ANU Demonstrates Quantum Key Distribution Over Metropolitan Fibre Network


Researchers at the Australian National University have demonstrated quantum key distribution across Canberra’s fibre optic network, transmitting quantum-encrypted data securely across 100 kilometres of metropolitan infrastructure. The work shows that quantum cryptography can operate on real-world telecommunications networks, not just laboratory setups.

Quantum key distribution uses properties of quantum physics to create encryption keys that cannot be intercepted without detection. If anyone attempts to eavesdrop on the quantum channel, the quantum states collapse in detectable ways, revealing the security breach.

This matters because conventional encryption methods rely on mathematical complexity, which quantum computers may eventually break. Quantum key distribution provides security based on physics rather than computational difficulty, offering protection even against future quantum computers.

How Quantum Cryptography Works

Quantum key distribution typically encodes information in the polarisation or phase of individual photons. The sender transmits photons to a receiver across a fibre optic link. The receiver measures each photon’s properties, and sender and receiver compare a subset of results to verify no eavesdropping occurred.

The security comes from quantum mechanics’ fundamental properties. Measuring a quantum system disturbs it in ways the legitimate parties can detect but an eavesdropper cannot avoid. This provides information-theoretic security rather than computational security, a crucial distinction.

However, quantum key distribution faces practical challenges. Photons are absorbed and scattered as they travel through optical fibres, limiting transmission distance. Single-photon detectors have imperfections that sophisticated attackers might exploit. And integration with existing telecommunications infrastructure requires careful engineering.

The ANU demonstration addressed several of these challenges. The researchers used existing Canberra fibre network rather than dedicated laboratory fibres, showing the technology works with real-world infrastructure. They implemented security measures addressing known detector vulnerabilities. And they maintained key generation rates suitable for practical applications.

Technical Implementation

The experiment transmitted quantum signals between ANU’s campus and sites across Canberra, including the Australian Defence Force Academy and the Australian Signals Directorate facility. Fibre distances ranged from 20 to 100 kilometres, typical for metropolitan networks.

Key generation rates achieved 1 kilobit per second at maximum distance, sufficient for establishing encryption keys for subsequent conventional encrypted communications. The quantum channel generates keys that then encrypt large data transfers using standard symmetric encryption.

The system used a technique called decoy-state quantum key distribution, which provides security against photon-number-splitting attacks that can compromise simpler implementations. This represents current best practice in quantum cryptography design.

Researchers also demonstrated continuous operation over 24-hour periods, important for practical deployment. Laboratory demonstrations often run briefly under optimised conditions. Real systems must operate reliably despite temperature variations, network traffic on adjacent fibre channels, and mechanical vibrations affecting fibre connections.

Professor Ping Koy Lam, who leads ANU’s quantum communications research, said the results show quantum cryptography is ready for deployment protecting high-value communications. Government agencies, financial institutions, and critical infrastructure operators represent likely early adopters.

Comparison to Post-Quantum Cryptography

Quantum key distribution competes with post-quantum cryptography, mathematical encryption methods designed to resist quantum computer attacks. Post-quantum algorithms work with existing infrastructure and require no specialised hardware, making deployment simpler than quantum cryptography.

However, post-quantum cryptography relies on mathematical problems believed to be hard for quantum computers but without proof. Future algorithmic advances might break these schemes, whereas quantum key distribution’s security is guaranteed by physics.

Most experts expect both approaches will find roles. Post-quantum cryptography will protect most communications because it’s practical and cheap. Quantum key distribution will secure the most sensitive communications where the additional cost is justified.

Hybrid systems combining both approaches offer defense in depth. Communications encrypted with both quantum key distribution and post-quantum algorithms remain secure if either approach has unforeseen vulnerabilities.

Deployment Considerations

Rolling out quantum cryptography networks requires addressing several practical issues. The technology currently demands specialised equipment at both ends of quantum links, more expensive than conventional networking equipment.

Quantum signals cannot be amplified like conventional optical signals, limiting point-to-point transmission distances. Building quantum networks across long distances requires trusted nodes where quantum keys are received, stored briefly, and retransmitted. These nodes represent potential security vulnerabilities.

Quantum repeaters, devices that extend quantum communication distances without the security compromises of trusted nodes, remain experimental. Several research groups including teams at UNSW and Griffith University are working on quantum repeater technologies, but practical devices are years away.

Integration with existing network management and security infrastructure also needs work. Telecommunications operators have established procedures for deploying and maintaining networks. Quantum cryptography systems must fit those operational frameworks to enable widespread adoption.

Australian Quantum Communications

Australia has invested substantially in quantum technology research through the ARC Centre of Excellence for Quantum Computation and Communication Technology and targeted funding programs. The country has strong capabilities in quantum cryptography, quantum computing, and quantum sensing.

Several Australian research groups are pursuing quantum communications. University of Queensland demonstrated quantum communication with satellites. RMIT developed integrated photonics for quantum systems. The combined capability positions Australia well in emerging quantum technologies.

There’s also growing industry involvement. QuintessenceLabs, a Canberra startup spun out from ANU research, commercialises quantum cybersecurity products. Other startups are emerging from university research groups as technologies mature.

The Australian government identified quantum technologies as a national priority, allocating funding for research translation and industry development. Defence and intelligence agencies have particular interest in quantum-secure communications for protecting classified information.

Global Quantum Networks

China has deployed the world’s most extensive quantum communications infrastructure, including a 2,000-kilometre quantum network connecting Beijing and Shanghai and quantum communication satellites. European and South Korean networks are also operational.

These networks currently serve primarily government and research users, but commercial services are expanding. Banks in China use quantum key distribution for securing inter-branch communications. The technology transitions from research curiosity to deployed infrastructure.

Australian participation in global quantum networks could support secure international communications for government, defence, and commercial applications. But building international quantum links requires submarine cables with quantum capabilities or quantum communication satellites, both technically demanding.

The ANU demonstration shows Australia has the technical capability to deploy metropolitan quantum networks. Whether that leads to significant infrastructure investment depends on threat assessments, cost-benefit analyses, and competing security technology options.

For organisations evaluating quantum cryptography for securing sensitive communications, the technology is maturing but not yet mainstream. Early adoption requires tolerance for higher costs and operational complexity in exchange for security guarantees that may prove important as quantum computers develop.

The Canberra network demonstration represents an important milestone showing quantum cryptography works on real telecommunications infrastructure under operational conditions. That moves the technology closer to practical deployment, though challenges remain before it becomes as routine as conventional networking.