Quantum safe cryptography
Does quantum computing mean all encryption is compromised? Not completely. There are challenges to manufacture quantum processors which are effective against current algorithms. But state-of-the-art technology is advancing rapidly and the true capabilities available in most research labs remains secret (especially in some government research facilities).
To counter the threat posed by quantum computing, the concept of ‘quantum-safe cryptography’ has developed in recent years. This uses encryption algorithms in conjunction with other mathematical functions to encrypt data in ways which are difficult for quantum computing to analyze. Quantum-safe algorithms have been developed, and equipment using these algorithms is beginning to become available commercially.
In 2015, a small company specializing in quantum-safe cryptography participated in the NCI Agency’s cyber security technology incubator, as part of the Agency’s Innovation Programme. PostQuantum Ltd produced a messaging App which protects data with a quantum-safe algorithm and additional security features. PostQuantum Ltd is now delivering quantum safe cryptographic products to commercial telecom operators, IT providers and the finance industry.
Quantum communication
While quantum technologies pose a threat to encryption, they offer a solution to another communications challenge – detecting whether your communications have been compromised. Whenever an unknown quantum state is measured, the state changes in some way. This provides a very useful property to identify if communications have been intercepted and it is exploited in Quantum Key Distribution (QKD).
QKD is the first quantum technology to emerge in commercial use. Civilian standards for QKD are already being developed by the European Telecommunications Standards Institute (ETSI) and others, while companies such as IDquantique offer commercial services.
QKD exploits the entanglement property of quantum mechanics to securely distribute keys for conventional communication - the most sensitive element of the communication process. Conventional security mechanisms (often employing quantum-safe cryptography) are then used to protect traffic transmitted conventionally.
The same quantum principles of QKD can be applied to the entire communication network. A 2000km quantum communication link now operates between Beijing and Shanghai demonstrating the concept is viable for long distances. In August 2016, China also launched a satellite purported to be able to generate and distribute quantum encryption keys from space.
Most current technology addresses point-to-point communications, as using this technology for many-to-many network connections is complex. However, there is significant research activity in this area from both the government and commercial sectors, so rapid advances will happen.
And as the use of QKD becomes more widespread, this tool, while useful for national and international defence, could also pose a threat to our societies as it offers our adversaries coding techniques that are guaranteed to be unbreakable.
Quantum sensing
Quantum technologies in sensing has huge potential, but is likely to have an impact beyond the three to five years window of our Technology Watch series. However quantum radar, and new mechanisms to sense minute changes in gravity, electric field or magnetism have the potential to detect hidden massive objects (machinery and weapons), or movement of people beyond the line of sight, for example in the urban canyons of a modern city environment. Quantum sensing could make our oceans essentially transparent.
Quantum radars exploit entanglement and can significantly enhance target detection capabilities. These systems rely on entangled photons – the elementary particles of the electromagnetic field. As such, quantum radars offer a significant improvement in performance and the possibility of detecting and identifying stealth targets. Also, they are more resilient against the use of jamming countermeasures.
Quantum technology is now firmly into the realm of science fact rather than fiction, as it is providing (or promising) a step-change in the technological capabilities of C4ISR systems – and those of our adversaries.