How to unlock the cybersecurity potential of quantum computers

An image of security icons for a network encircling a digital blue earth.
(Image credit: Shutterstock)

Momentum around quantum computing grows almost daily, with the technology edging closer to mainstream adoption and promising major opportunity for economic growth. The UK is one of many countries racing to develop a quantum-ready economy, with such technologies listed as ‘vital to cyber power’ within the Government’s recently announced National Cyber Strategy. But while quantum computers offer an unparalleled opportunity given their power, this potential also brings with it a severe cyber security threat which makes quantum unviable without first being secured.

About the author

Andrew Shields, Head of the Quantum Technology Division at Toshiba Europe.

Public key encryption a critical part of today’s cyber security infrastructure – essential to the web, ecommerce, and the secure transfer and storage of vast quantities of sensitive business and personal data. Yet the underlying security of these public key encryption, taken for granted for a long time, is now under threat. We’re living at a time where cyber-attacks are becoming increasingly numerous, advanced, and diverse. Ransomware, encrypted threats and cryptojacking are just a few attack methods found to have significantly increased in number over the past year, according to SonicWall’s 2022 Cyber Threat Report.

The concern is that this is soon to be aided further by the arrival of quantum computers, which will severely weaken much of the encryption techniques that we rely on today. As such, there is a need to future-proof data now before it’s too late, particularly that which remains sensitive for a long time – such as genomic or financial information – given hackers can bide their time as quantum looms closer, in the meantime harvesting encrypted data that they’ll soon be able to break.

Negating the quantum threat

Fortunately, there are solutions in play to negate this threat in the form of quantum key distribution (QKD) – a secure method of generating and distributing secret keys between two parties on an optical network. By harnessing the properties of particles like photons, QKD can be used to generate and distribute secret keys needed for cryptographic applications. By sending streams of encoded single photons through a network, it is possible to share a secret digital key that can be used for encrypting or authenticating information while also preventing cyber criminals from accessing and using the keys.

Through decades of tireless research QKD has been developed to the point where it is now both commercially viable and available. QKD systems such as Toshiba’s have been refined to overcome stumbling blocks to the technology through innovative capabilities such as high key rates, longer transmission lengths, multiplexing and active stabilization. Multiplexing enables QKD to be implemented on data carrying fiber, subsequently reducing the cost of deployment and ensuring it can work within the existing network infrastructure supplied by today’s carriers. 

Active stabilization enables a QKD system to distribute key material continuously in even the most challenging operating conditions, and without any user intervention – providing the stability necessary for real-world deployment. The net of this is that these systems are more future proof and easier to deploy and operate in real, deployed networks. And real-world deployment is exactly what we are now seeing, with it no surprise that organizations within sectors handling highly confidential data are implementing quantum-secured networks via this method.

Real-world deployments

In the UK, the National Composites Centre (NCC) and Centre for Modelling & Simulation (CFMS) have deployed a QKD network between their sites in Bristol demonstrating the secure transmission of confidential information which replaced a ‘manual’ approach of physically transporting sensitive design and manufacturing data on portable storage devices – subsequently saving time and enhancing the security of critical data. Meanwhile in financial services, a major international bank has successfully secured a mission-critical blockchain application.

It is telling that within such sectors where data privacy is of paramount importance – smart manufacturing, finance, and healthcare – the quantum threat is already being taken seriously. It’s now imperative that other sectors follow suit before it is too late. Meanwhile the evolution of QKD continues in a race to ensure wider protections for businesses and society in the quantum era. Most notably at an IoT and device-level, a chip-based QKD system could maximize protection, enabling mass-deployment of such security in this age of unprecedented data proliferation.

We feature the best malware removal tools.

Andrew Shields is Head of Quantum Technology at Toshiba Europe.

Read more
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
HP LaserJet 8501x
HP launches world's first printers that can resist quantum computer attacks
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Fortifying the UK’s energy sector: The cybersecurity imperative in an AI-driven future
A wall of data on a large screen.
“It's the same doors that the good guys use, that the bad guys can walk through” - former White House tech advisor on data-centric security in the wake of Salt Typhoon
Optical system for data encryption
Is it quantum-resistant? Researchers create 'uncrackable' encryption system by pairing AI and holograms produced by laser
Cloud, networking and internet
Under the hood of data sovereignty
Latest in Security
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Representational image depecting cybersecurity protection
Cisco smart licensing system sees critical security flaws exploited
Latest in Features
The Claude, ChatGPT, Google Gemini and Perplexity logos, clockwise from top left
The ultimate AI search face-off - I pitted Claude's new search tool against ChatGPT Search, Perplexity, and Gemini, the results might surprise you
The home screen on an iPhone 16e smartphone
I think the iPhone 16e is too expensive – and as it turns out, so does nearly everybody else
Helly R and Mark S look shocked in Severance season 2
5 questions Severance season 3 needs to answer when the Apple TV+ hit returns
Neon artwork of a stylised SSD against a brick wall.
The dawn of PCIe 7.0 could mean faster SSDs for everyone - but not just yet
Resident Evil 4 Remake Ashley
Forget the Steam Spring Sale that's just ended, these are the six best deals that are still available and I've got in my basket right now
Samsung Galaxy Z Fold 6 in Paris in front of the Louvre pyramid
5 things I want from the Samsung Galaxy Z Fold 7