The Register: China’s quantum* crypto tech may be unhackable, but it’s hardly a secret

Source URL: https://www.theregister.com/2024/09/16/opinion_column_quantum/
Source: The Register
Title: China’s quantum* crypto tech may be unhackable, but it’s hardly a secret

Feedly Summary: * Quite Unlikely A New Technology’s Useful, Man
Opinion We have a new call to arms in the 21st century battlefront between the West and China. The Middle Kingdom is building an uncrackable national infrastructure based on quantum key distribution (QKD). The laws of physics are being used against us, and we’re not keeping up, claims a think tank.…

AI Summary and Description: Yes

Summary: The text critiques the feasibility and practicality of Quantum Key Distribution (QKD) in establishing secure communication infrastructure, particularly in the context of national security concerns raised about China’s advancements in quantum technology. It argues that while QKD has conceptual merit, its limitations make it impractical for broad applications in data security and encryption.

Detailed Description: The text provides a thorough analysis of Quantum Key Distribution (QKD), emphasizing several critical points regarding its utility and the implications for national security. Below are the main insights:

– **Quantum Key Distribution (QKD) Overview**:
– QKD is not an encryption technique but a method for transmitting random keys while ensuring that no interception occurred.
– It relies on the principles of quantum physics to detect any tampering or interception of the keys being communicated.

– **Concerns Regarding Practicality**:
– QKD necessitates a large amount of key material relative to the data being transmitted, effectively doubling bandwidth requirements.
– The challenge of maintaining key safety and confidentiality is complicated by the nature of physical interactions along transmission mediums (fiber optics) that can inadvertently observe the key.

– **Current State of QKD Technology**:
– The text highlights a current world record speed of QKD over long distances as being unfeasibly low (34 bits per second) compared to conventional public key systems, which perform significantly better without the limitations of QKD.
– Notable commercial offerings, like those from Toshiba, also demonstrate limited performance that would not suffice for national infrastructure needs.

– **Comparison with Public Key Cryptography**:
– Public key cryptography provides similar levels of security without the high bandwidth requirements and technical challenges associated with QKD.
– Quantum-safe public key cryptography options are already available, mitigating concerns about quantum computing attacks.

– **Strategic Implications**:
– The text posits that investments in QKD, particularly by nations like China, may lead to resources being misallocated toward technology that lacks practicality.
– The author draws parallels to past technological initiatives that underperformed, suggesting a need for skepticism towards such national security technologies.

– **Conclusion**:
– The overarching argument is that while QKD sounds promising theoretically, its real-world implications and applications remain highly limited, raising questions about its role in future national infrastructures and cybersecurity strategies.

This analysis presents critical reflections for security professionals involved in infrastructure and encryption, emphasizing the need to evaluate emerging technologies rigorously against practical implementation challenges.