Home / Resource / Technical Introduction / /Article details
Home / Search /Article details
Home /Article details
Home / Resource / Technical Introduction / /Article details

Beginner's Guide to Quantum Key Distribution: Six Steps to Get Started Easily

October 22, 2025

Beginner's Guide to Quantum Key Distribution: Six Steps to Get Started Easily

 

Data security is a critical challenge in today's society. Although traditional encryption technologies have provided robust protection over the past few decades, their security has gradually been threatened in recent years due to advancements in computing power, particularly the rise of quantum computing. To address this issue, Quantum Key Distribution (QKD) has emerged as one of the most prominent research areas in quantum information science.

Quantum Key Distribution technology utilizes the no-cloning principle of quantum mechanics to achieve absolutely secure key transmission. Its core advantage lies in the fact that when information is eavesdropped on, the state of the quantum system changes, causing the eavesdropper's activity to be detected immediately, thereby ensuring communication security.

To bring this cutting-edge technology into the classroom and help learners deeply understand the core concepts of quantum communication, Mich-optics has introduced a teaching-oriented Quantum Key Distribution system. This system can simulate the working principle of Quantum Key Distribution, allowing students to intuitively observe the transmission and measurement of quantum keys and experience the unique charm of quantum communication.

Figure 1: Quantum Key Distribution System

 

Working Principle

Quantum Key Distribution system is based on the world's first Quantum Key Distribution protocol - the BB84 protocol. The equipment includes a transmitter (Alice) and a receiver (Bob), capable of preparing, sending, and detecting polarization states. The system's supporting software provides functions such as data post-processing (basis sifting, error correction, privacy amplification), key distribution, and encryption/decryption experiments, demonstrating the complete Quantum Key Distribution process.

As shown in the figure, the experimental equipment is divided into two parts: the transmitter (Alice) and the receiver (Bob), which are responsible for transmitting and receiving qubits respectively, and are connected to two all-in-one computers via a switch.

Figure 2: Experimental Connection Diagram

 

The working principle is as follows:

1.         Polarization State Preparation and Detection:​​ The Alice end activates four lasers to prepare the four polarization states |H, |V, |+, and |-. The Bob end uses four single-photon detectors to perform detection.

2.         Basis Sifting:​​ Bob sends the positions corresponding to the quantum states he measured to Alice through the classical channel (the network cable shown in Figure 2). Alice then discards the parts that Bob did not measure. Subsequently, Alice and Bob perform basis sifting operation through the classical channel, discarding the bits where their encoding basis and measurement basis differ.

3.         Error Correction:​​ The data after basis sifting between Alice and Bob contains certain bit errors. Error correction algorithms are used to correct errors, discard erroneous bits, and calculate the quantum bit error rate (QBER).

4.         Privacy Amplification:​​ During the Quantum Key Distribution process, some information may be leaked. Privacy amplification algorithms are applied to the error-corrected data to enhance the confidentiality of the final data.

5.         Key Distribution:​​ By performing continuous Quantum Key Distribution over a period, changes in data such as the QBER and key generation rate during the experiment can be observed, ultimately generating a certain amount of secure quantum keys.

6.         Data Encryption and Decryption:​​ Alice selects a segment (e.g., 256 bits) of the quantum key to encrypt the information that needs to be transmitted (such as an image), and sends the encrypted image to Bob over the network. Bob then selects the segment of the quantum key corresponding to Alice's to decrypt and restore the image.

 

Initial Experiment Interface
Image Encryption
Image Decryption
 

Sheet1: Experimental Result Display

 

Product Highlights

Highlight One: Authentically Reproduces the Core Process of Quantum Key Distribution

Our system fully simulates the entire QKD process, including steps like photon state generation, quantum channel transmission, key generation, and encrypted transmission. Through comprehensive experiments, students can intuitively experience each key step of Quantum Key Distribution, truly integrating theory with practice.

​Highlight Two: High Data Reliability, Intuitive Demonstration Effects​

Data accuracy is crucial in quantum experiments. It is essential to ensure the reliability of experimental results while providing visual experimental data displays, making quantum experiments less abstract. Our system uses high-performance photon sources and single-photon detectors, along with stable quantum state transmission technology, ensuring the accuracy and stability of experimental data. Simultaneously, the supporting software demonstrates how QKD generates the final key from photon states, making it easier for students to understand.

Highlight Three: Simple and Easy to Use, Suitable for Teaching Operations​

Considering teaching requirements, the hardware and software need to be easy to operate with a user-friendly interface. Through modular design and an intuitive user interface, our system allows students and teachers to get started quickly and easily complete Quantum Key Distribution experiments without being distracted by complex operational details.

 

Product Parameters

Parameter Classification

Parameter Name

Specification

Performance Parameters

Encoding Method

Polarization Encoding

Source Center Wavelength

1550nm

Operating Frequency

100kHz

Detection Efficiency

10%~30% Adjustable

Bit Error Rate (BER)

< 3%

Optical Fiber Interface

FC/PC

Power Supply Type

12V DC

Software Functions

Detector Counting, Optical Power Display, Status Display and Control, Communication Interface Control, Function Control and Demonstration, Core Parameter Settings, Experiment Data Saving

Structural Parameters

Dimensions

Alice: 255×320×95mm³;

Bob: 255×320×95mm³

Weight

Alice: 4.5kg; Bob: 4.5kg

Environmental Parameters

Operating Temperature

25±

Operating Humidity

0%~45% RH

 

Application Fields

l   Experimental Teaching for Quantum Informatics Majors:​​ The teaching system can provide students with an intuitive and easy-to-operate experimental platform.

l   Technology Innovation Experimental Courses and Academic Competitions:​​ Beyond formal programs, many universities offer innovation experimental courses and academic competitions in quantum information technology. The Quantum Key Distribution system can aid in experimental design and demonstration, enhancing students' practical abilities.

l   Science Popularization and Basic Education:​​ The Quantum Key Distribution teaching system is suitable not only for higher education institutions but also for basic education and science popularization applications. With its intuitive interface and straightforward experimental design, students can more easily grasp the basic concepts of quantum communication, laying the groundwork for future quantum technology research.