Quantum-Key-Distribution
Quantum-Key-Distribution
Modern society is becoming increasingly reliant on the security Quantum physics dictates that Eve cannot avoid introducing disturbance
of transmitted information and communications. Data security is to some of these signals through her measurements, so she cannot avoid
currently largely delivered through the use of cryptographic keys. exposing her eavesdropping. Clearly, Bob also has to measure the
So, the protection of sensitive information is ultimately determined quantum light signals that he receives in order to establish a key shared
by the security of these keys. with Alice. Nevertheless, Alice and Bob can afterwards identify an intact
subset of shared data to keep, which are those which Alice knows Bob
In conventional encryption, an algorithm is used to encrypt information, making will not have disturbed by his measurements. They can do this without
it unintelligible to anyone who intercepts it during transit. The algorithm uses exposing the actual data values, which are then used to create the key.
keys – long strings of random numbers – for the sender to encrypt and also Alice and Bob can locate and correct errors in the data that they keep,
for the intended receiver to decrypt the data. The encryption and decryption and then mathematically compress down to a final shared secret key.
keys are identical for symmetric cryptography, but different for asymmetric These subsequent communications do not have to be encrypted (although
cryptography on which all our current public key infrastructure (PKI) is built. they could be) – the security of the final shared key is not compromised
This PKI is secure for now; however, advances in quantum computing pose a even if Eve overhears all this discussion.
severe threat. It is widely accepted that, when these are built, sizeable quantum
computers will be able to break all current PKI by running Shor’s algorithm. Once Alice and Bob have shared secret key data, they can use this in a
Clearly, for information which is only required to be secure for a short time, range of approaches. For secure communications the ultimate (information
this threat is just looming. However, for information which requires long-term theoretically secure) protection would be through the use of one-time-
security, the threat is real now. Sensitive information which is currently pad encryption. A much more economical use of the keys is to drive a
encrypted could be intercepted today, stored and then decrypted by suitable symmetric encryption system like the Advanced Encryption Standard (AES)
quantum computers when these become available. It follows then that new – this approach is compatible with current high-speed telecommunications
approaches to security are required, which are “quantum-safe” – that is safe infrastructure. Other symmetric key applications include single-use PINs,
in a future world where all forms of quantum technology exist. or passwords, or entry codes. Two important things to note are: (i) that
almost certainly the key use will be “once only” to maintain security (and
In order to utilise symmetric cryptography, the transmitter – usually described so afterwards used keys should be irreversibly deleted); (ii) the use of the
as “Alice” – and the receiver – usually described as “Bob” – use the same keys is conventional, requiring no quantum technology. It is the distribution,
key which must be secret and known only to them. Therefore, the security or replenishment, of the keys that is quantum.
of their subsequent communications is determined by the security of the key
distribution mechanism. This is where the quantum technology comes in – While QKD is a mature quantum technology, it does not perform initial
it provides a quantum secure method of key distribution, or “quantum key authentication. This means that, used in isolation, the technology could be
distribution” (QKD) for short. vulnerable to man-in-the-middle attacks, due to Alice and Bob being unable
to identify each other as friend, rather than foe. One simple solution to
To share a key through QKD, the basic idea is that Alice transmits a long initial authentication is for Alice and Bob to be provided with some initial
sequence of quantum light pulses to Bob. These may be sent down an optical shared secret (or “seed”) key material. As has been demonstrated, this
fibre or through free space, whichever technology provides the best solution, approach enables QKD to work securely in a fixed network scenario, such
but either way any adversary – usually called “Eve” – can only gain information as an optical fibre network.
on the transmitted light signals by measuring them in some way.
However, clearly a more
flexible approach is needed in
a dynamic or mobile network scenario,
where a given Alice may need to authenticate
to a Bob that she’s never met before.
There is now widespread support for the most effective approach to future
quantum-safe communications being a hybrid one, combining physical
quantum security alongside new quantum-resistant cryptography. This is
driving the Hub’s efforts on integrating QKD with PQC.
If you would like to hear more about the Hub’s work on quantum key
distribution, within the wider context of quantum-safe communications,
please contact us via [email protected]