Pillar D: Quantum Technologies & CybersecurityD5

Quantum Networking & Communication

Quantum Key Distribution, QKD limitations, QRNG, deployed quantum networks.

Part of Pillar D: Quantum Technologies & Cybersecurity · Quantum Technologies & Cybersecurity groups the disciplines that share methods, tools, and threat models with Quantum Networking & Communication.

What is Quantum Networking & Communication?

Quantum networking and communication leverages the fundamental properties of quantum mechanics — superposition, entanglement, and the no-cloning theorem — to achieve communication security guarantees that are impossible with classical technology. Quantum Key Distribution (QKD) is the most mature application, allowing two parties to generate a shared secret key with security grounded in physics rather than computational hardness assumptions.

BB84 (the original QKD protocol) and its successors detect any eavesdropping attempt because measuring a quantum state inevitably disturbs it. Deployed QKD networks already exist in China (the Beijing-Shanghai backbone spanning over 2,000 km), Europe (EuroQCI initiative), and elsewhere. Quantum Random Number Generation (QRNG) provides true randomness derived from quantum measurement, addressing a fundamental weakness in classical pseudo-random number generators that underpin cryptographic key generation.

However, QKD has significant practical limitations that security professionals must understand. It requires dedicated optical fiber or line-of-sight free-space links, is distance-limited without quantum repeaters (which are still experimental), cannot authenticate the channel on its own (it must be bootstrapped with pre-shared keys or classical authentication), and is vulnerable to side-channel attacks on the physical implementation. For most organizations, post-quantum cryptography running on existing infrastructure will be more practical than QKD — but for specific high-security applications, quantum communication provides a unique and powerful security layer.

Why it matters

Quantum networking offers physics-based security guarantees unavailable from any classical system, but its limitations and deployment constraints must be clearly understood to make informed architectural decisions about where it adds genuine value versus where PQC suffices.

Quantum networking complements post-quantum cryptography by offering an alternative approach to quantum-safe communication. Understanding both the capabilities and the limitations of QKD is essential for architects designing defense-in-depth strategies for the quantum era.

Standards and frameworks

Roles where this matters

Career paths where this domain shows up as core or recommended.

Quantum Security SpecialistCore

Prepare for the post-quantum era. Understand quantum threats and lead cryptographic migration efforts.

People shaping this field

Researchers and practitioners worth following in this space.

Co-inventor of BB84, the first QKD protocol

Leader of China's quantum satellite and long-distance QKD programs

Inventor of entanglement-based QKD (E91 protocol)

Curated resources

Authoritative sources we ground Quantum Networking & Communication questions in — frameworks, research, guides, and tools.

More in Quantum Technologies & Cybersecurity

Drill Quantum Networking & Communication with adaptive difficulty

42 questions available. Skip what you know, focus where you're weak, and watch your rating move.