Skip to main content

China proposes a draft protocol to ensure that quantum computers cannot crack existing communications encryption security networks

28 February 2025
China proposes a draft protocol to ensure that quantum computers cannot crack existing communications encryption security networks
4 min read

There are international concerns that as quantum computing develops its vast processing power, it could also be used to break existing encryption methods.

China seems to be leading the way in creating a ‘quantum-proof’ communication protocol, after scientists from the country presented a design blueprint at a major telecoms standards event held in Stockholm on October 7-11, 2024.

There are concerns that as quantum computing evolves it could be used to break traditional communication encryption methods, so there have been international efforts to create a ‘quantum-proof’ communication encryption protocol. Current computing methods do not have the processing power to break existing encryption methods.

The proposed protocol was led by China’s Iwncomm, a Chinese internet and IT security specialist that has over 500 patent applications. The company is part of the Chinese WAPI alliance (originally formed in 2006 to create a WLAN Authentication and Privacy Infrastructure (WAPI) standard and involves around 20 of China’s high-profile telecoms providers).

International efforts to develop post-quantum encryption standards

The new protocol was introduced at the conference in Sweden and was unanimously accepted by countries at the meeting, including the U.S., the U.K., Switzerland, Austria, Japan, South Korea, and Canada, but the effort to develop the protocol will be led by China.

The initial design presented by the Chinese delegation at the meeting is a draft. But the aim for the countries involved is to develop encryption protocols that cannot be broken by quantum computing.

The meeting in Sweden was the 47th working group meeting of the global organization ISO/IEC JTC1/SC6, which was set up in 1964 as part of the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). Its purpose is to develop and promote standards for telecoms and information exchange.

The proposal for the quantum-proof communications encryption protocol was unanimously accepted alongside seven other projects that include Chinese companies and experts.

Government concerns over ‘hack now, de-encrypt later’

Full-scale quantum computing is unlikely to replace traditional computing methods any time soon, but there is international awareness that as quantum technology develops it could start to break existing communications encryption methods with relative ease.

There are also concerns that attackers, which could be state-sponsored, could steal encrypted data now in the hope that it could be cracked once quantum computing development gathers pace. The delegates suggested that early action was required to ward off the threat quantum computing could pose.

China has already set up a working group to focus on laws, policies, and development of quantum-proof cryptography technology, while in 2022 the U.S. National Security Agency advised organizations of all sizes to migrate to secure encryption by 2035.

A report from the U.S. National Cyber Security Center published in July 2024 also outlined the U.S. strategy for transition to post-quantum encryption protocols, although it noted many challenges, including the expenses that cryptography upgrades and changes would incur.

The report also notes that, while the U.S. government wants to maintain a competitive advantage in the development of quantum computing, it must also consider the threat that quantum computing poses to encryption protocols used by the U.S. government and American companies.

Need to know more? Contact our experts for more information and to consider impacts on your own China strategies.

Latest posts
Pamir guide

China’s 5G influence in developing economies

China’s Belt and Road Initiative and its digital counterpart, the Digital Silk Road, threaten to displace US telecom and tech companies in developing economies in Africa, Latin America and the Middle East. How can US operators and network providers stand up to the challenge?