Quantum Technologies Key Strategies and Opportunities for ICT Leaders 2025

Page 14 of 26 · WEF_Quantum_Technologies_Key_Strategies_and_Opportunities_for_ICT_Leaders_2025.pdf

4Quantum communications and security Discover the next generation data protection mechanisms using quantum technologies. Future quantum computers could compromise current cryptographic techniques and make them more vulnerable. To ensure business confidence, integrity and availability, companies should adopt quantum-safe security and a defence-in-depth approach. These solutions are explored in detail in Appendix A2. In terms of the maturity of quantum communications and security technologies, NIST, supported by an international consortium of 25 countries, has standardized the first round of post- quantum cryptography (PQC) algorithms. The US government is leading the charge in regulations, mandating migration to these PQC algorithms, and further work on new NIST candidates is underway.13 However, QKD may not yet be ready for widespread use in some geolocations (such as the US) due to security concerns.14 Nevertheless, companies in other regions are proactively testing and implementing QKD and PQC, and China is developing its own PQC algorithms.15 For instance, TELUS and Photonic’s collaboration on a 30 km fibre network16 demonstrates advancements in quantum communications, computing and networking. The steep learning curve caused by the complexity and novelty of quantum communication and security is another important factor. Solutions such as QRNG, QKD and PQC require advanced knowledge in quantum mechanics and cryptography. Moreover, they present their own practical implementation challenges. For example, entanglement distribution involves additional complexities related to the fundamental principles of quantum networks and the sharing of qubits, as illustrated by TELUS and Photonic’s collaboration.17 Implementing quantum-safe technologies is costly and time-consuming, and a smooth transition will require unique infrastructure. Quantum-safe migration should start as early as possible to mitigate the risk of attackers stealing encrypted data in the present with the intention of decrypting it later with future quantum computers (also called “steal now – decrypt later”18 or “prepare now – relax later”19). The Chinese QKD network, spanning 4,600 km,20 is a successful example of a prepare-and- measure implementation (where the sender prepares quantum states and the receiver measures them). This achievement was made possible through substantial government support, underscoring the essential role of governmental backing. Scalability must be considered. While QKD offers significant potential, it presents challenges such as high costs and distance limitations. In contrast, PQC does not have the same challenges.21 Harvard physicists22 demonstrated this potential by building a metro-area quantum computer network using existing telecommunication fibre. The proposed 800 km QKD network in South Korea, developed by SK Broadband and ID Quantique, protects 48 government agencies.23 Its modular architecture and interoperability with existing systems make it scalable, allowing for seamless expansion and integration for a QKD network. However, a hybrid approach with PQC is easier to deploy, even in space, with a secure multi-orbit data link featuring crypto-agility.24 Failure to adopt quantum and relevant technologies for security could lead to serious data breaches and compromise communications, as sufficiently powerful future quantum computers could break current encryption methods, especially asymmetric encryption (which involves a pair of keys and is currently the foundation for nearly all secure communications). A secure data backup system called H-LINCOS has been developed by the National Institute of Information and Communications Technology (NICT), Japan’s primary ICT research institute, and Kochi Health Sciences Center.25 This innovation highlighted the possibility of addressing these risks by ensuring data integrity and confidentiality even in the face of quantum threats. Failure to adopt quantum and relevant technologies for security could lead to serious data breaches and compromise communications. Quantum Technologies: Key Strategies and Opportunities for ICT Leaders 14
Ask AI what this page says about a topic: