Are you an EPFL student looking for a semester project?
Work with us on data science and visualisation projects, and deploy your project as an app on top of Graph Search.
This lecture covers the principles and protocols of Device Independent Quantum Key Distribution (DIQKD), including security proofs and experimental demonstrations. It explores the threat of quantum computers to classical encryption methods like RSA and the development of post-quantum algorithms. The instructor discusses the types of quantum computers that pose a threat and the IBM quantum development roadmap. Recommendations for preparing against quantum computer threats, such as post-quantum algorithms and quantum key distribution, are provided. The lecture emphasizes the importance of information-theoretic security and quantum key distribution for securing high-value information.