...Together, we implemented Ekert's Protocol to test for interference in the generation of a quantum encryption key. We developed a quantum circuit with two entangled qubits and modeled eavesdropping using an additional entangled qubit, successfully satisfying QuTech Quantum Computer's single-qubit... (read more)