Implications of Quantum Processing for Lawful Intelligence

A quantum processor in a server room

As quantum processing rapidly shifts from the theoretical realm to reality over the next decade, it will provide critical support for growing capacity, performance, and data protection requirements in mobile networks. Quantum mechanics diverges from classical physics in ways that open entirely new frontiers in computing, with dramatic implications for telecommunications and lawful intelligence.

Unlike the simple binary bits of traditional computing, quantum computers use quantum bits, referred to as qubits. The fundamental nature of qubits allows them to exist in a superposition of states, meaning that each qubit can represent a one, a zero, and any combination of those states simultaneously, scaling parallelism exponentially.

Quantum physics also exhibits entanglement, in which the states of multiple qubits are correlated in such a way that a change in one instantaneously causes a change in others, even light years away. Einstein famously called that phenomenon “spooky action at a distance.” Finally, an arbitrary quantum state cannot be cloned. In classical computing, bits can be copied using an amplifier, allowing the possibility of eavesdropping. Qubits, however, cannot be copied.

Taken together, quantum phenomena including superposition, entanglement, and the inability to be cloned are foundations for reinventing data processing and communications. Quantum systems will make previously intractable problems solvable, changing fundamental assumptions. This blog post introduces some considerations for lawful intelligence as the industry looks ahead to the quantum age.

Establishing Quantum Key Distribution Mechanisms

Quantum mechanics redefines authentication and key sharing related to encrypting and decrypting communication content. Current processes for establishing and utilizing private communication sessions with conventional encryption rely on exchanging private keys over the wire.

Quantum key distribution (QKD) replaces that approach using quantum phenomena such as superposition and entanglement as the foundation for secure key exchange. Sessions based on those physical properties would theoretically be invulnerable to brute force attacks.

Entangling two servers in a sustained way is currently being tested in multiple trials around the world. Each server will also need to reach out to handsets across the network and orchestrate entanglement among them as well to support QKD. Entirely new mechanisms will be needed to govern that session establishment and orchestration, and lawful intelligence will need to evolve to keep pace.

Entanglement between two handsets could theoretically enable communication that does not travel through the network in a conventional sense. Like sidelink communications, those scenarios eliminate the mediation point typically occupied by lawful interception operations. In fact, measurements of quantum states could theoretically let subjects of interest detect any attempts at eavesdropping or interception.

This sea change will require dramatic shifts in lawful intelligence tools and techniques that are only starting to be conceived. SS8 continues in its role advancing inquiry, international standards, and technologies to meet these emerging requirements.

Post-Quantum Encryption and Transition to the Quantum Future

The classical cryptography that underlies establishing secure sessions and transmitting data over them relies on math calculations for decryption that are intractably complex and time-consuming to complete. Critically, those calculations could theoretically be completed given enough time, but classical computing architectures lack the scale needed for brute-force decryption to be practical. Quantum computing changes that calculus with orders-of-magnitude greater computational capacity that could make it trivial to defeat existing encryption.

In response to the coming ability of quantum computers to defeat classical encryption, a new class of quantum-secure cryptographic algorithms is being developed. So-called post-quantum cryptography (PQC) will be used to secure both classical communication systems and those yet to be developed based on quantum processing. These measures are designed to withstand the novel attacks leveled by quantum systems and to remain invulnerable, regardless of advances in computational capacity.

Unlike QKD, post-quantum encryption is decoupled from quantum mechanics, relying instead on classical mathematical algorithms believed to be resistant to quantum attacks, often through larger key sizes and more complex structures. These algorithms are based on mathematical problems for which no efficient quantum algorithms are currently known.

PQC maintains the same overall model as conventional public-key encryption. The recipient generates a public-private key pair, the sender encrypts the content using the public key, and only the recipient can decrypt it using their private key. This commonality potentially supports hybrid, transitional approaches between classical and post-quantum cryptographic systems that take advantage of the strengths of both.

For example, existing transport-level security (TLS) frameworks could be augmented with PQC algorithms to introduce quantum-resistant protection while maintaining compatibility during the transition. QKD and other mechanisms that are on longer time horizons for development could be added subsequently as separate steps.

The depth, significance, and likely speed of this transition will require communication networks to maintain an active state of change to keep pace with it. In turn, SS8 is keeping up with quantum evolution and preparing to meet its challenges with new approaches that will empower future generations of lawful intelligence.

About Franklin Recio

SS8 Global Implementation Manager Franklin RecioFranklin Recio has been with SS8 since its foundation. He has been involved in multiple roles including project management, services, sales, and product development. Currently, he is the Senior Technical Project Manager and leads the Acceler8 partner program focused on expanding relationships within the ecosystem. Franklin has an engineering bachelor’s degree in Electronic Communications and a master’s degree in Upper Management and International Development. Currently, he’s pursuing a Ph.D. in Strategic Analysis and Sustainable Development at the Anahuac-Mayab University in Mexico. Learn more about Franklin on his LinkedIn profile here.

About SS8 Networks

As a leader in Lawful and Location Intelligence, SS8 is committed to making societies safer. Our mission is to extract, analyze, and visualize critical intelligence, providing real-time insights that help save lives. With 25 years of expertise, SS8 is a trusted partner of the world’s largest government agencies and communication providers, consistently remaining at the forefront of innovation.

Intellego® XT monitoring and data analytics portfolio is optimized for Law Enforcement Agencies to capture, analyze, and visualize complex data sets for real-time investigative intelligence.

LocationWise delivers the highest audited network location accuracy worldwide, providing active and passive location intelligence for emergency services, law enforcement, and mobile network operators.

Xcipio® mediation platform meets the demands of lawful intercept in any network type and provides the ability to transcode (convert) between lawful intercept handover versions and standard families.

To learn more, contact us at info@SS8.com.

Follow us on  LinkedIn  or X  @SS8

SS8 Newsletter

LATEST WEBINAR

THE DATA SILO DILEMMA FOR LAW ENFORCEMENT

How to Ingest, Filter and Query 5G Volumes

Webinar Presented by Kevin McTiernan

CLICK HERE to watch!

SS8
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.