Practical Security Considerations for Quantum Key Distribution in Defence and Communications
Mark McGuire Quantum Data Scientist
Expert lecture
Watch this full lecture and over 100 other expert presentations on quantum technologies with a QSECDEF membership.
About Mark McGuire
Mark McGuire is a Quantum enabled data scientist at IBM where he provides mentorship to coworkers seeking to enter the field and serves as the quantum computing subject matter expert for his department. He has multiple certificates in quantum computing. He believes that quantum technology is often overcomplicated and is attempting to fix that with his writing and the quantum processor he is designing and building.
Mark has been working with Qiskit since it’s launch and that early experimentation is what got him excited about the field, it has also proved valuable in his current research.
Past work has also included work with EPRI on a white paper outlining possible ways to secure the energy grid.
Organisation
IBM Quantum® offers access to the largest quantum computing fleet in the world via Qiskit — which provides software tools and services to create a holistic programming model for utility.
Frequently Asked Questions
- Who is Mark McGuire?
- Mark McGuire is a Quantum enabled data scientist at IBM where he provides mentorship to coworkers seeking to enter the field and serves as the quantum computing subj.
- What is the lecture "Practical Security Considerations for Quantum Key Distribution in Defence and Communications"?
- This presentation by Mark McGuire at the Quantum Security Defence World Symposium covers key concepts, challenges, and developments in quantum cyber security, quantum key distribution.
- What is quantum cyber security?
- Quantum cyber security applies quantum mechanical principles to protect digital communications and data. It covers quantum key distribution, post-quantum cryptography, and quantum-safe network design.
- What is quantum key distribution?
- Quantum key distribution uses quantum mechanics to exchange cryptographic keys securely. Any interception disturbs the quantum states and is detectable, providing information-theoretic security.
Access All Expert Lectures
Watch over 100 expert presentations, attend weekly live webinars, and connect with specialists across 40+ countries.