For governments and defense agencies, data sovereignty is paramount. The critical nature of their data – whether defense secrets, intellectual property, taxpayer information or even the electoral register – makes their communications a prime target for hackers looking for everything from financial gain to political influence.
The geographically distributed nature of national government infrastructure presents a wealth of cybersecurity challenges. Ageing systems are notoriously plagued by performance issues and become increasingly difficult to secure. As hacking becomes more sophisticated, the reliance on breach prevention technologies alone (such as firewalls) is insufficient to prevent unauthorized access to systems.
Governmental infrastructure is further complicated by the plethora of contracted agencies or businesses that are granted access to critical data and applications. Everyone from stationery suppliers to senior politicians are looking to gain remote access to the network and every access point is another point of weakness.
Long-term data protection is crucial
Government data not only needs to be protected from cyberattacks today, but for the lifetime of the data itself. Data retention policies vary widely across industry sectors, with public sector organizations typically expected to retain records for longer periods. For some government applications, this can extend to 50 years in the case of official secrets.
A cryptographically significant quantum computer, capable of cracking today’s public key encryption infrastructure, is still a few years away. However, the long useful lifespan of some sensitive data means it is especially vulnerable to a “hack now, decrypt later” attack.
The 5G security challenge
5G is being rolled out all over the world. Higher performance, speed, capacity of remote execution and lower latency give the promise of reaching new connectivity needs that will change the way we live and work.
5G networks are already becoming the default platform for mobile telephony and data. They are aiming to be the main network used to connect devices, from connected vehicles to Internet of Things. Public and private applications in the medical, critical infrastructure, military and transportation fields will use 5G, which means that human lives become dependent on the mobile network. Securing the fiber networks that underpin the technology against conventional and quantum attack should be the highest priority as, without proper security, the integrity of the network is compromised. 5G networks are especially vulnerable to large-scale consequences as the scalability of the attack vectors is unprecedented. Indeed, a single successful hack could affect millions of devices.
While 5G will not be controlled by governments, their role is of prime importance. As often in new technologies’ rollouts, governments are expected to lead the way through setting the standard and put regulations in place. As a public service, their responsibility is to provide guidance and to set ethical rules for machines to follow.
Quantum and classical technologies for future-proof data protection
Quantum Random Number Generation
Any cryptographic system is only as secure as the encryption keys it uses. The first step towards good data protection is therefore to start with good keys. The security of the keys is determined by the degree of randomness (entropy) used to generate them. For a source of genuine entropy, cryptographic systems are leveraging quantum random number generators, which rely on the non-deterministic character of quantum mechanics to generate entropy. Small and reliable QRNG chips are now available from ID Quantique, for all applications, including smart phones and IoT devices.
High-assurance data encryption is the only fail-safe way to ensure sensitive information remains secure, even if it falls into the hands of unauthorized users. It represents today’s last line of defense. As the world enters the quantum computing era, government and commercial organizations alike must turn to next-gen quantum-safe encryption platforms combining high-assurance encryption hardware with quantum random number generation and networked Quantum Key Distribution wherever applicable. As standards for quantum-resistant algorithms emerge, encryption hardware will adapt to offer security professionals a hybrid solution featuring both classical and quantum-resistant variants. These crypto-agile solutions will be a key component of the data security roadmap as organizations enter the era of quantum computing.
Quantum Key Distribution
For the ultimate in long-term data protection, security professionals are turning to Quantum Key Distribution to deliver provably secure key exchange. Ideal today for LAN and MAN implementations, QKD will also offer WAN security in the future by leveraging quantum satellite networks to deliver global coverage. QKD is the only key exchange mechanism which can ensure long-lasting data sovereignty for today and tomorrow’s communications.
Recognizing the need to provide long-term data protection in the post-quantum computing age, some governments are pioneering the use of quantum technologies. Perhaps the most mature implementation to date is the QKD network built in China. The network now spans over 2,000km and connects four quantum metropolitan area networks in Shanghai, Jinan, Hefei and Beijing, plus a satellite link connecting two observatories.
South Korea is also a front-running country when it comes to quantum security. SK Broadband and ID Quantique have been selected to take part in two large-scale projects to future-proof the country’s digital security. The first one, as a part of the ‘Digital New Deal’ consists of building a pilot QKD infrastructure to enhance security across public, medical and industrial sectors. The second one, as part of the ‘National Convergence Project’, is the construction of the first nation-wide QKD network in Korea which will protect major areas of public networks with QKD technology on a section of up to 2000 kilometers. This will constitute the largest operational QKD network in the world outside of China and will secure the communications of 48 government organizations across the country.
Across Europe, the OpenQKD program, for which ID Quantique is the main QKD provider, has created several test beds for secure quantum communications applications. In addition, 25 EU Member States have signed the EuroQCI Declaration, agreeing to work together, with the Commission and with the support of the European Space Agency, towards the development of a quantum communication infrastructure covering the whole EU.
The Quantum Revolution is well on and governments worldwide are taking action to protect their digital sovereignty. Start planning now: contact us for more information about how you can start your quantum journey today.