Quantum Technologies Key Strategies and Opportunities for ICT Leaders 2025

Page 21 of 26 · WEF_Quantum_Technologies_Key_Strategies_and_Opportunities_for_ICT_Leaders_2025.pdf

A2 Solutions to counter quantum threat There are two very different classes of solutions, which should be combined to counter the quantum threats of the future. The first class of solutions, which relies on computation, aims to replace existing algorithms that are vulnerable to quantum computers with new ones, known as quantum-resistant algorithms (QRA). These approaches are often referred to as post-quantum cryptography (PQC). These are entirely based on mathematics implemented on classical computers and do not involve quantum technologies. PQC will undoubtedly form the first line of defence and will be exploited in all general-use applications. Several PQC algorithms have now been standardized by the National Institute of Science and Technology (NIST) to replace the quantum-vulnerable ones currently in use.37 Organizations are steadily working out implementation. There must be a period where both current and PQC algorithms work concurrently, making the transition more complex than simply replacing a few algorithms. Telecommunication companies are harnessing cryptographic inventory, analytics and PQC to enhance security for government, customers and society. The second class of solutions is based on quantum technologies. It includes both quantum random number generation (QRNG) for key generation and other cryptographic purposes, and quantum key distribution (QKD) for sharing keys across networks in a secure manner. When implementing QKD, there’s a vital choice between using the earlier and more widely used prepare-measure approach or a newer, more-advanced quantum-entanglement approach.QRNG can be used to generate randomness for most applications. It is the most mature application of the quantum technologies. QRNGs are available in different formats and form factors, for applications ranging from small IoT devices, smart phones, computers and data centres. Some are even space-qualified for use in satellites and some harness 5G smartphone equipped with a QRNG chipset.38 QKD has a more targeted application and is used to enhance security in specific applications. It requires physical infrastructure and hardware components, which must be added to existing network infrastructure. Its initial application was direct data centre to data centre connection, with a limited maximum distance of the order of 100 km. Today, this has expanded to encompass terrestrial fibre networks with longer distances and complex connectivity. Several large networks are now operating or in various stages of completion worldwide, including the QKD networks in China, the Euro-QCI in EU, the Nation-wide Quantum Safe Key Distribution Network in South Korea and the Nation Quantum-Safe Network Plus (NQSN+) in Singapore.39 Since QKD networks require physical infrastructure, they are best designed and operated by telecommunication organizations. The NQSN+ is a good example of a QKD and PQC network operated by a telecommunication organization for various types of customers. These two classes of solutions have very different pros and cons and should therefore be combined if possible to offer the best defence-in-depth security. Quantum Technologies: Key Strategies and Opportunities for ICT Leaders 21
Ask AI what this page says about a topic: