Get AI summaries of any video or article — Sign up free
Why Quantum Computing Requires Quantum Cryptography thumbnail

Why Quantum Computing Requires Quantum Cryptography

PBS Space Time·
5 min read

Based on PBS Space Time's video on YouTube. If you like this content, support the original creators by watching, liking and subscribing to their content.

TL;DR

Quantum computers are expected to break public-key cryptography by enabling fast prime factorization, undermining systems like RSA.

Briefing

Quantum computing threatens today’s internet encryption because it can factor large numbers far faster than classical machines—undermining public-key systems like RSA that rely on the difficulty of prime factoring. That creates a new security problem: if an attacker can break the key exchange, they can enable both passive eavesdropping and active man-in-the-middle attacks, including impersonating parties by inserting their own keys. Fixing this requires a different foundation for key sharing—one that doesn’t depend on mathematical hardness alone.

The path forward is a “quantum internet,” and its first building block is quantum cryptography, especially quantum key distribution (QKD). QKD aims to generate a shared secret key using quantum mechanics so that eavesdropping becomes detectable. Two core quantum effects do the heavy lifting: the Heisenberg uncertainty principle and quantum entanglement. In the BB84 protocol (introduced by Bennett and Brassard in 1984), two parties—named Albert and Niels in the explanation—encode random bits into photons using one of two polarization bases (rectilinear or diagonal). The receiver measures each photon using a randomly chosen basis. When the bases match, the receiver recovers the sender’s bit; when they don’t, the results are random. After transmission, they publicly compare which bases were used for a subset of photons. If an eavesdropper measured the photons, the act of measuring in the wrong basis would disturb the quantum states, causing mismatches that reveal tampering. The protocol then discards the mismatched measurements and keeps the rest as the shared private key.

BB84 makes undetected eavesdropping effectively impossible because an interceptor has only a 50–50 chance of choosing the correct basis each time; the probability of guessing correctly across many photons shrinks exponentially (described as 1 in 2^n). Man-in-the-middle attacks can still be addressed with classical authentication methods, but the quantum channel itself blocks silent interception.

A second approach, proposed by Artur Ekert in 1991, uses entanglement rather than just uncertainty. Entangled particles share correlated properties such that measurement outcomes depend on the chosen measurement bases at both ends. Ekert’s scheme checks for violations of Bell’s inequality: if the correlations don’t match what entanglement predicts, the particles were likely measured or “disentangled” en route. When Bell’s theorem is satisfied, the parties can trust that the entanglement remained intact and then derive a shared key from the basis choices that happened to align.

The broader takeaway is that quantum cryptography is designed for a future where classical security protocols fail under quantum computing. But building a quantum internet is still difficult because quantum states—especially entangled ones—are fragile and hard to transmit over long distances. The discussion frames QKD as the practical starting point for that larger network, where secure browsing history and other sensitive data could eventually depend on quantum-secured keys.

Cornell Notes

Quantum computers are expected to break widely used public-key encryption because they can factor large numbers quickly, collapsing systems such as RSA that depend on prime factoring being hard. Quantum key distribution (QKD) offers a way to generate shared secret keys using quantum mechanics, making eavesdropping detectable. In BB84, photons are prepared in one of two polarization bases and measured in randomly chosen bases; mismatched bases yield random results, while any interception disturbs the states enough to be detected through basis comparisons. A different QKD method by Artur Ekert uses entangled particles and tests correlations via Bell’s inequality, flagging tampering if entanglement is disrupted. Together, these techniques provide a foundation for “unbreakable” cryptography on a future quantum internet, though building such networks remains technically challenging due to fragile quantum states.

Why does quantum computing threaten RSA-style encryption specifically?

RSA relies on a one-way function: multiplying two large primes to create a public key is easy, but reversing the process—factoring the large product back into its primes—is assumed to be infeasible for classical computers. The transcript notes that quantum computers can factor large numbers extremely quickly using quantum superposition and parallelism in certain computations. Once factoring becomes fast, the public key can be undone, collapsing the security of the public-key system.

How does BB84 turn quantum uncertainty into a practical eavesdropping alarm?

BB84 encodes bits into photon polarizations using one of two conjugate bases: rectilinear (horizontal/vertical) or diagonal (two diagonal directions). The receiver measures each photon using a randomly chosen basis. If an eavesdropper measures in the wrong basis, the uncertainty principle implies the photon’s complementary property becomes undefined, so the state is disturbed. Afterward, the parties publicly reveal the bases for a subset of photons; elevated mismatches indicate interception because the receiver can no longer reproduce the sender’s outcomes when bases match.

What makes the chance of successful undetected interception in BB84 shrink so fast?

The interceptor must guess the correct basis for every photon to avoid disturbing the state. Each basis choice is random, giving a 1/2 probability per photon of matching the sender’s basis. The transcript describes the probability of getting through without detection as 1 in 2^n, where n is the number of photons tested—an exponential drop that becomes effectively impossible for realistic key sizes.

Why does Ekert’s entanglement-based QKD rely on Bell’s inequality rather than just basis matching?

In Ekert’s 1991 scheme, entangled particles produce measurement outcomes that are correlated in a way predicted by Bell’s theorem. The parties choose measurement bases at both ends; if entanglement remains intact, the observed correlations violate Bell’s inequality in the expected manner. If an eavesdropper measures the particles, the measurement collapses/disentangles them, destroying the specific correlation pattern, so Bell-inequality violations fail and tampering is detected.

What security gap remains even with QKD, and how is it handled?

QKD as described doesn’t fully solve authentication. A man-in-the-middle can still be possible in principle if the attacker impersonates both parties from the start. The transcript notes that classical authentication methods can make such impersonation difficult, while the quantum part prevents undetected eavesdropping on the key-distribution channel itself.

Review Questions

  1. In BB84, what happens to the measurement outcomes when the sender and receiver choose different polarization bases, and how does that affect key generation?
  2. How do Bell’s inequality tests function as an integrity check in Ekert’s entanglement-based QKD?
  3. What specific capability of quantum computers undermines public-key cryptography, and why does that motivate quantum key distribution?

Key Points

  1. 1

    Quantum computers are expected to break public-key cryptography by enabling fast prime factorization, undermining systems like RSA.

  2. 2

    Public-key failures create both passive eavesdropping and active man-in-the-middle risks, including key substitution.

  3. 3

    Quantum key distribution (QKD) generates shared secret keys using quantum mechanics so interception disturbs states in detectable ways.

  4. 4

    BB84 uses two conjugate polarization bases and detects eavesdropping by comparing basis choices on a subset of photons.

  5. 5

    BB84’s undetected interception probability drops exponentially as 1 in 2^n because an interceptor must guess the correct basis each time.

  6. 6

    Ekert’s 1991 QKD uses entanglement and detects tampering by checking for violations of Bell’s inequality.

  7. 7

    A quantum internet still faces major engineering hurdles because entangled quantum states are fragile over long distances.

Highlights

Public-key encryption like RSA depends on the difficulty of factoring large numbers; quantum computing threatens that assumption directly.
BB84 detects eavesdropping because measuring in the wrong basis disturbs photon states, creating detectable mismatches after basis reconciliation.
Ekert’s entanglement-based QKD uses Bell’s inequality violations as a tamper-evidence mechanism.
Even with quantum-secured key exchange, authentication still needs classical safeguards against full impersonation.

Topics

  • Quantum Cryptography
  • Quantum Key Distribution
  • BB84 Protocol
  • Entanglement
  • Bell’s Inequality

Mentioned

  • Artur Ekert
  • Bennett
  • Brassard
  • QKD
  • RSA
  • MITM