Abstract
The abstract frames the book as a decision aid for high-security telecommunications and data storage. Rather than ranking technologies, it compares QKD, RKD, and MKD across a common set of practical criteria, including key rate, distance, attenuation, robustness, cost, infrastructure, standardization, and operational risk. The text emphasizes that physical cryptography becomes relevant when decision-makers are unwilling to rely solely on mathematical hardness assumptions.
QKD is described as physically grounded in quantum mechanics but constrained by attenuation, short link lengths, trusted-node dependencies, high cost, and weak suitability for mobile use. RKD is presented as inexpensive, mobile-friendly, and technically simple, but limited by low key rates, short distances, and missing multi-party infrastructure. MKD is characterized as organizationally demanding but uniquely capable of transporting massive amounts of key material, making continuous one-time-pad use realistic.
- Compares QKD, RKD, and MKD in one criteria grid
- Focuses on procurement and architecture decisions
- Distinguishes security benefits from new attack surfaces
- Highlights side channels, integration risks, and logistics
- Identifies MKD as the only realistic route to large-scale OTP use