Personal tools
You are here: Home Tutorials WORLDCOMP'12 Tutorial: Dr. Michael R. Grimaila
Important Date
July 16-19, 2012
22 joint conferences

« September 2015 »
Su Mo Tu We Th Fr Sa
Current Event
Click Here

Past Events
Click Here

Click Here

Click Here

Click Here

Click Here

Click Here

WORLDCOMP'07 & '06
Click Here

Join Our Mailing List
Sign up to receive email announcements and updates about conferences and future events


WORLDCOMP'12 Tutorial: Dr. Michael R. Grimaila

Last modified 2012-06-20 19:24

Quantum Key Distribution (QKD) Basics
Dr. Michael R. Grimaila
Associate Professor of Systems Engineering
Center for Cyberspace Research
Air Force Institute of Technology, Wright-Patterson AFB, Ohio, USA

Date: July 16, 2012
Time: 5:45pm
Location: Platinum Room


    Quantum Key Distribution (QKD) is a revolutionary security technology that exploits the laws of quantum mechanics to achieve information-theoretic secure key exchange. QKD enables two parties to “grow” a shared secret key without placing any limits on an adversary’s computational power. QKD is unique in its ability to detect the presence of any third-party eavesdropping on the key exchange. Due to the fundamental laws of quantum mechanics, any third-party eavesdropping on the key exchange will introduce detectable errors. If the errors are below a defined threshold, an unconditionally secure key can be distilled. When QKD is used in conjunction with the On-Time Pad symmetric cryptographic algorithm, the result is an unconditionally secure cryptographic system. In presentation, I will provide a background of cryptography related to QKD, present the basic principles the BB84 QKD protocol, and discuss vulnerabilities arising from the non-idealities present in real world QKD system implementations.


    This course will enable you to:
      • understand how symmetric and asymmetric cryptography are used to secure information and how it’s security is related to computational strength
      • understand the basics of quantum mechanics which enable information-theoretic secure key exchange used in Quantum Key Distribution (QKD)
      • review the history and background leading up to the development of the first QKD protocol: BB84
      • understand how the BB84, polarization-based, prepare and measure QKD protocol works
      • identify differences between the ideal theory and the non-ideal real-world implementations of QKD systems which introduce potential vulnerabilities
      • explore current developments and research efforts related to the deployment of QKD systems


    This tutorial is intended for faculty, engineers, scientists, and graduate students who want to learn what Quantum Key Distribution is and how it works. The tutorial is provided at the introductory level and assumes no prior knowledge in quantum mechanics.


    Dr. Michael R. Grimaila is an Associate Professor of Systems Engineering and a member of the Center for Cyberspace Research (CCR) at the Air Force Institute of Technology (AFIT), Wright-Patterson AFB, Ohio USA. He received a BS in Electrical Engineering, an MS in Electrical Engineering, and a PhD in Computer Engineering, all from Texas A&M University, College Station, Texas. Dr. Grimaila has published over 100 technical papers in the areas of computer and network security, information security, mission assurance, and semiconductor test. He is a Certified Information Security Manager (CISM), a Certified Information Systems Security Professional (CISSP), a member of the ACM, a Senior Member of the IEEE, and a Fellow of the ISSA. Dr. Grimaila’s research interests include quantum cryptography, mission assurance, network management and security, and systems engineering.


    Dr. Michael R. Grimaila
    Center for Cyberspace Research
    Air Force Institute of Technology
    Wright-Patterson AFB, OH 45433-7765
    Office: (937) 255-3636 x4800
    Fax: (937) 656-4699

All tracks of WORLDCOMP have received high citations
Click Here for details

Click Here for details

WORLDCOMP'12 Exhibition
Click Here for details

2012 Co-Sponsors
Bioinformatics & Computational Biology Program
George Mason University, USA

Biomedical Cybernetics Laboratory
HST of Harvard University & MIT, USA

Minnesota Supercomputing Institute
University of Minnesota, USA

Center for Cyber Defense, NCAT

Argonne's Leadership Computing Facility of Argonne National Laboratory
Illinois, USA

The Center for Advanced Studies in Identity Sciences
(CASIS: NC A&T;, Carnegie Mellon, Clemson, UNC Wilmington

Knowledge Management & Intelligent System Center (KMIS)
University of Siegen, Germany

Intelligent Cyberspace Engineering Lab., ICEL
Texas A&M; University, Texas, USA
UMIT, Institute of Bioinformatics and Translational Research

Hawkeye Radiology Informatics
Department of Radiology, College of Medicine, University of Iowa, USA

The International Council on Medical and Care Compunetics
US Chapter of World Academy of Science

Supercomputer Software Department (SSD)
Institute of Computational Mathematics & Mathematical Geophysics, Russian Academy of Sciences

International Society of Intelligent Biological Medicine

Medical Image HPC & Informatics Lab (MiHi Lab)
University of Iowa, USA

High Performance Computing for Nanotechnology (HPCNano)

Manx Telecom

Computer Science Research, Education, and Applications Press;

World Academy of Biomedical Sciences and Technologies

Super Micro Computer, Inc.,
San Jose, California, USA

Intel Corporation

Altera Corporation

Hodges Health

Leading Knowledge

Science Publication


Administered by UCMSS
Universal Conference Management Systems & Support
San Diego, California, USA
Contact: Kaveh Arbtan

If you can read this text, it means you are not experiencing the Plone design at its best. Plone makes heavy use of CSS, which means it is accessible to any internet browser, but the design needs a standards-compliant browser to look like we intended it. Just so you know ;)