1. | EXECUTIVE SUMMARY |
1.1. | The quantum communication market 'at a glance' |
1.2. | The quantum threat to data security |
1.3. | The quantum solution to data security |
1.4. | 'Hack Now Decrypt Later' (HNDL) and preparing for Q-Day/ Y2Q |
1.5. | What is the main value proposition of QRNG compared to incumbents? |
1.6. | Key players developing QRNG products segmented by hardware approach |
1.7. | Applications of quantum random number generators (QRNG) |
1.8. | The basic principle of QKD uses 'observation' effects to identify eavesdroppers |
1.9. | Overview of key players developing QKD technology (1) |
1.10. | Overview of key players developing QKD technology (2) |
1.11. | What is a quantum network? |
1.12. | China - the first to realize large scale quantum networks |
1.13. | China - focus now on quantum memories and metropolitan networks |
1.14. | Europe - a coordinated effort to build up quantum networking capacity within and between across all 27 member states |
1.15. | US - NSA and NIST focused on PQC solutions to network security |
1.16. | Trusted nodes incorporating quantum computers have significant infrastructure needs |
1.17. | Pain points for incumbent platform solutions |
1.18. | National focus on eco-system building could delay market growth globally |
1.19. | Shortage of quantum talent is a challenge for the industry |
2. | INTRODUCTION |
2.1. | Introduction to quantum communications |
2.2. | The quantum sensor market 'at a glance' |
2.3. | Why now for quantum technologies? |
2.4. | Despite the hype around quantum computing, quantum communications remains as important a national priority |
2.5. | Is the quantum computing threat realistic? (1) |
2.6. | Is the quantum computing threat realistic? (2) |
2.7. | 'Hack Now Decrypt Later' (HNDL) and preparing for Q-Day/ Y2Q |
3. | INTRODUCTION POST QUANTUM CRYPTOGRAPHY (PQC) |
3.1. | Introduction to Post Quantum Cryptography (PQC) |
3.2. | Cybercrime incidents are rising in frequency and cost - driving engagement with PQC solutions |
3.3. | Cryptographic transitions are slow, and engagement with PQC is encouraged now |
3.4. | Types of cryptography |
3.5. | NIST taking a lead rule in PQC standardization |
3.6. | The market for crypto-agility and encryption management tools is growing |
3.7. | Is there a case for backdoors into encryption? |
3.8. | SWOT Analysis of PQC |
4. | QUANTUM RANDOM NUMBER GENERATORS (QRNG) |
4.1. | Overview |
4.1.1. | QRNG: chapter overview |
4.2. | Introduction to incumbent RNG technology |
4.2.1. | Introduction to entropy-sources and true-randomness |
4.2.2. | Distinguishing statistical randomness tests from true randomness |
4.2.3. | Overview of the established market for classical hardware random number generators, or true random number generators (TRNGs) |
4.2.4. | Hardware RNG in today's electronics is largely within a 'trusted platform module' TPM |
4.2.5. | What is the main value proposition of QRNG compared to incumbents? |
4.3. | Overview of QRNG technology and key players |
4.3.1. | Key players developing QRNG products segmented by hardware approach |
4.3.2. | Principle of operation of optical QRNG technology |
4.3.3. | What are the main form-factor approaches to creating optical QRNG? |
4.3.4. | Overview of technology differentiators for optical QRNG (segmented by company) |
4.3.5. | Why is there potentially a gap in the market for non-optical approaches to QRNG technology? |
4.3.6. | SWOT analysis of quantum random number generator technology |
4.4. | Key applications, market opportunities and challenges for QRNG |
4.4.1. | How are NIST standards impacting the QRNG market? |
4.4.2. | QRNG Application Case Studies: Encryption for Data Centers (1) |
4.4.3. | QRNG Application Case Studies: Encryption for Data Centers (2) |
4.4.4. | QRNG Application Case Studies: Consumer Electronics (Smart Phones) |
4.4.5. | QRNG Application Case Studies: Automotive/Connected Vehicle |
4.4.6. | The Connected Vehicle Supply Chain |
4.4.7. | QRNG Application Case Studies: Gambling and Gaming |
4.4.8. | QRNG Applications Case Study: Monte Carlo Simulations |
4.4.9. | Entropy vs. SWAP-C in the RNG/QRNG hardware market |
4.4.10. | Quantum random number generators: conclusions and outlook |
5. | QUANTUM KEY DISTRIBUTION (QKD) |
5.1. | Overview |
5.1.1. | QKD: chapter overview |
5.2. | Introduction to cryptographic keys and the security threat from quantum computing |
5.2.1. | Introduction to the role of keys and ciphers in data security |
5.2.2. | What is the difference between asymmetric and symmetric keys? |
5.2.3. | Overview of RSA encryption steps |
5.2.4. | How is quantum already impacting the future of encryption? |
5.2.5. | How could quantum computers accelerate large number factorization - and put RSA at risk? (1) |
5.2.6. | How could quantum computers accelerate large number factorization - and put RSA at risk? (2) |
5.2.7. | 'Hack Now Decrypt Later' (HNDL) and preparing for Q-Day/ Y2Q |
5.3. | Overview of QKD technology and key players |
5.3.1. | The basic principle of QKD uses 'observation' effects to identify eavesdroppers |
5.3.2. | An introduction to measuring single-qubit states |
5.3.3. | How can polarization and qubit states be used to securely distribute keys and the BB84 Protocol (1) |
5.3.4. | How can polarization and qubit states be used to securely distribute keys and the BB84 Protocol (2) |
5.3.5. | Why is QKD more secure than other key exchange mechanisms? |
5.3.6. | Discrete Variable vs. Continuous Variable QKD Protocols |
5.3.7. | Overview of key players developing QKD technology (1) |
5.3.8. | Overview of key players developing QKD technology (2) |
5.3.9. | QKD hardware is competing with a well established, cost-effective method software approach to key exchange |
5.3.10. | Chip-Scale QKD efforts will benefit from the growth of the PIC industry (1) |
5.3.11. | Chip-Scale QKD efforts will benefit from the growth of the PIC industry (2) |
5.3.12. | SWOT analysis of quantum key distribution technology |
5.3.13. | Quantum key distribution: conclusions and outlook |
6. | QUANTUM NETWORKS |
6.1. | Overview |
6.1.1. | Quantum Networks: chapter overview |
6.2. | Introduction to quantum networks and components |
6.2.1. | What is a quantum network? |
6.2.2. | The role of trusted nodes and trusted relays |
6.2.3. | Entanglement swapping and optical switches |
6.2.4. | Moving away from dark-fiber, and multiplexing with the O-Band |
6.2.5. | Twin-Field QKD |
6.2.6. | Space based quantum networks |
6.2.7. | An opportunity for better optical fiber and interconnects |
6.2.8. | Avalanche Photo Detectors (APD) |
6.2.9. | Single-photon avalanche diodes |
6.2.10. | Silicon photomultiplier |
6.2.11. | Comparison of common photodetectors |
6.2.12. | Major single photo-detector players focusing on LIDAR may seek to expand into quantum communications |
6.3. | Key players and case studies |
6.3.1. | China - the first to realize large scale quantum networks |
6.3.2. | China - focus now on quantum memories and metropolitan networks |
6.3.3. | Europe - a coordinated effort to build up quantum networking capacity within and between across all 27 member states |
6.3.4. | Netherlands - a unified approach to developing quantum networks for research, government and commercial use-cases |
6.3.5. | UK - the Quantum Communications Hub, Toshiba and BT are collaborating to scale up both research and commercially focused quantum network infrastructure |
6.3.6. | US - NSA and NIST focused on PQC solutions to network security |
6.3.7. | US - research and start-up activity into quantum networking continues |
6.3.8. | Japan - demand for innovative optical and wireless networks driving interest in quantum networking solutions |
6.4. | Infrastructure for quantum computer nodes |
6.4.1. | Trusted nodes incorporating quantum computers have significant infrastructure needs |
6.4.2. | Introduction to cryostats for quantum computing |
6.4.3. | Understanding cryostat architectures |
6.4.4. | Bluefors are the market leaders in cryostat supply for superconducting quantum platforms |
6.4.5. | Bluefors are the market leaders in cryostat supply for superconducting quantum computers (discussion) |
6.4.6. | Opportunities in the Asian supply chain for cryostats |
6.4.7. | Cryostats need two forms of helium, with different supply chain considerations |
6.4.8. | Helium isotope (He3) considerations |
6.4.9. | Summary of cabling and electronics requirements inside a dilution refrigerator for quantum computing |
6.4.10. | Qubit readout methods: microwaves and microscopes |
6.4.11. | Pain points for incumbent platform solutions |
6.5. | Quantum networks: SWOT analysis and conclusions |
6.5.1. | SWOT analysis of quantum networks |
6.5.2. | Quantum networks: conclusions and outlook |
7. | MARKET FORECASTS |
7.1. | Forecasting Methodology Overview |
7.2. | Quantum communication market forecast - annual revenue (USD$, Million) |
7.3. | Discussion: Quantum communication market forecast - annual revenue (USD$, Million) |
7.4. | Predicting the tipping point for quantum computing - and an estimate for Q-Day threat timeline (1) |
7.5. | Predicting the tipping point for quantum computing - and an estimate for Q-Day threat timeline (2) |
7.6. | Optimistic scenario for smart-phone QRNG |
8. | COMPANY PROFILES |
8.1. | Aegiq |
8.2. | Alea Quantum |
8.3. | AQuRand |
8.4. | Crypta Labs |
8.5. | Diraq |
8.6. | DocuSign |
8.7. | Fraunhofer FEP |
8.8. | IBM (Quantum Computers) |
8.9. | Infineon (Quantum Algorithms) |
8.10. | Menlo Systems Inc |
8.11. | ORCA Computing |
8.12. | Oxford Ionics |
8.13. | PacketLight Networks |
8.14. | Powerlase Ltd |
8.15. | Quantinuum |
8.16. | QuantrolOx |
8.17. | Quantum Computing Inc |
8.18. | Quantum Dice |
8.19. | Quantum Motion |
8.20. | Quantum Technologies |
8.21. | Quantum XChange |
8.22. | QuSecure |
8.23. | Quside |
8.24. | Randaemon |
8.25. | River Lane |
8.26. | SEEQC |
8.27. | Senko Advance Components Ltd |
8.28. | sureCore Ltd |
8.29. | Toshiba (Quantum Technology Center) |