Skip to content

Commit 9b33f29

Browse files
committed
updating dqkd docs
1 parent c42beae commit 9b33f29

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

content/DQKD/_index.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ disableToc = "true"
1111
DQKD is a functional and easy-to-set-up alternative to [QKD](https://www.nsa.gov/Cybersecurity/Quantum-Key-Distribution-QKD-and-Quantum-Cryptography-QC/), aiming to attain the level of security granted by QKD with a fraction of the deployment cost. We do so by using Qrypt's [BLAST](https://www.qrypt.com/wp-content/uploads/2022/03/Whitepaper-EverlastingSecurity.pdf#page=9) technology to generate key material safely at the endpoints. Unlike standard QKD, Qrypt's BLAST-based QKD removes the need for specialized instalations such as satalite and fiber optic.
1212
## How it works:
1313
### From the User Perspective (simplest example)
14-
1. Alice wants to generate symmetric keys with bob, without sending the key material directly between her and Bob
14+
1. Alice wants to generate symmetric keys with Bob, without sending the key material directly between her and Bob
1515

1616
2. Using her cert from Qrypt, and the ID of Bob's Key Management Entity (KME), Alice calls the API for a single key.
1717

@@ -23,7 +23,7 @@ DQKD is a functional and easy-to-set-up alternative to [QKD](https://www.nsa.gov
2323

2424
5. Bob then sends a request to his KME through the same API to replicate the key.
2525

26-
6. From his on-site KME, Bob then recieves the key material that was generated by Alice, and can then use that material to sensitive data to Alice.
26+
6. From his on-site KME, Bob then recieves the key material that was generated by Alice, and can then use that material to send sensitive data to Alice.
2727
See graphic below for a visual.
2828

2929
![FullPage](images/dqkddiagram.svg)

0 commit comments

Comments
 (0)