Date Added: May 2011
Quantum cryptography provides security using the laws of quantum mechanics. Currently, several types of protocols of Quantum Key Distribution (QKD) have been established. Some QKD protocols have been certified by proofs of unconditional security. QKD protocols have been confirmed to be resistant to any possible attack. Along with the progress in key transmission and post processing, the system control needs to be integrated with some steps for the QKD. No future technology can break such security. There is a sequence of process for implementing a QKD protocol. Starting from clock synchronization function, real-time frame synchronization, transmission, post-processing protocols to system control and security. In this paper, the authors are considering only transmission and system control for QKD.