{"guid":"import-73e11118205c5b32f0","title":"Quantum Cryptography and Possible Attacks","subtitle":null,"slug":"24c3-2275-en-quantum_cryptography_and_possible_attacks","link":"http://events.ccc.de/congress/2007/Fahrplan/events/2275.en.html","description":"Quantum cryptography is the oldest and best developed application of the field of quantum information science. Although it is frequently perceived as an encryption method, it is really a scheme to securely distribute correlated random numbers between the communicating parties and thus better described as quantum key distribution (QKD). Any attempt at eavesdropping from a third party is guarantied to be detected by the laws of physics (quantum mechanics) and shows up as an increased error rate in the transmission (the QBER).\n","original_language":"eng","persons":["Alexander Ling","Antia Lamas","Ilja Gerhardt","Christian Kurtsiefer"],"tags":["24c3"," Science"],"view_count":148,"promoted":false,"date":"2007-12-28T01:00:00.000+01:00","release_date":"2008-01-12T01:00:00.000+01:00","updated_at":"2025-10-13T11:15:04.203+02:00","length":4610,"duration":4610,"thumb_url":"https://static.media.ccc.de/media/congress/2007/24c3-2275-en-quantum_cryptography_and_possible_attacks_high.jpg","poster_url":"https://static.media.ccc.de/media/congress/2007/24c3-2275-en-quantum_cryptography_and_possible_attacks_high_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2007/import-73e11118205c5b32f0-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2007/import-73e11118205c5b32f0-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/24c3-2275-en-quantum_cryptography_and_possible_attacks","url":"https://api.media.ccc.de/public/events/import-73e11118205c5b32f0","conference_title":"24C3: Volldampf voraus!","conference_url":"https://api.media.ccc.de/public/conferences/24c3","related":[{"event_id":908,"event_guid":"import-76a40622f79a62b91d","weight":1},{"event_id":1393,"event_guid":"import-85eaa1b78dd15ec225","weight":2},{"event_id":1551,"event_guid":"import-6a3a996a7bf3732340","weight":1},{"event_id":2370,"event_guid":"8e05d290-9151-419d-8e63-3bcbb02096ab","weight":1},{"event_id":2502,"event_guid":"a707951f-7f9c-4c8e-8f4f-b837f3581b7b","weight":1},{"event_id":2866,"event_guid":"1dcedd27-94b5-433e-a650-dccc1ba3d720","weight":2},{"event_id":3658,"event_guid":"10b11771-c76f-44d5-9b65-9ebca428d8ff","weight":1},{"event_id":4369,"event_guid":"5f25fc58-113d-4605-9fc0-9e98407cd9a3","weight":1},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":1},{"event_id":4797,"event_guid":"c7b3314c-165c-446d-963c-609922ea990f","weight":1},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":1},{"event_id":4883,"event_guid":"ea27b2dc-d558-4fab-8406-a9db30930f8f","weight":1}],"recordings":[{"size":171,"length":4610,"mime_type":"video/webm","language":"eng","filename":"24c3-2275-en-quantum_cryptography_and_possible_attacks.webm","state":"downloaded","folder":"webm","high_quality":true,"width":640,"height":480,"updated_at":"2016-01-27T11:03:30.352+01:00","recording_url":"https://cdn.media.ccc.de/congress/2007/webm/24c3-2275-en-quantum_cryptography_and_possible_attacks.webm","url":"https://api.media.ccc.de/public/recordings/2151","event_url":"https://api.media.ccc.de/public/events/import-73e11118205c5b32f0","conference_url":"https://api.media.ccc.de/public/conferences/24c3"},{"size":null,"length":4610,"mime_type":"video/mp4","language":"eng","filename":"24c3-2275-en-quantum_cryptography_and_possible_attacks_high.mp4","state":"downloaded","folder":"mp4","high_quality":true,"width":640,"height":480,"updated_at":"2016-01-27T11:03:30.323+01:00","recording_url":"https://cdn.media.ccc.de/congress/2007/mp4/24c3-2275-en-quantum_cryptography_and_possible_attacks_high.mp4","url":"https://api.media.ccc.de/public/recordings/4140","event_url":"https://api.media.ccc.de/public/events/import-73e11118205c5b32f0","conference_url":"https://api.media.ccc.de/public/conferences/24c3"}]}