--[ Quantum Encryption in a Classical Internet

Presenter
$ getent passwd hbonds
.
├─ name: Hamilton T. Bonds
└── org: 2d Battalion, 1st IO Command (L)
Experience

Born and raised in Inman, SC and graduated the United States Military Academy in 2017. BS Physics with Cybersecurity minor, conducted research with quantum encryption. Serves as the Development Operations (DevOps) Team Lead, which is responsible for researching and developing new capabilities for the Army Red Team to emulate real-world adversaries on the DoD Information Network (DODIN). Five years as a Cyber Officer, 2 years providing cyber all-source analysis to Information Operations planners and Combatant Commands, 2 years serving actively as a capabilities developer. Computing languages: Python, C, ECMA. Spoken languages: Russian, Ukrainian.

Abstract

This presentation examines the importance, reliability, and feasibility of quantum encryption implementation for data in motion (DIM) in comparison to its classical counterparts. Quantum encryption devices are commercially available, affordable, effective, and compatible with classical internet systems. Such devices implement algorithms that are theoretically impervious to tampering and unauthorized decryption, harnessing properties of quantum mechanics to detect eavesdroppers and renegotiate private keys. The advent of "quantum-resistant cryptography" catalyzed the development of encryption algorithms that are intended to resist or negate the power of quantum computing, but this presentation argues that quantum key distribution (QKD) is a more technically sound solution.

Combining QKD research and real-world implementation, this presentation demonstrates the exact methods that quantum encryption devices use to protect data and illustrates the practicality of installing and operating quantum encryption devices. It stipulates that, in order to ensure all systems transmitting sensitive data are adequately prepared for future encryption-defeating capabilities and eavesdropping threats, organizations must include quantum encryption devices in their networks. Additionally, implementing QKD implies that cyberspace defenders must train to understand and operate quantum encryption devices.