Impact Objectives

• Exploit fundamental laws of quantum physics for the development of secure communications technologies and services

• Deliver quantum communications systems that will in turn enable secure transactions and transmissions of data across a range of users in real-world applications

Making tomorrow’s world secure today

Professor Tim Spiller describes the UK Quantum Communications Hub, of which he is Director, and explains how it is providing a test bed for the successful translation of quantum science into mainstream technological communications security applications for economic benefit

Could you begin feed its future expansion, competitiveness, computers powerful enough to crack by introducing diversification and sustainability. this cryptography will be built, it is widely the Quantum accepted that new approaches to secure Communications Why are more secure communication communications need to be developed now, Hub and its technologies and services required? so we are all prepared for this future threat. mission? The importance of data security, during In lay terms, what is Quantum Key The Quantum Communications Hub is a both transmission and storage, is ever Distribution (QKD)? Can you explain synergistic partnership of eight UK universities growing in the modern world. Current the relevance of QKD technologies to (Bristol, Cambridge, Leeds, Heriot-Watt, Royal secure communications technologies can communication security? Holloway, Sheffield, Strathclyde, and York have vulnerabilities in their hardware and as the lead) and numerous private sector in their software – the implementation of QKD uses a fundamental aspect of quantum companies (BT, Toshiba Research Europe mathematical encryption employed for physics to facilitate the establishment Ltd., ADVA, ID Quantique, amongst others) security. Very important activities are always of shared secret random data, or keys, and public sector bodies (National Physical ongoing (worldwide, and in academia, between two users, who are always called Laboratory, Bristol City Council, National government laboratories and companies) Alice and Bob! In the conventional scenario, Dark Fibre Infrastructure Service (NDFIS), to improve the current technologies and Alice is the transmitter and she sends very and others). This unique collaboration aims services. However, in addition to all this, weak light signals – down at the quantum to exploit fundamental laws of quantum we now know that some very widely level – to Bob, who measures them (these physics for the development of secure deployed mathematical encryption signals might be individual photons, or communications technologies and services. techniques (Public Key Encryption) will quanta of light, or other states of light The main aim of the Hub is to deliver practical be rendered insecure by the emergence which embody quantum features). As secure communications by exploiting the of future quantum computational Alice knows what she sent and Bob knows commercialisation potential of existing technologies. Note that this insecurity what he measured, a clever protocol – prototype quantum technologies beyond is not due to the hardware and software or formula – exists that Alice and Bob their current limitations; to contribute to the implementation, but to the underlying can subsequently follow. This protocol establishment of a quantum communications mathematics used. Therefore, although enables Alice and Bob to distil identical technology industry for the UK; and to we do not know exactly when quantum random data strings, or keys, from their

12 www.impact.pub Impact Objectives

• Exploit fundamental laws of quantum physics for the development of secure communications technologies and services

• Deliver quantum communications systems that will in turn enable secure transactions and transmissions of data across a range of users in real-world applications

Although we do not know exactly when quantum computers powerful enough to crack this cryptography will be built, it is widely accepted that new approaches to secure Making tomorrow’s communications need to be developed now, so we are all prepared for this future threat

transmission and measurement data. It is important to note that the final does not quite satisfy the assumptions world secure today Quantum physics guarantees the security of outcome of QKD – shared secret key made about the hardware in order to prove these keys because anyone – always called material between Alice and Bob (called the security (for example, the actual detectors Eve – who tries to intercept any information symmetric keys as Alice and Bob have of the light currently have some limitations). Professor Tim Spiller describes the UK Quantum Communications Hub, of which he is Director, and about the quantum transmission from Alice identical copies) – is conventional data These differences between what is actual and explains how it is providing a test bed for the successful translation of quantum science into mainstream to Bob cannot do so without corrupting stored in Alice’s and Bob’s trusted what is desired are often called side-channels technological communications security applications for economic benefit some of the data, thus revealing their hardware. As the keys are no longer and it is these that have been exploited in so- attempted eavesdropping. This corruption quantum data, these symmetric keys can called ‘attacks’ on QKD hardware. Such attacks of the transmission by Eve is a fundamental then be used in any conventional security are of course themselves detectable, meaning Could you begin feed its future expansion, competitiveness, computers powerful enough to crack feature of quantum physics, so it is communication scenario, or indeed for countermeasures can be employed. Standards by introducing diversification and sustainability. this cryptography will be built, it is widely built into nature and will not go away as other transactions or interactions that are being developed to address these matters. the Quantum accepted that new approaches to secure technology (even quantum technology) require security. It is also very important to Communications Why are more secure communication communications need to be developed now, evolves in the future. note that the keys are consumables. They Why is the UK particularly well placed to Hub and its technologies and services required? so we are all prepared for this future threat. should be used once and then deleted, address these limitations and advance QKD mission? It should be noted that the clever protocol as any reuse generally compromises the technologies? The importance of data security, during In lay terms, what is Quantum Key that Alice and Bob follow involves them security. Therefore, QKD is required on a The Quantum Communications Hub is a both transmission and storage, is ever Distribution (QKD)? Can you explain communicating (by ordinary non-quantum regular basis to replenish symmetric keys The UK has a long and very productive synergistic partnership of eight UK universities growing in the modern world. Current the relevance of QKD technologies to means) to establish their shared key. The as these are consumed. history in quantum science research, so (Bristol, Cambridge, Leeds, Heriot-Watt, Royal secure communications technologies can communication security? cleverness is such that even if Eve hears we have a very strong academic base, Holloway, Sheffield, Strathclyde, and York have vulnerabilities in their hardware and all of this discussion, it still doesn’t tell What are the current limitations of QKD including a national laboratory (the National as the lead) and numerous private sector in their software – the implementation of QKD uses a fundamental aspect of quantum her anything about the final key. Hence technologies? Physical Laboratory) which is recognised companies (BT, Toshiba Research Europe mathematical encryption employed for physics to facilitate the establishment the security of QKD. To be very precise, worldwide for its expertise in timing, Ltd., ADVA, ID Quantique, amongst others) security. Very important activities are always of shared secret random data, or keys, QKD should really be called quantum key One limitation is the distance over which metrology, calibration and quantum devices. and public sector bodies (National Physical ongoing (worldwide, and in academia, between two users, who are always called expansion (QKE) because, in order to first QKD can usefully work from Alice to Bob, We also already have UK companies Laboratory, Bristol City Council, National government laboratories and companies) Alice and Bob! In the conventional scenario, communicate, Alice and Bob do need some which at present is approximately 100 km, (including SMEs, major UK companies Dark Fibre Infrastructure Service (NDFIS), to improve the current technologies and Alice is the transmitter and she sends very initial shared secret key material (which either via standard optical fibre or through and parts of multinational companies) and others). This unique collaboration aims services. However, in addition to all this, weak light signals – down at the quantum is stored in their hardware devices, which free space. This distance limitation is due with quantum technology R&D activities to exploit fundamental laws of quantum we now know that some very widely level – to Bob, who measures them (these they trust and control). This is needed for to optical losses and errors that occur with or developing and growing interests. The physics for the development of secure deployed mathematical encryption signals might be individual photons, or authentication, otherwise the malicious the quantum light signals sent from Alice UK Government appreciated the strength communications technologies and services. techniques (Public Key Encryption) will quanta of light, or other states of light adversary Eve could aim to intercept to Bob. Future QKD technologies will be of these foundations and so has invested The main aim of the Hub is to deliver practical be rendered insecure by the emergence which embody quantum features). As everything, and then impersonate Alice to able to overcome these distance limitations £270M in establishing the UK National secure communications by exploiting the of future quantum computational Alice knows what she sent and Bob knows Bob and impersonate Bob to Alice – a so- using quantum repeaters. However, work on Quantum Technologies Programme commercialisation potential of existing technologies. Note that this insecurity what he measured, a clever protocol – called ‘man-in-the-middle’ attack. What a quantum repeaters is still very much at the (UKNQTP), which brings together relevant prototype quantum technologies beyond is not due to the hardware and software or formula – exists that Alice and Bob QKD system really enables, then, is use of basic research level. partners and stakeholders to deliver a their current limitations; to contribute to the implementation, but to the underlying can subsequently follow. This protocol the initial shared key to grow an arbitrarily major national programme, and of which establishment of a quantum communications mathematics used. Therefore, although enables Alice and Bob to distil identical large number of new shared key bits, for as Current QKD technologies also have some the Quantum Communications Hub technology industry for the UK; and to we do not know exactly when quantum random data strings, or keys, from their long as Alice and Bob want. limitations because the actual hardware is a part.

12 www.impact.pub www.impact.pub 13 Quantum safe approaches to secure communications

The Quantum Communications Hub brings together a large number of universities, private partners and public bodies as part of the UK National Quantum Technologies Programme. Its goal is to deliver secure communications by exploiting Quantum Key Distribution technologies

Today, the importance of data security is This five-year, £24M project is a synergistic The team therefore needs to develop arguably more profound than it has ever partnership bringing together UK approaches that are ‘quantum safe’; that is, been. Smartphones, computers, apps and universities, private sector companies approaches that will offer security in a future various digital technologies rely on data and public sector bodies. Led by the world that is filled with a plethora of quantum security to keep countries, governments, University of York, the Hub forms part of technologies. This includes Quantum Key companies, institutions and individuals a major national initiative, the UK National Distribution (QKD) technologies, which can safe and free from data breaches. Quantum Technologies Programme provide methods for sharing encryption keys (UKNQTP), which aims to ensure that will not be compromised, even when Technology and the developments within the successful transition of quantum attacked by other quantum technologies. it can be thought of in a similar way to the technologies from laboratory to industries. Accordingly, a key part of the project is focused battlefield that exists between diseases and on developing, testing and implementing the treatments we use to fight them. As we AN URGENT REQUIREMENT these innovations. get better at fighting illnesses, the illnesses Professor Tim Spiller is the Director of evolve to get better at fighting back. Because the Quantum Communications Hub and TECHNOLOGY DEVELOPMENT of this constant battle, it is necessary to acutely aware of the reasons more secure The Hub is divided into four technology continuously improve the medicines we communication technologies and services work packages (WPs). Each is concerned develop. Likewise, as the mathematical are required. ‘There are two main reasons with a topic that works independently, but encryption techniques we employ to provide for urgency,’ explains Spiller. ‘First, encrypted also synergistically with the others. WP1 is data security are ever-evolving, so too are the communications sent now can be stored concerned with short-range, free-space QKD technologies designed to breach data security. and decrypted in the future, when the technologies, which it aims to deliver to Thus, it is vital that new avenues are explored relevant quantum computational technology consumers and individuals. ‘Think of Alice to counteract the very real threat that quantum exists, so information with a requirement in your phone and Bob with your bank or computers of the future will pose. for long-term security is potentially already employer. The goal is to create many Alices under threat today. Second, it takes many in cheap and readily deployable units, and It is with that in mind that the Quantum years to completely replace communications fewer Bobs (which would be more expensive),’ Communications Hub was established. infrastructure. This cannot be done overnight.’ explains Spiller. ‘This would enable individuals

14 www.impact.pub The biggest challenges ahead faced by the quantum Project Insights

communications sector is the stimulation of uptake FUNDING UK Engineering and Physical Sciences of the technology and the growth of markets. At present, Research Council (EPSRC). Project ID: the main driving force is “technology push”, as opposed EP/M013472/1 to “market pull”. We need to change this PARTNERS & COLLABORATORS University of Bristol • • Heriot-Watt University • to share quantum keys with their bank, the focus is now largely on improving and • Royal Holloway, University of London • University of employer, etc., through QKD. Once shared, delivering the technologies, although there are Sheffield • University of Strathclyde • these keys have multiple potential applications, still certain research challenges to address with University of York • National Physical from allowing Alice entry to a building or system some of the work underway in WP4. ‘I think the Laboratory • BT • Toshiba Research Europe controlled by Bob to being used for purchases biggest challenges ahead faced by the quantum Ltd. • Bristol City Council • National Dark or financial transactions as a single-use PIN.’ communications sector is the stimulation of Fibre Infrastructure Service (NDFIS) • uptake of the technology and the growth of ADVA • ID Quantique • Oclaro • ETSI • WP2 is focused on chip-scale QKD technology, markets,’ Spiller reveals. ‘At present, the main Government Communication Headquarters (GCHQ), National Cyber Security Centre with a view to delivering integrated quantum driving force is “technology push”, as opposed (NCSC) • Qumet • KETS • Cryptographiq • to “market pull”. We need to change this.’ optical chip devices for both Alice and Bob. If Airbus • L3-TRL • Knowle West Media Centre QKD technologies can be shrunk to chip scale, • Cambridge Science Park • Cambridge this would offer a wealth of benefits, including To achieve this, the Hub is participating in the Network Ltd. • Innovation Martlesham reduced power consumption and costs. It ongoing development of standards for QKD • Cambridge Quantum Computing • would also facilitate their mass manufacture that specify the criteria that components, University of Glasgow/QuantIC • University and integration with conventional electronic devices and hardware systems must meet if of Oxford/NQIT • National STEM Learning Centre • York Science Education Group Quantum safe approaches devices – in other words, paving the way to they are to operate effectively and with one a future in which there is an Alice and Bob another. For example, the Hub is an active CONTACT in every computer and the achievement of contributor to the Industry Specification Professor Tim Spiller widespread quantum networking. Groups on QKD technologies and quantum Director to secure communications safe cryptography, both of which are operated WP3 is focused on quantum communication by Hub partner ETSI. The Hub is also engaged T: +44 1904324410 networking and the delivery of a QKD network in extensive user and public engagement E: [email protected] The Quantum Communications Hub brings together a large number of universities, private partners for the UK. The UK Quantum Network activities in order to drive interest and develop W: www.quantumcommshub.net and public bodies as part of the UK National Quantum Technologies Programme. Its goal is to deliver (UKQN) uses ‘trusted nodes’ whereby the markets for QKD. ‘Once we have established Alice of one link can interface conventionally trial applications and services on the UKQN, BIO secure communications by exploiting Quantum Key Distribution technologies to Bob at an adjacent link, so long-distance these can be employed to engage with Professor Tim Spiller, University of York, is the Director of the UK Quantum communication can be achieved. This is potential end users and customers so they Communications Hub and Founding Today, the importance of data security is This five-year, £24M project is a synergistic The team therefore needs to develop important because current QKD technologies can appreciate first-hand the capabilities of Director of the York Centre for Quantum arguably more profound than it has ever partnership bringing together UK approaches that are ‘quantum safe’; that is, are limited to approximately 100 km, and while QKD,’ Spiller outlines. ‘We have Hub partner Technologies. He previously led the been. Smartphones, computers, apps and universities, private sector companies approaches that will offer security in a future quantum repeater technology may one day institutions in place that will enable us to QI Group at Leeds, and has 15 years of various digital technologies rely on data and public sector bodies. Led by the world that is filled with a plethora of quantum overcome this, it has not yet been achieved. engage with individuals, consumers, business industrial experience as Director of Quantum security to keep countries, governments, University of York, the Hub forms part of technologies. This includes Quantum Key and government.’ Information Processing Research at HP companies, institutions and individuals a major national initiative, the UK National Distribution (QKD) technologies, which can The final theme, WP4, is the most exploratory Labs, Bristol, where he led the development of HP’s quantum technologies intellectual safe and free from data breaches. Quantum Technologies Programme provide methods for sharing encryption keys and investigative in the Hub. Its focus is next- Establishing the Hub was just the beginning. property portfolio and translation strategy. (UKNQTP), which aims to ensure that will not be compromised, even when generation quantum communications and Discussions concerning how the Hub, as well Technology and the developments within the successful transition of quantum attacked by other quantum technologies. the delivery of technologies that go beyond as the wider UKNQTP, will evolve beyond the it can be thought of in a similar way to the technologies from laboratory to industries. Accordingly, a key part of the project is focused what is currently available. These include current five-year funding period are already battlefield that exists between diseases and on developing, testing and implementing Quantum Digital Signatures, an unforgeable underway. Spiller sees every reason to feel the treatments we use to fight them. As we AN URGENT REQUIREMENT these innovations. yet transferrable alternative to symmetric positive about the future of the Hub and the get better at fighting illnesses, the illnesses Professor Tim Spiller is the Director of keys; quantum repeaters to facilitate long- technologies it is developing. ‘There are still evolve to get better at fighting back. Because the Quantum Communications Hub and TECHNOLOGY DEVELOPMENT distance communication; and Measurement- many challenges as well as opportunities, of this constant battle, it is necessary to acutely aware of the reasons more secure The Hub is divided into four technology Device-Independent (MDI) QKD, whereby and we welcome the possibility of new continuously improve the medicines we communication technologies and services work packages (WPs). Each is concerned Alice and Bob can transmit signals to a central collaborations, partnerships or links, either develop. Likewise, as the mathematical are required. ‘There are two main reasons with a topic that works independently, but measurement device to generate a shared key, on our current Hub work or future activities encryption techniques we employ to provide for urgency,’ explains Spiller. ‘First, encrypted also synergistically with the others. WP1 is even if the central device is not trusted. in a potential second phase of the UKNQTP,’ data security are ever-evolving, so too are the communications sent now can be stored concerned with short-range, free-space QKD he enthuses. ‘There is scope for involvement technologies designed to breach data security. and decrypted in the future, when the technologies, which it aims to deliver to LOOKING FORWARD over a range of levels, from partnerships with Thus, it is vital that new avenues are explored relevant quantum computational technology consumers and individuals. ‘Think of Alice Together, these WPs create a formidable a company or institution on technologies, to counteract the very real threat that quantum exists, so information with a requirement in your phone and Bob with your bank or approach that covers all facets of the project’s services or applications, to opportunities computers of the future will pose. for long-term security is potentially already employer. The goal is to create many Alices aims, including the successful integration for early career researchers or PhD students. under threat today. Second, it takes many in cheap and readily deployable units, and of the findings. Although the Hub’s research We encourage anyone interested in It is with that in mind that the Quantum years to completely replace communications fewer Bobs (which would be more expensive),’ activities are ongoing, it has already made finding out more to get in touch with Communications Hub was established. infrastructure. This cannot be done overnight.’ explains Spiller. ‘This would enable individuals some significant breakthroughs. As such, our project team.’

14 www.impact.pub www.impact.pub 15