Nowadays, we are witnessing a proliferation of cyberattacks, and an emerging greater awareness of their negative impact on the economy and on society. The technological evolution driven by IoT and 5G networks has posed the priority in implementing stronger cryptographic systems, raising the need for security at the edge.
Moreover, the fast development of quantum computing technology represents a serious threat for current encryption systems based on hard to solve mathematical algorithms (e.g. RSA). Today, eavesdroppers may intercept cryptograms that they are not able to decrypt. However, they may store these encrypted communications and wait for their decryption once a sufficiently large quantum computer is technologically available (or a new classical algorithm is discovered).
Therefore, developing products and infrastructures offering long-term security guarantees and stronger computational capabilities is a global priority to ensure the socio-economic growth. Near-term, quantum technologies provide a radically new toolset to realize stronger encryption systems.
Quantum encryption is the method by which information is converted into secret code by exploiting the properties of quantum mechanics. The science of encrypting, transmitting and decrypting information using the principles of quantum physics is named quantum cryptography. We can differentiate between two main cryptographic areas, that are under development using quantum properties.
Both methods require a genuine source of random numbers to be guarantee stronger security. As such, high-quality Quantum Random Number generators are fundamental building blocks for cybersecurity in the quantum era. This technology harnesses the laws of quantum physics to provide true randomness in contrast to deterministic chaotic systems and pseudo random number generators (PRNGs) based on deterministic dynamics or computationally complex algorithms.
Post-quantum cryptography and computational-security systems, as those based on conventional cryptography (RSA, etc…) require lots of random numbers. As the amount of information exchanged increases and with the emergence of new algorithms that require longer keys, the amount of randomness required has increased. In Prepare&Measure protocols (e.g. BB84), QRNGs are used to select the random state to be transmitted. Typically, multiple random bits are required for each state, therefore requiring the QRNG to produce 4 to 5 times faster rates than the QKD device itself.
Quside QRNGs deliver high-quality, high-rate (Gb/s) unpredictable random numbers with measurable entropy to ensure the strongest level of security for any application.
Quantum cryptography is the science that exploits the properties of quantum mechanics to perform cryptographic tasks. There are two main areas of development:
– Post-quantum cryptography, which aims to create encryption methods which cannot be broken by quantum computers. Current encryption methods will not be safe if a quantum computers become a reality.
– Quantum key distribution (QKD) is a quantum primitive which enables two trusted users to produce and share keys to encrypt (decrypt) messages in a secure way. The communication method relies on the laws of quantum mechanics to bound the information exchanged between the users that a potential eavesdropper can access.
Since the seminal work of Bennett and Brassard, many experiment have been carried out on QKD. Companies such as ID Quantique, Toshiba, QuintessenceLabs, MagiQ Technologies Inc., LuxQuanta are offering commercial QKD systems. About PQC, NIST initiated a process of evaluating new algorithms resistant to possible quantum computer attacks, regardless the exact time of the arrival of the quantum computing era. The goal is to have new quantum-safe standards in 2024.
 Martin V, Martinez-Mateo J, Peev M. Quantum key distribution. In: Wiley encyclopedia of electrical and electronics engineering. New York: Wiley; 2017. p. 1–17
In theory, quantum cryptography is unhackable, because eavesdropping would always be detected. QKD offers information-theoretic security (ITS), meaning that the vulnerability of the generated key to attacks depends on the protocol implementation and does not require any assumptions on the resources available to an adversary. This property is fundamental to provide long-term security and to avoid harvest now, decrypt later attacks. Nevertheless, a truly usable system may require the combination of quantum cryptography with classical elements, which could be vulnerable if not properly considered.
Quantum encryption is the method by which information is converted into secret code by exploiting the properties of quantum mechanics. Quantum key distribution (QKD) is the most widely studied and viable method which enables two trusted users to produce and share keys to encrypt (decrypt) messages in a secure way.