Quantum key distribution allows Alice and Bob to securely share a secret key using quantum properties of photons. In the BB84 protocol, Alice randomly encodes photons in one of two bases and sends them to Bob. Bob measures in a randomly chosen basis. They discard mismatched results and use the remaining bits as a secure key. An eavesdropper like Eve cannot intercept the photons without introducing errors, revealing her presence. This allows Alice and Bob to detect eavesdropping and ensure the secrecy of their shared key.
Related topics: