In our modern era of telecommunications and the Internet, information has become a valuable commodity. Sometimes it must therefore be protected against theft - in this case, loss of secret information to an eavesdropper. Most of today's transactions are protected using encryption unproven to be secure against a computational attack by a classical computer and, in fact, the standardly used encryption algorithms are provably vulnerable to the mind-boggling parallelism of a quantum computer, should one ever be physically realized. Enter quantum cryptography. Underlying nearly all forms of encryption is the necessity for a truly secret key, a random string of zeros and ones; the basic notion of quantum cryptography is to employ single photon transmissions (or the closest attainable approximation to these) to distribute the random key material, while removing the threat of an undetected eavesdropper. Now, nearly twenty years since the seminal quantum cryptography paper by Bennett and Brassard (Bennett C H and Brassard G 1984 Proc. IEEE Int. Conf. on Computers, Systems, and Signal Processing (Bangalore) (New York: IEEE) pp 175-9), we take a look at several state-of-the-art implementations, and glimpse how future quantum cryptosystems might look. We start with papers from three of the world's leading experimental quantum cryptography efforts: Stucki et al and Bethune and Risk describe working systems for quantum key distribution (QKD) over telecommunications fibres (at 1550 nanometres and 1300 nanometres, respectively). The former's achievement of quantum key exchange over 67 kilometres of optical fibre is a world record, as is the experimental demonstration by Hughes et al of daylight free-space QKD over a 10 km atmospheric range. Next, Lutkenhaus and Jahma explore the possible vulnerabilities of such systems (which employ attenuated laser pulses instead of actual single photon states) to conceivable future eavesdropping technologies. Enzer et al have implemented a totally new protocol, using polarization-entangled photons, which in some circumstances can tolerate higher error rates than the traditional one of Bennett and Brassard; moreover, the use of entanglement provides a means of `automatic source verification'. Finally, looking to the future, Elliott gives a provocative view of how these technologies may be merged into network operation, and Shapiro describes a method to combine a novel source of entangled photons with a means to transfer the photons' quantum state to trapped-atom quantum memories. If realized, these systems could presage the world's first quantum network. Focus on Quantum Cryptography Contents Quantum key distribution over 67 km with a plug&play system D Stucki, N Gisin, O Guinnard, G Ribordy and H Zbinden Autocompensating quantum cryptography Donald S Bethune and William P Risk Practical free-space quantum key distribution over 10 km in daylight and at night Richard J Hughes, Jane E Nordholt, Derek Derkacs and Charles G Peterson Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack Norbert Lutkenhaus and Mika Jahma Entangled-photon six-state quantum cryptography Daphna G Enzer, Phillip G Hadley, Richard J Hughes, Charles G Peterson and Paul G Kwiat Building the quantum network Chip Elliott Architectures for long-distance quantum teleportation Jeffrey H Shapiro Ground to satellite secure key exchange using quantum cryptography J G Rarity, P R Tapster, P M Gorman and P Knight Method for decoupling error correction from privacy amplification Hoi-Kwong Lo Paul G Kwiat University of Illinois at Urbana-Champaign, USA