QKD Fiber Optics

Quantum Key Distribution

Information-theoretically secure key exchange guaranteed by the laws of quantum physics

Our QKD Protocols

Taqbit offers two complementary QKD protocols optimized for different deployment scenarios, both providing mathematically proven security against all computational attacks.

COW QKD

Coherent-One-Way QKD uses weak coherent pulses with time-bin encoding and a dedicated monitoring line to detect eavesdropping. The protocol offers an optimal balance between implementation simplicity and high performance.

Time-bin encoding with decoy sequences
Dedicated monitoring line for eavesdrop detection
Optimal for moderate-distance fiber links (up to 100km)

DPS QKD

Differential-Phase-Shift QKD encodes information in the relative phase between consecutive photon pulses, offering higher key-generation rates and stable operation over long distances.

Phase difference encoding between pulses
Mach-Zehnder interferometer for detection
Higher key rates for long-haul fiber networks
Feature COW QKD DPS QKD
Protocol Coherent-One-Way Differential-Phase-Shift
Encoding Method Time-bin encoding Phase difference encoding
Key Rate (at 22dB loss) ~1 kbps ~2 kbps
Max Distance >100 km >100 km
Eavesdrop Detection Monitoring line statistics Phase correlation analysis
Best For Metro networks, moderate distances Long-haul, high-throughput links

How Quantum Key Distribution Works

The science behind our unbreakable quantum encryption

Information-Theoretic Security

Unlike classical encryption that relies on computational complexity, QKD's security is guaranteed by the fundamental laws of quantum physics. Any attempt to measure quantum states disturbs them (Heisenberg Uncertainty Principle), making eavesdropping detectable.

Quantum Uncertainty

Measuring quantum states inevitably alters them, revealing eavesdroppers

No-Cloning Theorem

Quantum states cannot be perfectly copied, preventing undetected interception

QKD Security Principle
QKD Key Exchange Process

The QKD Process

  1. 1

    Quantum Transmission

    Alice encodes random bits in quantum states (photons) and sends them to Bob through a quantum channel (optical fiber)

  2. 2

    Measurement & Sifting

    Bob measures the incoming quantum states, then both parties reconcile detected measurements

  3. 3

    Error Estimation

    Parties compare a subset of bits to estimate quantum bit error rate (QBER) and detect potential eavesdropping

  4. 4

    Key Distillation

    Error correction and privacy amplification algorithms produce a final secure key with proven secrecy

QKD Deployment Solutions

Flexible integration options for your security infrastructure

Data Center Interconnects

Secure links between data centers with rack-mounted QKD terminals and key management systems

  • 19" rack-mount QKD terminals
  • Integration with existing encryption devices
  • Centralized key management

Metro Network Links

Point-to-point quantum-secured links for metropolitan area networks and financial exchanges

  • High-availability QKD systems
  • Network management integration
  • Redundant quantum channels

Long-Haul Backbones

Trusted node networks for national-scale quantum-secured communication infrastructure

  • Trusted node architecture
  • High-performance DPS QKD
  • Network operation center support