protocols exist. The first type uses polarisation of by Bob Gelfond, CEO of MagiQ
on quantum randomness to keep Eve from learning (2) Description of Entanglement based
the secret key. The second type uses entangled Quantum Cryptography from Artur Ekert
photon states to encode the bits and relies on the fact (3) Physics World Magazine (March 2007
that the information defining the key only comes into online Issue)
CONCLUSION:
The current commercial systems are aimed mainly at
governments and corporations with high security
requirements. Key distribution by courier is typically
used in such cases, where traditional key distribution
schemes are not believed to offer enough
guarantee. This has the advantage of not being
intrinsically distance limited, and despite long travel
times the transfer rate can be high due to the
availability of large capacity portable storage
devices. The major difference of quantum