The Academic System is an end-to-end solution for education and research in quantum communications developed by QRate. We aim for this system to be the best way to introduce quantum key distribution technology both on a technical and conceptual level.

Our Academic System is used at the international World Skills competition in Quantum Technologies #FutureSkills competence. It is also an essential part of a graduate lab course in quantum photonics and cryptography at MIPT, MISiS, and HSE.

Our Academic System is used at the international World Skills competition in Quantum Technologies #FutureSkills competence. It is also an essential part of a graduate lab course in quantum photonics and cryptography at MIPT, MISiS, and HSE.

Today we are thrilled to provide you an opportunity to try the system and complete a QKD lab remotely. You will be working with an actual device, not a simulation. Before that, you might want to take a look at the QKD algorithm and system layout we use:

Interesting! I don't know anything about quantum cryptography, but I want to learn it all!

CONTINUE TO ALGORITHM

Yea, I know a thing or two about quantum cryptography. Show me that fancy scheme of yours.

SCROLL TO LAYOUT

Blah blah blah, show me the business part, not the science!

SCROLL TO USE CASES

The only thing I want is to get access to your fancy lab. Sign me up!

SCROLL TO APPLICATION

MEET

BB84

Since its invention in 1984, the quantum key distribution algorithm developed by Charles Bennett and Gilles Brassard has been an industry standard for educational purposes. Learn what is a secret key, why do we need to distribute it and how the quantum distribution is done by watching this short video.

Since its invention in 1984, the quantum key distribution algorithm developed by Charles Bennett and Gilles Brassard has been an industry standard for educational purposes.

 

The BB84 algorithm essentially allows generating identical random binary sequences for two remote parties traditionally called Alice and Bob. Its unique feature is that any interference with the process of sequence generation will be noticed by legitimate users. This allows us to use the BB84 algorithm to generate secret keys used in symmetric-key cryptography algorithms. The most prominent example of such algorithms is the Vernam cipher – the only one with proven perfect secrecy.

 

Here is how the BB84 works:

 

  1. Alice generates a random binary number in a random basis and sends it to Bob.
  2. Bob randomly chooses a basis to measure it in.
  3. Alice and Bob repeat this process until they have enough raw key length.
  4. Alice and Bob publicly announce their bases choices and discard all the discrepancies. This process is called sifting.
  5. Alice and Bob open and compare a part of the sifted key. If the number of errors is below a certain threshold they can be sure that the key distribution process was secure.

 

You will learn the practical implementation of BB84 after you complete the remote lab.

Alice’s set up consists of:

  • Faraday Mirror (FM) — flips polarization of incident light to orthogonal
  • Phase modulator (PM) — is used by Alice to encode classical bits into photon’s phase
  • Storage line (SL) — optical fiber coil to store photons
  • Variable optical attenuator (VOA) — attenuates optical pulses to single photon level
  • Beam splitter (BS) — splits light in two arms with particular power ratio
  • Synchro Detector (SD) — classical photodiode detector is used for synchronization

Bob’s set up consists of:

  • Polarisation beam splitter (PBS) — sends orthogonally polarized light pulses in different arms of the interferometer
  • Delay line (DL) — optical fiber coil used for splitting optical pulse in time domain
  • Phase modulator (PM) — is used by Bob to decode photon’s phase to classical bits
  • Beam splitter (BS) — splits light in two arms with particular power ratio
  • Single photon detectors (SPD1, SPD2) — “сlick” when a single photon is incident on it
  • Circulator (round arrow) — directs light to optical paths with respect to the arrow direction.
  • Optical Attenuator (OA) — attenuates optical pulses
  • Laser — emits optical pulses

Tutors

Additional content for thematic educational programs

Applicants

Preparation for job interviews in quantum cryptography

Partners

Testing our product before buying the Academic System

Students

Preparation for WorldSkills and CTF competitions

Want to try the remote lab? Fill in the form and we will contact you to arrange your remote access

APPLICATION FORM

Corporate mail

a.vladykin@goqrate.com

Sales department

+7-926-271-31-17

Corporate mail

a.vladykin@goqrate.com

Sales department

+7-926-271-31-17

Thank you for your application!


Our employees will contact you as soon as possible via email to arrange your remote access session.


Let’s bring quantum innovations to life together!