| 1. | EXECUTIVE SUMMARY | 
| 1.1. | The quantum communication market 'at a glance' | 
| 1.2. | The quantum threat to data security | 
| 1.3. | The quantum solution to data security | 
| 1.4. | 'Hack Now Decrypt Later' (HNDL) and preparing for Q-Day/ Y2Q | 
| 1.5. | What is the main value proposition of QRNG compared to incumbents? | 
| 1.6. | Key players developing QRNG products segmented by hardware approach | 
| 1.7. | Applications of quantum random number generators (QRNG) | 
| 1.8. | The basic principle of QKD uses 'observation' effects to identify eavesdroppers | 
| 1.9. | Overview of key players developing QKD technology (1) | 
| 1.10. | Overview of key players developing QKD technology (2) | 
| 1.11. | What is a quantum network? | 
| 1.12. | China - the first to realize large scale quantum networks | 
| 1.13. | China - focus now on quantum memories and metropolitan networks | 
| 1.14. | Europe - a coordinated effort to build up quantum networking capacity within and between across all 27 member states | 
| 1.15. | US - NSA and NIST focused on PQC solutions to network security | 
| 1.16. | Trusted nodes incorporating quantum computers have significant infrastructure needs | 
| 1.17. | Pain points for incumbent platform solutions | 
| 1.18. | National focus on eco-system building could delay market growth globally | 
| 1.19. | Shortage of quantum talent is a challenge for the industry | 
| 2. | INTRODUCTION | 
| 2.1. | Introduction to quantum communications | 
| 2.2. | The quantum sensor market 'at a glance' | 
| 2.3. | Why now for quantum technologies? | 
| 2.4. | Despite the hype around quantum computing, quantum communications remains as important a national priority | 
| 2.5. | Is the quantum computing threat realistic? (1) | 
| 2.6. | Is the quantum computing threat realistic? (2) | 
| 2.7. | 'Hack Now Decrypt Later' (HNDL) and preparing for Q-Day/ Y2Q | 
| 3. | INTRODUCTION POST QUANTUM CRYPTOGRAPHY (PQC) | 
| 3.1. | Introduction to Post Quantum Cryptography (PQC) | 
| 3.2. | Cybercrime incidents are rising in frequency and cost - driving engagement with PQC solutions | 
| 3.3. | Cryptographic transitions are slow, and engagement with PQC is encouraged now | 
| 3.4. | Types of cryptography | 
| 3.5. | NIST taking a lead rule in PQC standardization | 
| 3.6. | The market for crypto-agility and encryption management tools is growing | 
| 3.7. | Is there a case for backdoors into encryption? | 
| 3.8. | SWOT Analysis of PQC | 
| 4. | QUANTUM RANDOM NUMBER GENERATORS (QRNG) | 
| 4.1. | Overview | 
| 4.1.1. | QRNG: chapter overview | 
| 4.2. | Introduction to incumbent RNG technology | 
| 4.2.1. | Introduction to entropy-sources and true-randomness | 
| 4.2.2. | Distinguishing statistical randomness tests from true randomness | 
| 4.2.3. | Overview of the established market for classical hardware random number generators, or true random number generators (TRNGs) | 
| 4.2.4. | Hardware RNG in today's electronics is largely within a 'trusted platform module' TPM | 
| 4.2.5. | What is the main value proposition of QRNG compared to incumbents? | 
| 4.3. | Overview of QRNG technology and key players | 
| 4.3.1. | Key players developing QRNG products segmented by hardware approach | 
| 4.3.2. | Principle of operation of optical QRNG technology | 
| 4.3.3. | What are the main form-factor approaches to creating optical QRNG? | 
| 4.3.4. | Overview of technology differentiators for optical QRNG (segmented by company) | 
| 4.3.5. | Why is there potentially a gap in the market for non-optical approaches to QRNG technology? | 
| 4.3.6. | SWOT analysis of quantum random number generator technology | 
| 4.4. | Key applications, market opportunities and challenges for QRNG | 
| 4.4.1. | How are NIST standards impacting the QRNG market? | 
| 4.4.2. | QRNG Application Case Studies: Encryption for Data Centers (1) | 
| 4.4.3. | QRNG Application Case Studies: Encryption for Data Centers (2) | 
| 4.4.4. | QRNG Application Case Studies: Consumer Electronics (Smart Phones) | 
| 4.4.5. | QRNG Application Case Studies: Automotive/Connected Vehicle | 
| 4.4.6. | The Connected Vehicle Supply Chain | 
| 4.4.7. | QRNG Application Case Studies: Gambling and Gaming | 
| 4.4.8. | QRNG Applications Case Study: Monte Carlo Simulations | 
| 4.4.9. | Entropy vs. SWAP-C in the RNG/QRNG hardware market | 
| 4.4.10. | Quantum random number generators: conclusions and outlook | 
| 5. | QUANTUM KEY DISTRIBUTION (QKD) | 
| 5.1. | Overview | 
| 5.1.1. | QKD: chapter overview | 
| 5.2. | Introduction to cryptographic keys and the security threat from quantum computing | 
| 5.2.1. | Introduction to the role of keys and ciphers in data security | 
| 5.2.2. | What is the difference between asymmetric and symmetric keys? | 
| 5.2.3. | Overview of RSA encryption steps | 
| 5.2.4. | How is quantum already impacting the future of encryption? | 
| 5.2.5. | How could quantum computers accelerate large number factorization - and put RSA at risk? (1) | 
| 5.2.6. | How could quantum computers accelerate large number factorization - and put RSA at risk? (2) | 
| 5.2.7. | 'Hack Now Decrypt Later' (HNDL) and preparing for Q-Day/ Y2Q | 
| 5.3. | Overview of QKD technology and key players | 
| 5.3.1. | The basic principle of QKD uses 'observation' effects to identify eavesdroppers | 
| 5.3.2. | An introduction to measuring single-qubit states | 
| 5.3.3. | How can polarization and qubit states be used to securely distribute keys and the BB84 Protocol (1) | 
| 5.3.4. | How can polarization and qubit states be used to securely distribute keys and the BB84 Protocol (2) | 
| 5.3.5. | Why is QKD more secure than other key exchange mechanisms? | 
| 5.3.6. | Discrete Variable vs. Continuous Variable QKD Protocols | 
| 5.3.7. | Overview of key players developing QKD technology (1) | 
| 5.3.8. | Overview of key players developing QKD technology (2) | 
| 5.3.9. | QKD hardware is competing with a well established, cost-effective method software approach to key exchange | 
| 5.3.10. | Chip-Scale QKD efforts will benefit from the growth of the PIC industry (1) | 
| 5.3.11. | Chip-Scale QKD efforts will benefit from the growth of the PIC industry (2) | 
| 5.3.12. | SWOT analysis of quantum key distribution technology | 
| 5.3.13. | Quantum key distribution: conclusions and outlook | 
| 6. | QUANTUM NETWORKS | 
| 6.1. | Overview | 
| 6.1.1. | Quantum Networks: chapter overview | 
| 6.2. | Introduction to quantum networks and components | 
| 6.2.1. | What is a quantum network? | 
| 6.2.2. | The role of trusted nodes and trusted relays | 
| 6.2.3. | Entanglement swapping and optical switches | 
| 6.2.4. | Moving away from dark-fiber, and multiplexing with the O-Band | 
| 6.2.5. | Twin-Field QKD | 
| 6.2.6. | Space based quantum networks | 
| 6.2.7. | An opportunity for better optical fiber and interconnects | 
| 6.2.8. | Avalanche Photo Detectors (APD) | 
| 6.2.9. | Single-photon avalanche diodes | 
| 6.2.10. | Silicon photomultiplier | 
| 6.2.11. | Comparison of common photodetectors | 
| 6.2.12. | Major single photo-detector players focusing on LIDAR may seek to expand into quantum communications | 
| 6.3. | Key players and case studies | 
| 6.3.1. | China - the first to realize large scale quantum networks | 
| 6.3.2. | China - focus now on quantum memories and metropolitan networks | 
| 6.3.3. | Europe - a coordinated effort to build up quantum networking capacity within and between across all 27 member states | 
| 6.3.4. | Netherlands - a unified approach to developing quantum networks for research, government and commercial use-cases | 
| 6.3.5. | UK - the Quantum Communications Hub, Toshiba and BT are collaborating to scale up both research and commercially focused quantum network infrastructure | 
| 6.3.6. | US - NSA and NIST focused on PQC solutions to network security | 
| 6.3.7. | US - research and start-up activity into quantum networking continues | 
| 6.3.8. | Japan - demand for innovative optical and wireless networks driving interest in quantum networking solutions | 
| 6.4. | Infrastructure for quantum computer nodes | 
| 6.4.1. | Trusted nodes incorporating quantum computers have significant infrastructure needs | 
| 6.4.2. | Introduction to cryostats for quantum computing | 
| 6.4.3. | Understanding cryostat architectures | 
| 6.4.4. | Bluefors are the market leaders in cryostat supply for superconducting quantum platforms | 
| 6.4.5. | Bluefors are the market leaders in cryostat supply for superconducting quantum computers (discussion) | 
| 6.4.6. | Opportunities in the Asian supply chain for cryostats | 
| 6.4.7. | Cryostats need two forms of helium, with different supply chain considerations | 
| 6.4.8. | Helium isotope (He3) considerations | 
| 6.4.9. | Summary of cabling and electronics requirements inside a dilution refrigerator for quantum computing | 
| 6.4.10. | Qubit readout methods: microwaves and microscopes | 
| 6.4.11. | Pain points for incumbent platform solutions | 
| 6.5. | Quantum networks: SWOT analysis and conclusions | 
| 6.5.1. | SWOT analysis of quantum networks | 
| 6.5.2. | Quantum networks: conclusions and outlook | 
| 7. | MARKET FORECASTS | 
| 7.1. | Forecasting Methodology Overview | 
| 7.2. | Quantum communication market forecast - annual revenue (USD$, Million) | 
| 7.3. | Discussion: Quantum communication market forecast - annual revenue (USD$, Million) | 
| 7.4. | Predicting the tipping point for quantum computing - and an estimate for Q-Day threat timeline (1) | 
| 7.5. | Predicting the tipping point for quantum computing - and an estimate for Q-Day threat timeline (2) | 
| 7.6. | Optimistic scenario for smart-phone QRNG | 
| 8. | COMPANY PROFILES | 
| 8.1. | Aegiq | 
| 8.2. | Alea Quantum | 
| 8.3. | AQuRand | 
| 8.4. | Crypta Labs | 
| 8.5. | Diraq | 
| 8.6. | DocuSign | 
| 8.7. | Fraunhofer FEP | 
| 8.8. | IBM (Quantum Computers) | 
| 8.9. | Infineon (Quantum Algorithms) | 
| 8.10. | Menlo Systems Inc | 
| 8.11. | ORCA Computing | 
| 8.12. | Oxford Ionics | 
| 8.13. | PacketLight Networks | 
| 8.14. | Powerlase Ltd | 
| 8.15. | Quantinuum | 
| 8.16. | QuantrolOx | 
| 8.17. | Quantum Computing Inc | 
| 8.18. | Quantum Dice | 
| 8.19. | Quantum Motion | 
| 8.20. | Quantum Technologies | 
| 8.21. | Quantum XChange | 
| 8.22. | QuSecure | 
| 8.23. | Quside | 
| 8.24. | Randaemon | 
| 8.25. | River Lane | 
| 8.26. | SEEQC | 
| 8.27. | Senko Advance Components Ltd | 
| 8.28. | sureCore Ltd | 
| 8.29. | Toshiba (Quantum Technology Center) |