Why Quantum Computing Requires Quantum Cryptography
Based on PBS Space Time's video on YouTube. If you like this content, support the original creators by watching, liking and subscribing to their content.
Quantum computers are expected to break public-key cryptography by enabling fast prime factorization, undermining systems like RSA.
Briefing
Quantum computing threatens today’s internet encryption because it can factor large numbers far faster than classical machines—undermining public-key systems like RSA that rely on the difficulty of prime factoring. That creates a new security problem: if an attacker can break the key exchange, they can enable both passive eavesdropping and active man-in-the-middle attacks, including impersonating parties by inserting their own keys. Fixing this requires a different foundation for key sharing—one that doesn’t depend on mathematical hardness alone.
The path forward is a “quantum internet,” and its first building block is quantum cryptography, especially quantum key distribution (QKD). QKD aims to generate a shared secret key using quantum mechanics so that eavesdropping becomes detectable. Two core quantum effects do the heavy lifting: the Heisenberg uncertainty principle and quantum entanglement. In the BB84 protocol (introduced by Bennett and Brassard in 1984), two parties—named Albert and Niels in the explanation—encode random bits into photons using one of two polarization bases (rectilinear or diagonal). The receiver measures each photon using a randomly chosen basis. When the bases match, the receiver recovers the sender’s bit; when they don’t, the results are random. After transmission, they publicly compare which bases were used for a subset of photons. If an eavesdropper measured the photons, the act of measuring in the wrong basis would disturb the quantum states, causing mismatches that reveal tampering. The protocol then discards the mismatched measurements and keeps the rest as the shared private key.
BB84 makes undetected eavesdropping effectively impossible because an interceptor has only a 50–50 chance of choosing the correct basis each time; the probability of guessing correctly across many photons shrinks exponentially (described as 1 in 2^n). Man-in-the-middle attacks can still be addressed with classical authentication methods, but the quantum channel itself blocks silent interception.
A second approach, proposed by Artur Ekert in 1991, uses entanglement rather than just uncertainty. Entangled particles share correlated properties such that measurement outcomes depend on the chosen measurement bases at both ends. Ekert’s scheme checks for violations of Bell’s inequality: if the correlations don’t match what entanglement predicts, the particles were likely measured or “disentangled” en route. When Bell’s theorem is satisfied, the parties can trust that the entanglement remained intact and then derive a shared key from the basis choices that happened to align.
The broader takeaway is that quantum cryptography is designed for a future where classical security protocols fail under quantum computing. But building a quantum internet is still difficult because quantum states—especially entangled ones—are fragile and hard to transmit over long distances. The discussion frames QKD as the practical starting point for that larger network, where secure browsing history and other sensitive data could eventually depend on quantum-secured keys.
Cornell Notes
Quantum computers are expected to break widely used public-key encryption because they can factor large numbers quickly, collapsing systems such as RSA that depend on prime factoring being hard. Quantum key distribution (QKD) offers a way to generate shared secret keys using quantum mechanics, making eavesdropping detectable. In BB84, photons are prepared in one of two polarization bases and measured in randomly chosen bases; mismatched bases yield random results, while any interception disturbs the states enough to be detected through basis comparisons. A different QKD method by Artur Ekert uses entangled particles and tests correlations via Bell’s inequality, flagging tampering if entanglement is disrupted. Together, these techniques provide a foundation for “unbreakable” cryptography on a future quantum internet, though building such networks remains technically challenging due to fragile quantum states.
Why does quantum computing threaten RSA-style encryption specifically?
How does BB84 turn quantum uncertainty into a practical eavesdropping alarm?
What makes the chance of successful undetected interception in BB84 shrink so fast?
Why does Ekert’s entanglement-based QKD rely on Bell’s inequality rather than just basis matching?
What security gap remains even with QKD, and how is it handled?
Review Questions
- In BB84, what happens to the measurement outcomes when the sender and receiver choose different polarization bases, and how does that affect key generation?
- How do Bell’s inequality tests function as an integrity check in Ekert’s entanglement-based QKD?
- What specific capability of quantum computers undermines public-key cryptography, and why does that motivate quantum key distribution?
Key Points
- 1
Quantum computers are expected to break public-key cryptography by enabling fast prime factorization, undermining systems like RSA.
- 2
Public-key failures create both passive eavesdropping and active man-in-the-middle risks, including key substitution.
- 3
Quantum key distribution (QKD) generates shared secret keys using quantum mechanics so interception disturbs states in detectable ways.
- 4
BB84 uses two conjugate polarization bases and detects eavesdropping by comparing basis choices on a subset of photons.
- 5
BB84’s undetected interception probability drops exponentially as 1 in 2^n because an interceptor must guess the correct basis each time.
- 6
Ekert’s 1991 QKD uses entanglement and detects tampering by checking for violations of Bell’s inequality.
- 7
A quantum internet still faces major engineering hurdles because entangled quantum states are fragile over long distances.