-importance-of-qkd-and-pqc-for-quantum-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Toshiba Quantum Technology\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-05T08:15:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.toshiba.eu\/quantum\/wp-content\/uploads\/2024\/05\/banner-finance.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"544\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.toshiba.eu\\\/quantum\\\/insights\\\/the-importance-of-qkd-and-pqc-for-quantum-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.toshiba.eu\\\/quantum\\\/insights\\\/the-importance-of-qkd-and-pqc-for-quantum-security\\\/\"},\"author\":{\"name\":\"George Pope\",\"@id\":\"https:\\\/\\\/www.toshiba.eu\\\/quantum\\\/#\\\/schema\\\/person\\\/b73bb6b38589fac17f110391eed5f9b6\"},\"headline\":\"The importance of quantum-safe communication: post quantum cryptography (PQC) and quantum key distribution (QKD)\",\"datePublished\":\"2025-03-05T08:00:00+00:00\",\"dateModified\":\"2025-03-05T08:15:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.toshiba.eu\\\/quantum\\\/insights\\\/the-importance-of-qkd-and-pqc-for-quantum-security\\\/\"},\"wordCount\":1807,\"publisher\":{\"@id\":\"https:\\\/\\\/www.toshiba.eu\\\/quantum\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.toshiba.eu\\\/quantum\\\/insights\\\/the-importance-of-qkd-and-pqc-for-quantum-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.toshiba.eu\\\/quantum\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/banner-finance.jpg\",\"keywords\":[\"Post Quantum Cryptography\",\"PQC\",\"QKD\",\"Quantum Key Distribution\",\"Telecoms\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.toshiba.eu\\\/quantum\\\/insights\\\/the-importance-of-qkd-and-pqc-for-quantum-security\\\/\",\"url\":\"https:\\\/\\\/www.toshiba.eu\\\/quantum\\\/insights\\\/the-importance-of-qkd-and-pqc-for-quantum-security\\\/\",\"name\":\"The importance of quantum-safe communication: post quantum cryptography (PQC) and quantum key distribution (QKD) - Toshiba Quantum Technology\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.toshiba.eu\\\/quantum\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.toshiba.eu\\\/quantum\\\/insights\\\/the-importance-of-qkd-and-pqc-for-quantum-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.toshiba.eu\\\/quantum\\\/insights\\\/the-importance-of-qkd-and-pqc-for-quantum-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.toshiba.eu\\\/quantum\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/banner-finance.jpg\",\"datePublished\":\"2025-03-05T08:00:00+00:00\",\"dateModified\":\"2025-03-05T08:15:36+00:00\",\"description\":\"QKD and PQC can both be used to protect communications against quantum attacks. But how can they be used together to provide defence in depth?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.toshiba.eu\\\/quantum\\\/insights\\\/the-importance-of-qkd-and-pqc-for-quantum-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.toshiba.eu\\\/quantum\\\/insights\\\/the-importance-of-qkd-and-pqc-for-quantum-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.toshiba.eu\\\/quantum\\\/insights\\\/the-importance-of-qkd-and-pqc-for-quantum-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.toshiba.eu\\\/quantum\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/banner-finance.jpg\",\"contentUrl\":\"https:\\\/\\\/www.toshiba.eu\\\/quantum\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/banner-finance.jpg\",\"width\":1280,\"height\":544,\"caption\":\"An image of a server room.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.toshiba.eu\\\/quantum\\\/insights\\\/the-importance-of-qkd-and-pqc-for-quantum-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.toshiba.eu\\\/quantum\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The importance of quantum-safe communication: post quantum cryptography (PQC) and quantum key distribution (QKD)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.toshiba.eu\\\/quantum\\\/#website\",\"url\":\"https:\\\/\\\/www.toshiba.eu\\\/quantum\\\/\",\"name\":\"Toshiba Quantum Technology\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.toshiba.eu\\\/quantum\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.toshiba.eu\\\/quantum\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.toshiba.eu\\\/quantum\\\/#organization\",\"name\":\"Toshiba Quantum Technology\",\"url\":\"https:\\\/\\\/www.toshiba.eu\\\/quantum\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.toshiba.eu\\\/quantum\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.toshiba.eu\\\/quantum\\\/app\\\/uploads\\\/2023\\\/04\\\/logo-toshiba.a8049d.gif\",\"contentUrl\":\"https:\\\/\\\/www.toshiba.eu\\\/quantum\\\/app\\\/uploads\\\/2023\\\/04\\\/logo-toshiba.a8049d.gif\",\"width\":140,\"height\":38,\"caption\":\"Toshiba Quantum Technology\"},\"image\":{\"@id\":\"https:\\\/\\\/www.toshiba.eu\\\/quantum\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/toshiba-qt\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.toshiba.eu\\\/quantum\\\/#\\\/schema\\\/person\\\/b73bb6b38589fac17f110391eed5f9b6\",\"name\":\"George Pope\",\"url\":\"https:\\\/\\\/www.toshiba.eu\\\/quantum\\\/author\\\/george\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The importance of quantum-safe communication: post quantum cryptography (PQC) and quantum key distribution (QKD) - Toshiba Quantum Technology","description":"QKD and PQC can both be used to protect communications against quantum attacks. But how can they be used together to provide defence in depth?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.toshiba.eu\/quantum\/insights\/the-importance-of-qkd-and-pqc-for-quantum-security\/","og_locale":"en_US","og_type":"article","og_title":"The importance of quantum-safe communication: post quantum cryptography (PQC) and quantum key distribution (QKD) - Toshiba Quantum Technology","og_description":"QKD and PQC can both be used to protect communications against quantum attacks. But how can they be used together to provide defence in depth?","og_url":"https:\/\/www.toshiba.eu\/quantum\/insights\/the-importance-of-qkd-and-pqc-for-quantum-security\/","og_site_name":"Toshiba Quantum Technology","article_modified_time":"2025-03-05T08:15:36+00:00","og_image":[{"width":1280,"height":544,"url":"https:\/\/www.toshiba.eu\/quantum\/wp-content\/uploads\/2024\/05\/banner-finance.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.toshiba.eu\/quantum\/insights\/the-importance-of-qkd-and-pqc-for-quantum-security\/#article","isPartOf":{"@id":"https:\/\/www.toshiba.eu\/quantum\/insights\/the-importance-of-qkd-and-pqc-for-quantum-security\/"},"author":{"name":"George Pope","@id":"https:\/\/www.toshiba.eu\/quantum\/#\/schema\/person\/b73bb6b38589fac17f110391eed5f9b6"},"headline":"The importance of quantum-safe communication: post quantum cryptography (PQC) and quantum key distribution (QKD)","datePublished":"2025-03-05T08:00:00+00:00","dateModified":"2025-03-05T08:15:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.toshiba.eu\/quantum\/insights\/the-importance-of-qkd-and-pqc-for-quantum-security\/"},"wordCount":1807,"publisher":{"@id":"https:\/\/www.toshiba.eu\/quantum\/#organization"},"image":{"@id":"https:\/\/www.toshiba.eu\/quantum\/insights\/the-importance-of-qkd-and-pqc-for-quantum-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.toshiba.eu\/quantum\/wp-content\/uploads\/2024\/05\/banner-finance.jpg","keywords":["Post Quantum Cryptography","PQC","QKD","Quantum Key Distribution","Telecoms"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.toshiba.eu\/quantum\/insights\/the-importance-of-qkd-and-pqc-for-quantum-security\/","url":"https:\/\/www.toshiba.eu\/quantum\/insights\/the-importance-of-qkd-and-pqc-for-quantum-security\/","name":"The importance of quantum-safe communication: post quantum cryptography (PQC) and quantum key distribution (QKD) - Toshiba Quantum Technology","isPartOf":{"@id":"https:\/\/www.toshiba.eu\/quantum\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.toshiba.eu\/quantum\/insights\/the-importance-of-qkd-and-pqc-for-quantum-security\/#primaryimage"},"image":{"@id":"https:\/\/www.toshiba.eu\/quantum\/insights\/the-importance-of-qkd-and-pqc-for-quantum-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.toshiba.eu\/quantum\/wp-content\/uploads\/2024\/05\/banner-finance.jpg","datePublished":"2025-03-05T08:00:00+00:00","dateModified":"2025-03-05T08:15:36+00:00","description":"QKD and PQC can both be used to protect communications against quantum attacks. But how can they be used together to provide defence in depth?","breadcrumb":{"@id":"https:\/\/www.toshiba.eu\/quantum\/insights\/the-importance-of-qkd-and-pqc-for-quantum-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.toshiba.eu\/quantum\/insights\/the-importance-of-qkd-and-pqc-for-quantum-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.toshiba.eu\/quantum\/insights\/the-importance-of-qkd-and-pqc-for-quantum-security\/#primaryimage","url":"https:\/\/www.toshiba.eu\/quantum\/wp-content\/uploads\/2024\/05\/banner-finance.jpg","contentUrl":"https:\/\/www.toshiba.eu\/quantum\/wp-content\/uploads\/2024\/05\/banner-finance.jpg","width":1280,"height":544,"caption":"An image of a server room."},{"@type":"BreadcrumbList","@id":"https:\/\/www.toshiba.eu\/quantum\/insights\/the-importance-of-qkd-and-pqc-for-quantum-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.toshiba.eu\/quantum\/"},{"@type":"ListItem","position":2,"name":"The importance of quantum-safe communication: post quantum cryptography (PQC) and quantum key distribution (QKD)"}]},{"@type":"WebSite","@id":"https:\/\/www.toshiba.eu\/quantum\/#website","url":"https:\/\/www.toshiba.eu\/quantum\/","name":"Toshiba Quantum Technology","description":"","publisher":{"@id":"https:\/\/www.toshiba.eu\/quantum\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.toshiba.eu\/quantum\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.toshiba.eu\/quantum\/#organization","name":"Toshiba Quantum Technology","url":"https:\/\/www.toshiba.eu\/quantum\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.toshiba.eu\/quantum\/#\/schema\/logo\/image\/","url":"https:\/\/www.toshiba.eu\/quantum\/app\/uploads\/2023\/04\/logo-toshiba.a8049d.gif","contentUrl":"https:\/\/www.toshiba.eu\/quantum\/app\/uploads\/2023\/04\/logo-toshiba.a8049d.gif","width":140,"height":38,"caption":"Toshiba Quantum Technology"},"image":{"@id":"https:\/\/www.toshiba.eu\/quantum\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/showcase\/toshiba-qt\/"]},{"@type":"Person","@id":"https:\/\/www.toshiba.eu\/quantum\/#\/schema\/person\/b73bb6b38589fac17f110391eed5f9b6","name":"George Pope","url":"https:\/\/www.toshiba.eu\/quantum\/author\/george\/"}]}},"_links":{"self":[{"href":"https:\/\/www.toshiba.eu\/quantum\/wp-json\/wp\/v2\/insights\/1803","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.toshiba.eu\/quantum\/wp-json\/wp\/v2\/insights"}],"about":[{"href":"https:\/\/www.toshiba.eu\/quantum\/wp-json\/wp\/v2\/types\/insights"}],"author":[{"embeddable":true,"href":"https:\/\/www.toshiba.eu\/quantum\/wp-json\/wp\/v2\/users\/6"}],"version-history":[{"count":4,"href":"https:\/\/www.toshiba.eu\/quantum\/wp-json\/wp\/v2\/insights\/1803\/revisions"}],"predecessor-version":[{"id":1807,"href":"https:\/\/www.toshiba.eu\/quantum\/wp-json\/wp\/v2\/insights\/1803\/revisions\/1807"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.toshiba.eu\/quantum\/wp-json\/wp\/v2\/media\/1734"}],"wp:attachment":[{"href":"https:\/\/www.toshiba.eu\/quantum\/wp-json\/wp\/v2\/media?parent=1803"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.toshiba.eu\/quantum\/wp-json\/wp\/v2\/tags?post=1803"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.toshiba.eu\/quantum\/wp-json\/wp\/v2\/product?post=1803"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.toshiba.eu\/quantum\/wp-json\/wp\/v2\/industry?post=1803"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.toshiba.eu\/quantum\/wp-json\/wp\/v2\/content-type?post=1803"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}