You are on page 1of 20

MAY 2020

The Executive’s
Guide to Quantum
Cryptography: Security
in a Post-Quantum World
BY ARTHUR HERMAN
© 2020 Hudson Institute, Inc. All rights reserved.

For more information about obtaining additional copies of this or other Hudson
Institute publications, please visit Hudson’s website, www.hudson.org

ABOUT HUDSON INSTITUTE

Hudson Institute is a research organization promoting American leadership and


global engagement for a secure, free, and prosperous future.

Founded in 1961 by strategist Herman Kahn, Hudson Institute challenges


conventional thinking and helps manage strategic transitions to the future through
interdisciplinary studies in defense, international relations, economics, health care,
technology, culture, and law.

Hudson seeks to guide public policy makers and global leaders in government and
business through a vigorous program of publications, conferences, policy briefings
and recommendations.

Visit www.hudson.org for more information.

We would like to acknowledge ID Quantique for their generous support.

Hudson Institute
1201 Pennsylvania Avenue, N.W.
Suite 400
Washington, D.C. 20004

+1.202.974.2400
info@hudson.org
www.hudson.org

Cover: Creative rendering of a circuit padlock in network space. (Getty Images)


APRIL 2020

The Executive’s
Guide to Quantum
Cryptography: Security
in a Post-Quantum World
BY ARTHUR HERMAN
INTRODUCTION

CEOs and CIOs are accountable math problems on which today’s


for protecting their company, their encryption systems depend.
investors, their customers, and their
employees from cyber-threats that At the same time, considerable
endanger the company’s private confusion exists, even among experts,
information and financial well-being. about the true potential of the quantum
threat, the timeline for its advent,
Today the most serious of these is the and the steps needed to protect a
threat to the integrity and confidentiality company’s future.
of data and information that are vital to
a company’s success. This does not This guidebook answers key questions
come only from current cyber-attacks about how quantum technology itself,
and hackers, which according to 2018 in the form of quantum random-number
estimates by cyber-research firm generators (QRNG) and quantum-key
Accenture, cost organizations globally distribution (QKD), can provide secure
an average of $13 million a year. It also solutions for addressing the quantum
includes the future threat posed by computer threat.
quantum computers, which will render
public-key cryptographic systems After explaining how QRNG and QKD
helpless and enable competitors, work, the guidebook recommends that
adversaries, and possibly foreign executives combine these quantum
entities to steal a company’s most cryptographic solutions with other
precious information without leaving a software-based, quantum-resistant
trace behind. applications that can deter future
quantum computer attacks.
In October 2018, global research and
advisory firm Gartner elevated the Finally, the guide shows how quantum
quantum computer threat to the top of science will determine the future of
its list of digital disruptions for which communication technology by making
CIOs may not be prepared. It noted it safe, secure, and ready for the
that “quantum computers have the twenty-first century.
potential to run massive amounts of
calculations in parallel in seconds,” Business management guru Peter
including cracking the complicated Drucker once posed the question,

THE EXECUTIVE’S GUIDE TO QUANTUM CRYPTOGRAPHY: SECURITY IN A POST-QUANTUM WORLD | 5


“Will the corporation survive?” One that company executives have made
thing is certain: no corporation, every effort to secure that data and
agency, or enterprise can survive if its information, now and in the future.
most important data and information
are constantly and systematically It is to help senior executives fulfill that
vulnerable to attack and/or theft. trust and ensure peace of mind that
this guidebook was written.
Employees, shareholders, investors,
and the general public need to trust

6 | HUDSON INSTITUTE
I. WHAT IS QUANTUM SUPREMACY?

On October 23, 2019, Google that would take even the fastest
published a paper in the supercomputer ten thousand years.
journal Nature entitled “Quantum
Supremacy Using a Programmable This milestone, which some prefer
Superconducting Processor.” The to call quantum advantage, was a
tech giant announced its achievement major stepping-stone to the quantum
of a much-vaunted goal: quantum computers of the future, which may
supremacy. become serious threats to encryption
systems. In fact, Google’s CEO later
That means that a quantum computer predicted that the end of encryption
solved in a matter of minutes a problem could come in as little as five years.

THE EXECUTIVE’S GUIDE TO QUANTUM CRYPTOGRAPHY: SECURITY IN A POST-QUANTUM WORLD | 7


II. HOW DO QUANTUM COMPUTERS
POSE A THREAT TO TODAY’S
ENCRYPTION?

What is threatening is that today’s problem at the heart of cryptography


cryptography largely depends on will be solved by a large-scale quantum
supposedly hard math problems, computer. This was the first instance
based on the factorization of large where the astonishing computing
numbers into their prime factors.* Why power of a quantum computer was
“supposedly”? Because before 1994, shown to have practical applications.
factoring was truly thought to be a
hard math problem, but that year, Shor’s discovery changed our
Peter Shor invented an algorithm (now perception of the quantum computer
named after him) that factorizes large and started the rush towards the
numbers easily. The only caveat is that physical realization of a quantum
this algorithm must run on a quantum computer and the discovery of new
computer, meaning that the very algorithms that will exploit their power.

* How does this work? A prime number is an integer, which cannot be factorized into smaller
ones. For example, 23 is a prime number; 21 is not, even though its prime factors are 3 and 7. It
is easy to multiply numbers, but much harder to invert this operation and find the prime factors,
especially for large enough numbers. This difference, and the resulting difficulty in factorizing
those large numbers, lies at the heart of current public-key cryptography.

8 | HUDSON INSTITUTE
III. HOW SOON WILL THE THREAT
BECOME A REALITY?

Estimates vary, but growing expert open channels, such as the internet,
consensus says a large-scale quantum could be harvested today and stored
computer will be available within until it could eventually be decrypted
the next decade. In fact, Google’s by a quantum computer.
CEO, Sundar Pichai, was quoted as
predicting at the World Economic Is the quantum threat real?
Forum in Davos that quantum Cybersecurity experts certainly think
computers will spell the end of so. A 2019 DigiCert survey of IT
standard encryption within five to ten directors, IT security managers, and
years.1
IT “generalists” working for some 400
firms in the United States, Europe,
Either way, time is short for developing and Japan found that 55 percent
a quantum-safe response. This is saw the quantum computing threat
particularly true if you have data as “somewhat to extremely large”
that needs to remain confidential for today, and 71 percent as “somewhat
years to come. Records of financial to extremely large” in the future.
transactions and medical data, for Surprisingly, only 35 percent have any
example, need to be kept secure for budget today for making their systems
decades, meaning that the systems quantum-safe, and only 59 percent
storing them should be reinforced now anticipated a “large to somewhat
against future advances. There is also a large” budget sometime in the future.2
serious risk that data transmitted over

1 Hannah Boland, “Quantum Computing Could End Encryption within Five Years, says Google
Boss, Telegraph, January 22, 2020, https://www.telegraph.co.uk/technology/2020/01/22/goo-
gles-sundar-pichai-quantum-computing-could-end-encryption/.

2 DigiCert, Quantum’s Promise and Peril:2019 DigiCert Post-Quantum Crypto Survey, https://
www.digicert.com/resources/industry-report/2019-Post-Quantum-Crypto-Survey.pdf.

THE EXECUTIVE’S GUIDE TO QUANTUM CRYPTOGRAPHY: SECURITY IN A POST-QUANTUM WORLD | 9


The bottom line is, the risk is well commitment to offset that risk is still
understood today. Unfortunately, the inadequate.

10 | HUDSON INSTITUTE
IV. WHAT ARE MY OPTIONS
TO PROTECT MY DATA
AND NETWORKS?

One option is to use post-quantum However, post-quantum cryptography


cryptography. Researchers are working rests on the unprovable assumption
on methods to improve the security that these new algorithms are difficult
of software-based signatures and to reverse. But the question that
key-exchange methods using post- remains is, difficult for whom? How
quantum cryptography—methods do we know that a solution to these
that should continue to be effective problems has not been discovered,
after quantum computers are powerful even if it is unpublished? And if this
enough to break existing public solution does not exist yet, how do
-key cryptosystems. A number of we know that it will not be found in
products that mix different algorithms, the future, once more and more clever
known as hybrids, are already in computer scientists develop the next
operation. The National Institute generations of quantum computers?
of Standards and Technology (NIST) The answer is simple: we do not.
is working on a set of standards
for quantum-resistant algorithms There are, however, tools that use
(QRA), which it hopes to complete quantum technology that can already
by 2024. The real test will come improve security: quantum random
when quantum computers arrive on number generators (QRNG) and
the scene. quantum-key distribution (QKD).

THE EXECUTIVE’S GUIDE TO QUANTUM CRYPTOGRAPHY: SECURITY IN A POST-QUANTUM WORLD | 11


V. HOW CAN THE RANDOMNESS
OF QUANTUM RANDOM NUMBER
GENERATION HELP ENCRYPT DATA?

A random number is a number Germany’s BSI (the counterpart of


generated by a process whose NIST), which delivered the AIS31
outcome is completely unpredictable certification for some Quantis systems.
and which cannot be reliably A new QRNG chip, with reduced form
reproduced. Random numbers are factor and power consumption, is
required in many applications, from AEC-Q100 certified and is compliant
cryptosystems to gaming. In fact, with the NIST 800-90A/B/C standard.
almost every cryptographic process These certifications are often required
starts with the generation of random by end customers for real-world
numbers. Poor randomness has been implementations.
linked to several significant faulty
implementations and hacks. An Australian company, Quintessence
Labs, has a QRNG-based Qstream
Quantum physics is fundamentally product suite that is being used to
random, unlike classical physics, which secure billions of highly sensitive legal
is deterministic. Quantum Random documents in the cloud. Many other
Number Generators, or QRNGs, start-up companies are also active in
integrate the randomness of quantum this field.
physics to generate truly random
numbers for encrypting messages and Improving randomness generation with
for other cryptographic applications. QRNGs, which can easily be added to
current security solutions, is the first
The Swiss company ID Quantique, way to improve security today. The
for example, is manufacturing a second solution, QKD, represents a
range of quantum-generated random new way to distribute these random
communication products known as numbers and generate secure keys
Quantis. An important feature of these between different locations.
products is that they are already
certified by national bodies such as

12 | HUDSON INSTITUTE
Figure 1: Adding Quantum-safe Security
Layers with QRNG and QKD

Eavesdropper

Data Encrypted with Key

10111010001 10111010001
Location 1 Location 2

QRNG Adding Quantum-Safe QRNG


QKD Security Layer QKD

Quantum Key

SOURCE: ID QUANTIQUE (MARCH 2020), HTTP://WWW.IDQUANTIQUE.COM/

THE EXECUTIVE’S GUIDE TO QUANTUM CRYPTOGRAPHY: SECURITY IN A POST-QUANTUM WORLD | 13


VI. WHAT IS QUANTUM-KEY
DISTRIBUTION?

Quantum-Key Distribution, or QKD, tries to tamper with the data, the two
can offer long-term security against a QKD parties will immediately know.
future quantum computer attack. That
is because it rests on fundamental In short, quantum cryptography is the
physical principles rather than specific only known method for transmitting a
mathematical assumptions. Ultimately, secret key over long distances that is
provable secure communication boils provably secure in accordance with
down to distribution of a unique secret the fundamental properties of quantum
key, used to encrypt a message, physics.
which like QRNGs is completely
random and used only once. QKD This exchange of encryption keys
can establish such a key remotely via QKD will eventually become the
between two distinct parties, and it is cornerstone of network security for all
essentially immune to hacking by both high-value data, but it is also a way to
conventional hackers and quantum protect high-value data today.
computers. This is because if anyone

14 | HUDSON INSTITUTE
VII. HOW DO I IMPLEMENT QKD
SOLUTIONS TO PROTECT MY DATA?

Current technological breakthroughs and practical. Some are doing this


are pushing the distance over which now. Korean ICT giant SK Telecom
quantum signals can be sent. Trials is applying QRNGs to the subscriber
using laboratory-grade hardware and authentication center of its 5G
“dark fibers”—optical fibers laid by network. It is already adding the ID
telecommunications companies but Quantique QKD technology to the
lying unused—have sent quantum Seoul-Daejeon section of its LTE
signals up to four hundred kilometers. and 5G networks to prevent hacking
Practical systems that can be and eavesdropping. Its plan is to
easily deployed over an existing strengthen security for 5G and LTE
infrastructure are currently limited data transmission and reception over
to distances of about one hundred the whole network, to provide an
kilometers. A scalable architecture extra value to their customers using
that includes trusted nodes to link their network by mitigating the risk
successive QKD systems can extend of network intrusion and exploitation
the practical range of this technology of user’s data. Implementing these
and allow keys to be securely shared measures into your network now
over a wide-ranging network, making protects against the future costs
large-scale implementation possible of rebuilding security and repairing

Figure 2: QKD in a 5G Network

SOURCE: ID QUANTIQUE (MARCH 2020), HTTP://WWW.IDQUANTIQUE.COM/

THE EXECUTIVE’S GUIDE TO QUANTUM CRYPTOGRAPHY: SECURITY IN A POST-QUANTUM WORLD | 15


customer reputation in a post- most of eastern China. They are also
quantum world. actively deploying satellites that use
QKD technology in space.
An American company, Quantum
Xchange, is using QKD to provide Europe is also active in this arena and
point-to-multipoint transmissions for is currently planning for a quantum
financial markets on Wall Street. communication infrastructure that
should encompass most of the EU.
We must acknowledge that the United
States is not alone in this field and is The bottom line is that QKD offers
probably not even the leader today. the ultimate solution against quantum
China has already built a QKD network computer attack in the future, while
running for two thousand kilometers QRNG provides a provable and
between Shanghai and Beijing and is guaranteed confidentiality link that is
working on an extension running eleven available now.
thousand kilometers that will cover

16 | HUDSON INSTITUTE
VIII. WHAT IS THE FUTURE OF QKD?

As QKD technology grows and the stations in Vienna and Beijing had
matures, it will form the basis of a been generated using an optical QKD
global quantum communications payload aboard the Chinese satellite
network that will include space- Micius.
based networks. A global network
of spacecraft and ground stations, That event gives us all a glimpse of the
distributing secret encryption keys by quantum future, especially quantum
means of quantum technology, will be communications. But we can expect
able to meet emerging and long-term more. The development of quantum
threats to data security. repeaters will transform a QKD
network, which only transports keys, to
This is not science fiction. On a full quantum internet, which will link
September 29, 2017, the first clusters of quantum computers working
intercontinental video conference using together to perform computations we
quantum cryptography took place cannot even think about today. In short,
between the presidents of the Austrian there is a brave new world taking shape
and Chinese academies of science. thanks to quantum technology, and not
The cryptographic key pair used by all of it is frightening or dangerous.

THE EXECUTIVE’S GUIDE TO QUANTUM CRYPTOGRAPHY: SECURITY IN A POST-QUANTUM WORLD | 17


CONCLUSION: WHAT DO
I NEED TO KNOW TO MAKE
A READINESS PLAN?

As noted earlier, information is a Second, catalog where


critical asset for today’s businesses, cryptography is used in your
which must protect proprietary existing networks and data systems
information as zealously as defense and determine how long current
agencies guard classified information. cyber-protections will last.
Therefore, any CEO or CIO who
needs to know where that protection Even if current protections have a long
should go in the future, and how, must shelf life, in less than a decade no
understand the current state of cyber networks or data systems will be safe
and other IT security protections. unless steps are taken to render them
quantum-secure. On the other hand,
It is vital to develop a checklist for a if protections for important platforms
readiness or quantum risk-assessment have expired or are about to expire,
plan, which should include the this offers an opportunity to implement
following: a security reset by incorporating
hybrid tools and other solutions that
First, find out how data and other can be progressively upgraded and
information is stored, and who made future-proof, including quantum
has access to the most critical cryptography.
information.
Third, decide which critical data are
Every CEO and CIO needs to your company’s or agency’s most
remember: data breaches occur important assets, and determine
because someone has deemed the whether they have the best
targeted information to be critical. possible protection today as well as
If executives do not know what tomorrow.
information is critical in their company
or agency, it is important for them to The general rule for all cybersecurity
find out. solutions is that the “crown jewels”—

18 | HUDSON INSTITUTE
your company’s or agency’s data and Check the following websites for
systems—deserve the best and most additional information:
immediate protection. That means they
deserve quantum-safe solutions that https://www.idquantique.com
can be sustained over time, especially
over the anticipated time line for the https://www.hudson.org/
advent of quantum computers. This policycenters/36-quantum-alliance-
is where QKD should be able to help, initiative https://csrc.nist.gov/projects/
starting today. post-quantum-cryptography

Finally, ask whether the vendors https://www.etsi.org/technologies-


and suppliers with whom you clusters/technologies/quantum-safe-
share data and information have cryptography
quantum-safe encryption, and if
they do not, find out when they https://quantumcomputingreport.com/
will begin quantum-proofing their
critical systems. https://www.abiresearch.com/
market-research/product/1028952-
No company is an island unto itself. cryptography-in-the-quantum-
This means no amount of quantum- computing-era/
proofing at home will protect data and
information shared with companies or
entities that are themselves vulnerable
to quantum attack. Opening this
dialogue with vendors and suppliers
will alert them to the need to quantum-
proof their own data and networks and
offer them the opportunity to look at
the latest quantum-safe technologies
available today, including quantum
cryptography solutions.

THE EXECUTIVE’S GUIDE TO QUANTUM CRYPTOGRAPHY: SECURITY IN A POST-QUANTUM WORLD | 19


Hudson Institute
1201 Pennsylvania Avenue, Fourth Floor, Washington, D.C. 20004
+1.202.974.2400 www.hudson.org

You might also like