| 1. | EXECUTIVE SUMMARY |
| 1.1. | The quantum communication market 'at a glance' |
| 1.2. | The quantum threat to data security |
| 1.3. | The quantum solution to data security |
| 1.4. | 'Hack Now Decrypt Later' (HNDL) and preparing for Q-Day/ Y2Q |
| 1.5. | What is the main value proposition of QRNG compared to incumbents? |
| 1.6. | Key players developing QRNG products segmented by hardware approach |
| 1.7. | Applications of quantum random number generators (QRNG) |
| 1.8. | The basic principle of QKD uses 'observation' effects to identify eavesdroppers |
| 1.9. | Overview of key players developing QKD technology (1) |
| 1.10. | Overview of key players developing QKD technology (2) |
| 1.11. | What is a quantum network? |
| 1.12. | China - the first to realize large scale quantum networks |
| 1.13. | China - focus now on quantum memories and metropolitan networks |
| 1.14. | Europe - a coordinated effort to build up quantum networking capacity within and between across all 27 member states |
| 1.15. | US - NSA and NIST focused on PQC solutions to network security |
| 1.16. | Trusted nodes incorporating quantum computers have significant infrastructure needs |
| 1.17. | Pain points for incumbent platform solutions |
| 1.18. | National focus on eco-system building could delay market growth globally |
| 1.19. | Shortage of quantum talent is a challenge for the industry |
| 2. | INTRODUCTION |
| 2.1. | Introduction to quantum communications |
| 2.2. | The quantum sensor market 'at a glance' |
| 2.3. | Why now for quantum technologies? |
| 2.4. | Despite the hype around quantum computing, quantum communications remains as important a national priority |
| 2.5. | Is the quantum computing threat realistic? (1) |
| 2.6. | Is the quantum computing threat realistic? (2) |
| 2.7. | 'Hack Now Decrypt Later' (HNDL) and preparing for Q-Day/ Y2Q |
| 3. | INTRODUCTION POST QUANTUM CRYPTOGRAPHY (PQC) |
| 3.1. | Introduction to Post Quantum Cryptography (PQC) |
| 3.2. | Cybercrime incidents are rising in frequency and cost - driving engagement with PQC solutions |
| 3.3. | Cryptographic transitions are slow, and engagement with PQC is encouraged now |
| 3.4. | Types of cryptography |
| 3.5. | NIST taking a lead rule in PQC standardization |
| 3.6. | The market for crypto-agility and encryption management tools is growing |
| 3.7. | Is there a case for backdoors into encryption? |
| 3.8. | SWOT Analysis of PQC |
| 4. | QUANTUM RANDOM NUMBER GENERATORS (QRNG) |
| 4.1. | Overview |
| 4.1.1. | QRNG: chapter overview |
| 4.2. | Introduction to incumbent RNG technology |
| 4.2.1. | Introduction to entropy-sources and true-randomness |
| 4.2.2. | Distinguishing statistical randomness tests from true randomness |
| 4.2.3. | Overview of the established market for classical hardware random number generators, or true random number generators (TRNGs) |
| 4.2.4. | Hardware RNG in today's electronics is largely within a 'trusted platform module' TPM |
| 4.2.5. | What is the main value proposition of QRNG compared to incumbents? |
| 4.3. | Overview of QRNG technology and key players |
| 4.3.1. | Key players developing QRNG products segmented by hardware approach |
| 4.3.2. | Principle of operation of optical QRNG technology |
| 4.3.3. | What are the main form-factor approaches to creating optical QRNG? |
| 4.3.4. | Overview of technology differentiators for optical QRNG (segmented by company) |
| 4.3.5. | Why is there potentially a gap in the market for non-optical approaches to QRNG technology? |
| 4.3.6. | SWOT analysis of quantum random number generator technology |
| 4.4. | Key applications, market opportunities and challenges for QRNG |
| 4.4.1. | How are NIST standards impacting the QRNG market? |
| 4.4.2. | QRNG Application Case Studies: Encryption for Data Centers (1) |
| 4.4.3. | QRNG Application Case Studies: Encryption for Data Centers (2) |
| 4.4.4. | QRNG Application Case Studies: Consumer Electronics (Smart Phones) |
| 4.4.5. | QRNG Application Case Studies: Automotive/Connected Vehicle |
| 4.4.6. | The Connected Vehicle Supply Chain |
| 4.4.7. | QRNG Application Case Studies: Gambling and Gaming |
| 4.4.8. | QRNG Applications Case Study: Monte Carlo Simulations |
| 4.4.9. | Entropy vs. SWAP-C in the RNG/QRNG hardware market |
| 4.4.10. | Quantum random number generators: conclusions and outlook |
| 5. | QUANTUM KEY DISTRIBUTION (QKD) |
| 5.1. | Overview |
| 5.1.1. | QKD: chapter overview |
| 5.2. | Introduction to cryptographic keys and the security threat from quantum computing |
| 5.2.1. | Introduction to the role of keys and ciphers in data security |
| 5.2.2. | What is the difference between asymmetric and symmetric keys? |
| 5.2.3. | Overview of RSA encryption steps |
| 5.2.4. | How is quantum already impacting the future of encryption? |
| 5.2.5. | How could quantum computers accelerate large number factorization - and put RSA at risk? (1) |
| 5.2.6. | How could quantum computers accelerate large number factorization - and put RSA at risk? (2) |
| 5.2.7. | 'Hack Now Decrypt Later' (HNDL) and preparing for Q-Day/ Y2Q |
| 5.3. | Overview of QKD technology and key players |
| 5.3.1. | The basic principle of QKD uses 'observation' effects to identify eavesdroppers |
| 5.3.2. | An introduction to measuring single-qubit states |
| 5.3.3. | How can polarization and qubit states be used to securely distribute keys and the BB84 Protocol (1) |
| 5.3.4. | How can polarization and qubit states be used to securely distribute keys and the BB84 Protocol (2) |
| 5.3.5. | Why is QKD more secure than other key exchange mechanisms? |
| 5.3.6. | Discrete Variable vs. Continuous Variable QKD Protocols |
| 5.3.7. | Overview of key players developing QKD technology (1) |
| 5.3.8. | Overview of key players developing QKD technology (2) |
| 5.3.9. | QKD hardware is competing with a well established, cost-effective method software approach to key exchange |
| 5.3.10. | Chip-Scale QKD efforts will benefit from the growth of the PIC industry (1) |
| 5.3.11. | Chip-Scale QKD efforts will benefit from the growth of the PIC industry (2) |
| 5.3.12. | SWOT analysis of quantum key distribution technology |
| 5.3.13. | Quantum key distribution: conclusions and outlook |
| 6. | QUANTUM NETWORKS |
| 6.1. | Overview |
| 6.1.1. | Quantum Networks: chapter overview |
| 6.2. | Introduction to quantum networks and components |
| 6.2.1. | What is a quantum network? |
| 6.2.2. | The role of trusted nodes and trusted relays |
| 6.2.3. | Entanglement swapping and optical switches |
| 6.2.4. | Moving away from dark-fiber, and multiplexing with the O-Band |
| 6.2.5. | Twin-Field QKD |
| 6.2.6. | Space based quantum networks |
| 6.2.7. | An opportunity for better optical fiber and interconnects |
| 6.2.8. | Avalanche Photo Detectors (APD) |
| 6.2.9. | Single-photon avalanche diodes |
| 6.2.10. | Silicon photomultiplier |
| 6.2.11. | Comparison of common photodetectors |
| 6.2.12. | Major single photo-detector players focusing on LIDAR may seek to expand into quantum communications |
| 6.3. | Key players and case studies |
| 6.3.1. | China - the first to realize large scale quantum networks |
| 6.3.2. | China - focus now on quantum memories and metropolitan networks |
| 6.3.3. | Europe - a coordinated effort to build up quantum networking capacity within and between across all 27 member states |
| 6.3.4. | Netherlands - a unified approach to developing quantum networks for research, government and commercial use-cases |
| 6.3.5. | UK - the Quantum Communications Hub, Toshiba and BT are collaborating to scale up both research and commercially focused quantum network infrastructure |
| 6.3.6. | US - NSA and NIST focused on PQC solutions to network security |
| 6.3.7. | US - research and start-up activity into quantum networking continues |
| 6.3.8. | Japan - demand for innovative optical and wireless networks driving interest in quantum networking solutions |
| 6.4. | Infrastructure for quantum computer nodes |
| 6.4.1. | Trusted nodes incorporating quantum computers have significant infrastructure needs |
| 6.4.2. | Introduction to cryostats for quantum computing |
| 6.4.3. | Understanding cryostat architectures |
| 6.4.4. | Bluefors are the market leaders in cryostat supply for superconducting quantum platforms |
| 6.4.5. | Bluefors are the market leaders in cryostat supply for superconducting quantum computers (discussion) |
| 6.4.6. | Opportunities in the Asian supply chain for cryostats |
| 6.4.7. | Cryostats need two forms of helium, with different supply chain considerations |
| 6.4.8. | Helium isotope (He3) considerations |
| 6.4.9. | Summary of cabling and electronics requirements inside a dilution refrigerator for quantum computing |
| 6.4.10. | Qubit readout methods: microwaves and microscopes |
| 6.4.11. | Pain points for incumbent platform solutions |
| 6.5. | Quantum networks: SWOT analysis and conclusions |
| 6.5.1. | SWOT analysis of quantum networks |
| 6.5.2. | Quantum networks: conclusions and outlook |
| 7. | MARKET FORECASTS |
| 7.1. | Forecasting Methodology Overview |
| 7.2. | Quantum communication market forecast - annual revenue (USD$, Million) |
| 7.3. | Discussion: Quantum communication market forecast - annual revenue (USD$, Million) |
| 7.4. | Predicting the tipping point for quantum computing - and an estimate for Q-Day threat timeline (1) |
| 7.5. | Predicting the tipping point for quantum computing - and an estimate for Q-Day threat timeline (2) |
| 7.6. | Optimistic scenario for smart-phone QRNG |
| 8. | COMPANY PROFILES |
| 8.1. | Aegiq |
| 8.2. | Alea Quantum |
| 8.3. | AQuRand |
| 8.4. | Crypta Labs |
| 8.5. | Diraq |
| 8.6. | DocuSign |
| 8.7. | Fraunhofer FEP |
| 8.8. | IBM (Quantum Computers) |
| 8.9. | Infineon (Quantum Algorithms) |
| 8.10. | Menlo Systems Inc |
| 8.11. | ORCA Computing |
| 8.12. | Oxford Ionics |
| 8.13. | PacketLight Networks |
| 8.14. | Powerlase Ltd |
| 8.15. | Quantinuum |
| 8.16. | QuantrolOx |
| 8.17. | Quantum Computing Inc |
| 8.18. | Quantum Dice |
| 8.19. | Quantum Motion |
| 8.20. | Quantum Technologies |
| 8.21. | Quantum XChange |
| 8.22. | QuSecure |
| 8.23. | Quside |
| 8.24. | Randaemon |
| 8.25. | River Lane |
| 8.26. | SEEQC |
| 8.27. | Senko Advance Components Ltd |
| 8.28. | sureCore Ltd |
| 8.29. | Toshiba (Quantum Technology Center) |