How can you tell a secret when everyone is able to listen in? In this course, you will learn how to use quantum effects, such as quantum entanglement and uncertainty, to implement cryptographic tasks with levels of security that are impossible to achieve classically.

This interdisciplinary course is an introduction to the exciting field of quantum cryptography, developed in collaboration between QuTech at Delft University of Technology and the California Institute of Technology.

By the end of the course you will

  • Be armed with a fundamental toolbox for understanding, designing and analyzing quantum protocols.
  • Understand quantum key distribution protocols.
  • Understand how untrusted quantum devices can be tested.
  • Be familiar with modern quantum cryptography – beyond quantum key distribution.

This course assumes a solid knowledge of linear algebra and probability at the level of an advanced undergraduate. Basic knowledge of elementary quantum information (qubits and simple measurements) is also assumed, but if you are completely new to quantum information additional videos are provided for you to fill in any gaps.

  • Fundamental ideas of quantum cryptography
  • Cryptographic concepts and tools: security definitions, the min-entropy, privacy amplification
  • Protocols and proofs of security for quantum key distribution
  • The basics of device-independent quantum cryptography
  • Modern quantum cryptographic tasks and protocols

The course materials used in this MOOC are available on TU Delft OpenCourseWare and can be viewed and downloaded for free. If you enroll for the MOOC, you will be introduced to up to date techniques in web lectures and webinars. Also, you will apply each technique to a case with fellow learners. Ultimately, the combination of these techniques provides a coherent analysis of the problem. If you want to enroll, go to to learn when the next run will start

Creative Commons License
Quantum Cryptography by TU Delft OpenCourseWare is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Based on a work at
Back to top