Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Is there any projected practical use for QKD apart from being a jobs program for researchers?

(This is a thing I am fine with, research is research and it doesn't necessarily need a near-term practical outcome, but why is it "sold" to the public as though there is some useful capability coming just around the corner?).

Who would use dedicated fiber to get secrets between point A and point B? Am I just insufficiently imaginative?

Whenever I read these headlines I am reminded of how much biological research needs to have a "could one day cure cancer" to give funders and journalists a hook.



Large companies and governments go to some lengths to protect their internal communications between their sites.

Cloud providers also have some dedicated fiber between their data centers.


Right but what are they going to do with the keys being exchanged? Load them into networked traditional computers?

If the computers are secure they can presumably do authenticated key agreement perfectly well and if they are not then I don't see how the QKD helps.

Security is nuanced and thinking in binaries is often a mistake - but I don't see how QKD meaningfully changes anyone's threat model in any plausible deployment scenario.


QKD will generate a session key, just like Diffie-Hellman or some of the post-quantum DH alternatives. If your threat model includes the risk that someone captures and stores ciphertext and subsequently gets access to a quantum computer and the ability to break whatever post-quantum scheme you’ve augmented with, then maybe QKD is useful. I agree that this is a bit of a stretch.

(Of course, one can also augment DH with symmetric crypto for the datacenter use case, with someone trustworthy literally carrying the key to the other end of the link, and I see no realistic usage of QKD that will outperform that unless one is worried about post-compromise recovery of a symmetric key stored in a piece of hardware. Plus, QKD has its own issues: security of QKD is subject to catastrophic failures if the single-photon source isn’t actually a single-photon source and possibly also if a malicious light source injected into the fiber causes the transmitter to stop being a single-photon source or the receiver to behave in a manner inconsistent with any possible single received photon. Think of these as side channel and fault attacks that are rather difficult to manage.)




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: