- 
Recently, we've seen the effects
 of cyber attacks on the business world.
 
- 
Data breaches at companies like JP Morgan,
 Yahoo, Home Depot and Target
 
- 
have caused losses of hundreds of millions 
- 
and in some cases, billions of dollars. 
- 
It wouldn't take many large attacks
 to ravage the world economy.
 
- 
And the public sector
 has not been immune, either.
 
- 
In 2012 to 2014, 
- 
there was a significant data breach
 at the US Office of Personnel Management.
 
- 
Security clearance
 and fingerprint data was compromised,
 
- 
affecting 22 million employees. 
- 
And you may have heard of the attempt
 by state-sponsored hackers
 
- 
to use stolen data to influence election
 outcomes in a number of countries.
 
- 
Two recent examples are
 the compromise of a large amount of data
 
- 
from the Bundestag,
 the national Parliament of Germany,
 
- 
and the theft of emails from the US
 Democratic National Committee.
 
- 
The cyber threat is now affecting
 our democratic processes.
 
- 
And it's likely to get worse. 
- 
As computer technology
 is becoming more powerful,
 
- 
the systems we use to protect our data
 are becoming more vulnerable.
 
- 
Adding to the concern
 is a new type of computing technology,
 
- 
called quantum computing, 
- 
which leverages microscopic
 properties of nature
 
- 
to deliver unimaginable increases
 in computational power.
 
- 
It's so powerful that it will crack
 many of the encryption systems
 
- 
that we use today. 
- 
So is the situation hopeless? 
- 
Should we start packing
 our digital survival gear
 
- 
and prepare for an upcoming
 data apocalypse?
 
- 
I would say, not yet. 
- 
Quantum computing is still in the labs. 
- 
And it will take a few years
 till it's put to practical applications.
 
- 
More important, 
- 
there have been major breakthroughs
 in the field of encryption.
 
- 
For me, this is
 a particularly exciting time
 
- 
in the history of secure communications. 
- 
About 15 years ago, 
- 
when I learned of our new-found ability 
- 
to create quantum effects
 that don't exist in nature,
 
- 
I was excited. 
- 
The idea of applying
 the fundamental laws of physics
 
- 
to make encryption stronger 
- 
really intrigued me. 
- 
Today, a select groups of companies
 and labs around the world, including mine,
 
- 
are maturing this technology
 for practical applications.
 
- 
That's right. 
- 
We are now preparing
 to fight quantum with quantum.
 
- 
So how does this all work? 
- 
Well, first, let's take a quick tour
 of the world of encryption.
 
- 
For that, you'll need a briefcase, 
- 
some important documents that you want
 to send your friend, James Bond,
 
- 
and a lock to keep it all safe. 
- 
Because the documents are top secret,
 we're going to use an advance briefcase.
 
- 
It has a special combination lock, 
- 
which when closed, 
- 
converts all the text
 in the documents to random numbers.
 
- 
So you put your documents inside,
 close the lock --
 
- 
at which point in time the documents
 get converted to random numbers --
 
- 
and you send the briefcase to James. 
- 
While it's on its way,
 you call him to give him the code.
 
- 
When he gets the briefcase,
 he enters the code,
 
- 
the documents get unscrambled, and voilà, 
- 
you've just sent
 an encoded message to James Bond.
 
- 
(Laughter) 
- 
A fun example, but it does illustrate
 three things important for encryption.
 
- 
The code -- we call this
 an encryption key.
 
- 
You can think of it as a password. 
- 
The call to James to give him
 the code for the combination lock.
 
- 
We call this key exchange. 
- 
This is how you ensure 
- 
you get the encryption key
 securely to the right place.
 
- 
And the lock, which encodes
 and decodes the document.
 
- 
We call this an encryption algorithm. 
- 
Using the key, it encodes
 the text in the documents
 
- 
to random numbers. 
- 
A good algorithm will encode in such a way 
- 
that without the key
 it's very difficult to unscramble.
 
- 
What makes encryption so important 
- 
is that if someone were to capture
 the briefcase and cut it open
 
- 
without the encryption key
 and the encryption algorithm,
 
- 
they wouldn't be able
 to read the documents.
 
- 
They would look like nothing more
 than a bunch of random numbers.
 
- 
Most security systems rely
 on a secure method for key exchange
 
- 
to communicate the encryption key
 to the right place.
 
- 
However, rapid increases
 in computational power
 
- 
are putting at risk a number
 of the key exchange methods we have today.
 
- 
Consider one of the very
 widely used systems today -- RSA.
 
- 
When it was invented, in 1977, 
- 
it was estimated that it would take
 40 quadrillion years
 
- 
to break a 426-bit RSA key. 
- 
In 1994, just 17 years later, 
- 
the code was broken. 
- 
As computers have become
 more and more powerful,
 
- 
we've had to use larger and larger codes. 
- 
Today we routinely use 2048 or 4096 bits. 
- 
As you can see, code makers and breakers
 are engaged in an ongoing battle
 
- 
to outwit each other. 
- 
And when quantum computers arrive
 in the next 10 to 15 years,
 
- 
they will even more rapidly
 crack the complex mathematics
 
- 
that underlies many
 of our encryption systems today.
 
- 
Indeed, the quantum computer is likely
 to turn our present security castle
 
- 
into a mere house of cards. 
- 
We have to find a way
 to defend our castle.
 
- 
There's been a growing
 body of research in recent years
 
- 
looking at using quantum effects
 to make encryption stronger.
 
- 
And there have been
 some exciting breakthroughs.
 
- 
Remember those three things
 important for encryption --
 
- 
high-quality keys, secure key exchange
 and a strong algorithm?
 
- 
Well, advances in science and engineering 
- 
are putting two of those
 three elements at risk.
 
- 
First of all, those keys. 
- 
Random numbers are the foundational
 building blocks of encryption keys.
 
- 
But today, they're not truly random. 
- 
Currently, we construct encryption keys 
- 
from sequences of random numbers
 generated from software,
 
- 
so-called pseudo-random numbers. 
- 
Numbers generated by a program
 or a mathematical recipe
 
- 
will have some, perhaps subtle,
 pattern to them.
 
- 
The less random the numbers are, 
- 
or in scientific terms,
 the less entropy they contain,
 
- 
the easier they are to predict. 
- 
Recently, several casinos
 have been victims of a creative attack.
 
- 
The output of slot machines
 was recorded over a period of time
 
- 
and then analyzed. 
- 
This allowed the cyber criminals 
- 
to reverse engineer
 the pseudo-random number generator
 
- 
behind the spinning wheels. 
- 
And allowed them, with high accuracy,
 to predict the spins of the wheels,
 
- 
enabling them to make big financial gains. 
- 
Similar risks apply to encryption keys. 
- 
So having a true random number generator
 is essential for secure encryption.
 
- 
For years, researchers have been looking
 at building true random number generators.
 
- 
But most designs to date
 are either not random enough,
 
- 
fast enough, or aren't easily repeatable. 
- 
But the quantum world is truly random. 
- 
So it makes sense to take advantage
 of this intrinsic randomness.
 
- 
Devices that can measure quantum effects 
- 
can produce an endless stream
 of random numbers at high speed.
 
- 
Foiling all those
 would-be casino criminals.
 
- 
A select group of universities
 and companies around the world
 
- 
are focused on building
 true random number generators.
 
- 
At my company, our quantum
 random number generator
 
- 
started life on a two meter
 by one meter optic table.
 
- 
We were then able to reduce it
 to a server-size box.
 
- 
Today, it's miniaturized into a PCI card
 that plugs into a standard computer.
 
- 
This is the world's fastest
 true random number generator.
 
- 
It measures quantum effects to produce
 a billion random numbers per second.
 
- 
And it's in use today to improve security 
- 
at cloud providers, banks
 and government agencies
 
- 
around the world. 
- 
(Applause) 
- 
But even with a true
 random number generator,
 
- 
we've still got the second
 big cyber threat:
 
- 
the problem of secure key exchange. 
- 
Current key exchange techniques
 will not stand up to a quantum computer.
 
- 
The quantum solution to this problem 
- 
is called quantum key distribution or QKD. 
- 
Which leverages a fundamental,
 counterintuitive characteristic
 
- 
of quantum mechanics. 
- 
The very act of looking
 at a quantum particle changes it.
 
- 
Let me give you an example
 of how this works.
 
- 
Consider again exchanging the code
 for the lock with James Bond.
 
- 
Except this time, instead of a call
 to give James the code,
 
- 
we're going to use quantum effects
 on a laser to carry the code.
 
- 
And send it over standard
 optic fiber to James.
 
- 
We assume that Dr. No
 is trying to hack the exchange.
 
- 
Luckily, Dr. No's attempt to intercept
 the quantum keys while in transit
 
- 
will leave fingerprints
 that James and you can detect.
 
- 
This allows those intercepted keys
 to be discarded.
 
- 
The keys which are then retained 
- 
can be used to provide
 very strong data protection.
 
- 
And because the security is based
 on the fundamental laws of physics,
 
- 
a quantum computer, or indeed
 any future supercomputer
 
- 
will not be able to break it. 
- 
My team and I are collaborating
 with leading universities
 
- 
and the defense sector 
- 
to mature this exciting technology 
- 
into the next generation
 of security products.
 
- 
The internet of things
 is heralding a hyperconnected era
 
- 
with 25 to 30 billion
 connected devices forecast by 2020.
 
- 
For the correct functioning
 of our society in an IoT world,
 
- 
trust in the systems that support
 these connected devices is vital.
 
- 
We're betting that quantum technologies
 will be essential in providing this trust.
 
- 
Enabling us to fully benefit
 from the amazing innovations
 
- 
that are going to so enrich our lives. 
- 
Thank you. 
- 
(Applause)