currently a global leader. Only a handful of American start-ups dot the landscape. By
contrast, the closest U.S. allies, such as Australia, Canada, and the UK, boast the
http://www.realclearfuture.com/articles/2017/05/22/the_information_age_needs_quantum_cybers
https://www.technologyreview.com/s/610106/chinese-satellite-uses-quantum-cryptography-for-
Keith W. Crane et al., “Assessment of the Future Economic Impact of Quantum Information
https://www.ida.org/idamedia/Corporate/Files/Publications/STPIPubs/2017/P-8567.pdf.
Arthur Herman & Idalia Friedson
leading private sector quantum cybersecurity firms. QuintessenceLabs in Australia,
for example, develops the entire suite of quantum cybersecurity solutions mentioned
here, while ISARA Corporation is located in Canada’s quantum valley ecosystem and
focuses on post-quantum cryptography. Meanwhile, the recognized world leader in
quantum cryptography and quantum key distribution—ID Quantique—was recently
purchased by SK Telecom in South Korea, another significant U.S. ally.
With Australia, Canada, and the UK, the United States has an added advantage in
terms of technology and information-sharing: all four countries are members of the
Five Eyes intelligence community, which originated in U.S.-UK intelligence
cooperation in World War II.
Therefore, the United States should look to its closest allies to develop and
commercialize quantum cybersecurity measures. Such solutions must be
implemented before the development of a quantum prime computer. Otherwise, the
results could be catastrophic.
Particularly for critical infrastructure, a combination of software and hardware
solutions will be beneficial. For example, until it becomes commercially and
scientifically viable to secure the entire U.S. power grid with quantum networks, such
hardware will be used only in high-density areas, alongside quantum-resistant
algorithms.
In conclusion, America should adopt an “all of the above” approach (similar to its
approach to missile defense) to research, commercialize, and integrate layered
quantum cybersecurity solutions, first by implementing quantum random-number
generators, and then by rolling out post-quantum cryptography and quantum
cryptography.
Doing so, however, will require some important thinking about a national quantum
cybersecurity strategy, in addition to a national quantum computing strategy. Today,
the country that has taken the lead in combining the two is not the United States, but
China.
14