Quantum Communications and the Future of Signals Intelligence
How space-based quantum links and great power rivalry will redraw the map of interception by 2035
Quantum communications are no longer a laboratory curiosity. Since January 2023 they have become a strategic signal of intent, a way for states to advertise that they are preparing for a future in which classical cryptography can be broken and eavesdropping becomes harder and more selective. The central question for national security leaders is simple: does this wave of quantum work mark the end of signals intelligence as it has been practiced for a century, or does it force a rebalancing rather than a collapse?
A clear pattern emerges from recent developments. China is using quantum satellites and terrestrial networks to build secure links, Europe is knitting quantum technology into its next-generation space architecture, and NATO and key cyber agencies are laying out timelines for a quantum-safe transition. At the same time, the U.S. National Security Agency and other sober voices question whether quantum key distribution is practical for large national systems, and they place their bets on post-quantum cryptography instead. The most realistic forecast is that quantum communications will narrow the window for classic content interception on priority links, shift some SIGINT effort toward metadata and side channels, and place a premium on whoever manages the transition to quantum-resistant architectures, rather than wiping out signals intelligence in one stroke.
From experiment to infrastructure
Quantum communication moved from proof-of-concept to strategic infrastructure over the past decade, but the pace has accelerated since 2023. The Micius satellite, launched by China in August 2016 under the Quantum Experiments at Space Scale program, demonstrated the first space-to-ground quantum key distribution and an intercontinental quantum-secured video link to Europe, proving that entangled photons could be used to distribute keys across thousands of kilometers. (APS Link) Those experiments laid the groundwork for a new class of secure links that treat eavesdropping as a detectable disturbance in physics rather than a puzzle in mathematics.
In March 2025, researchers from China and South Africa pushed this concept into an operationally relevant range. Using the Chinese quantum microsatellite Jinan-1 and a portable optical ground station in South Africa, they established a 12,900-kilometer quantum satellite link in a single pass, generating more than one million bits of secret key and marking the first such link in the Southern Hemisphere. (ScienceDaily) A commentary in Nature described it as a record-breaking step toward intercontinental quantum networks, and it is no accident that the connection tied China to a BRICS partner rather than to a Western ally. (Nature)
Europe has chosen a different path, mixing terrestrial and space segments. Through the European Quantum Communication Infrastructure (EuroQCI), the European Commission is funding national fiber-based QKD backbones and, since January 2024, has supported the NOSTRADAMUS project, a four-year effort to test and certify QKD technologies for eventual deployment. (Digital Strategy) In parallel, the IRIS² secure connectivity constellation, announced in March 2023 as the European Union’s third flagship space program, is being designed to provide sovereign, highly secure connectivity for governments and critical users. (European Commission) In January 2025 the European Space Agency and the Commission announced that EuroQCI will be integrated with IRIS², explicitly aiming at an architecture where quantum-secured links and classical encrypted services coexist across terrestrial and orbital segments. (Connectivity)
Industry has responded. On January 21, 2025, Thales Alenia Space and Hispasat declared that they had started development of QKD-GEO, described as the world’s first quantum key distribution capacity from geostationary orbit, with the goal of providing “unhackable” keys for civil users in Europe and Latin America. (hispasat.com) All of this activity signals that space-based quantum communications are moving toward modest but real operational roles.
Q-day, great-power rivalry, and space
The driver behind these investments is fear of a cryptographic shock. On December 14, 2023, a major Reuters investigation described how the United States and China are racing to shield secrets from future quantum computers, warning that a hypothetical “Q-day” could arrive when such machines break widely-used public-key encryption in hours rather than millennia. (Reuters) The article emphasized that both governments are steering billions into quantum research while intelligence agencies quietly urge an accelerated transition to quantum-safe systems. A companion Reuters explainer on the same day laid out how quantum computers use qubits and superposition to attack problems that classical machines cannot approach in any reasonable time, making code-breaking a central military concern. (Reuters)
Strategic competition around quantum is no longer confined to laboratories. A November 2025 report by the U.S.–China Economic and Security Review Commission concluded that both countries see economic and security gains in harnessing quantum technology first, and that China relies on a top-down, state-driven approach to quantum communications and computing. (USCC) In February 2025, CSIS’s Commission on U.S. Quantum Leadership recommended that Washington treat quantum as a core national security technology and design policies that strengthen domestic research, deepen allied partnerships, and accelerate commercial deployment in key areas such as secure communication. (CSIS)
Restrictions have followed. On October 28, 2024, the Biden administration finalized rules that restrict U.S. outbound investment into Chinese quantum firms, treating quantum alongside semiconductors and advanced AI as a sector with direct military relevance. (Reuters) In January 2025 the European Commission went further, calling on member states to review outbound investments in quantum and other strategic technologies dating back to 2021, arguing that sensitive know-how could be diverted to hostile military uses. (Reuters) Quantum communications, and the satellites that support them, have become part of a broader contest over who controls future secure networks.
Quantum links versus classic SIGINT
At first glance, quantum key distribution seems designed to defeat signals intelligence. QKD systems exchange cryptographic keys by transmitting quantum states; any attempt to measure those states in transit necessarily disturbs them and alerts the users. That promise has led to bold marketing claims that QKD offers “guaranteed security” grounded in physics rather than in assumptions about an adversary’s computing power.
The U.S. National Security Agency has taken a more austere view. In a public advisory originally issued in October 2020 and still cited in 2025 policy debates, NSA states plainly that it does not recommend QKD or quantum cryptography for protecting National Security Systems, except in very limited circumstances, because real deployments must contend with side-channel attacks, implementation defects, key-management complexity, and insider threats. (NSA) NSA’s conclusion is that quantum-resistant classical cryptography is a more cost-effective and maintainable path for national systems.
For SIGINT professionals, the implication is subtle. Where QKD and similar quantum schemes are deployed correctly, classic content interception that depends on capturing encrypted traffic and later decrypting it becomes far less attractive. However, quantum systems still rely on classical channels for authentication, control, and metadata. Many satellite experiments, including the China–South Africa Jinan-1 link in March 2025, use QKD only to distribute keys, then apply those keys in standard symmetric encryption. (ScienceDaily) That means classical cryptographic components remain in the loop, and they become the focus of attack.
Quantum communications also do not erase radiofrequency signatures, traffic patterns, routing information, or endpoint vulnerabilities. Intercept services can therefore expect a gradual shift in their tradecraft, away from brute-force decryption of intercepted ciphertext and toward exploitation of side channels, flawed deployments, compromised endpoint devices, and human sources. The content pool may narrow on high-priority links, but the hunger for context, pattern analysis, and access to poorly secured parts of the network will grow.
Post-quantum cryptography and migration risk
If quantum communications shrink one avenue of SIGINT, quantum computing threatens another. The core concern is that a sufficiently powerful quantum computer could use algorithms such as Shor’s to break current public-key schemes. In response, the United States has advanced post-quantum cryptography as a main line of defense.
The National Institute of Standards and Technology announced in July 2022 that it had selected four algorithms for post-quantum standardization, and on August 13, 2024, NIST released three finalized Federal Information Processing Standards, known as FIPS 203, 204, and 205, to define lattice-based key encapsulation and digital signatures for general use. (NIST Computer Security Resource Center) These standards provide a blueprint for upgrading classical systems, including satellites and ground stations, without requiring quantum hardware. They are the bedrock for the U.S. government’s long-term migration plan.
Allies are beginning to move on similar timelines. On March 20, 2025, the United Kingdom’s National Cyber Security Centre issued detailed guidance that urges critical infrastructure operators to complete a full transition to post-quantum cryptography by 2035, with discovery of vulnerable systems by 2028 and priority upgrades by 2031. (ncsc.gov.uk) RAND commentary in June 2025 warned that if allied militaries adopt different quantum-safe approaches that are not interoperable, coalition communications could splinter, creating a new kind of technical friction in combined operations. (RAND Corporation)
Migration itself carries risk. Cryptographic change has historically produced fresh implementation flaws, and quantum-safe algorithms often require larger key sizes and different performance profiles. A 2022 RAND study on post-quantum critical infrastructure stressed that the most technically advanced algorithms are only one piece of the puzzle; governance, inventory of existing cryptographic assets, and disciplined transition plans are just as important. (RAND Corporation) For SIGINT planners, this means a long window in which misconfigured or partially upgraded systems will coexist with fully quantum-safe links, creating a varied target environment rather than a uniform blackout.
Space architectures, alliances, and quantum strategy
Space architectures sit at the intersection of these trends. Europe’s IRIS², as described in a September 2023 trade analysis, is being built as a secure government and commercial constellation with an explicit emphasis on sovereignty and resilience, and it is expected to host quantum-secured services as EuroQCI matures. (Via Satellite) The January 2025 ESA–Commission statement on integrating EuroQCI and IRIS² confirms that Europe intends to fuse terrestrial QKD links with space-based connectivity as part of a wider “quantum-ready” model. (Connectivity)
The alliance context is also shifting. On January 17, 2024, NATO released a public summary of its first Quantum Technologies Strategy, committing the Alliance to become “quantum-ready” across sensing, secure communications, and cryptography. (NATO) An independent analysis by the Soufan Center in late January 2024 argued that NATO sees quantum as a pivotal element of strategic competition and is positioning DIANA and other instruments to channel allied industry toward dual-use applications in defense. (The Soufan Center)
Commercial actors bring their own momentum. In 2025, Toshiba Europe demonstrated quantum-encrypted messaging across 250 kilometers of commercial fiber in Germany, using QKD over standard telecom infrastructure rather than exotic hardware, and reported the results in Nature. (Financial Times) Patent data released by the European Patent Office in December 2025 shows that inventions in quantum technologies, including communications, have increased fivefold over the last decade, suggesting that corporate and academic ecosystems are now heavily engaged. (epo.org) These trends imply that space-based quantum links will sit inside a broader mesh of terrestrial quantum-safe networks, complicating any attempt to treat them as a niche technology.
Strategic forecast: SIGINT after quantum
The title question invites an extreme answer, but the evidence supports a more nuanced forecast.
First, quantum communications will spread in high-value niches. Government-to-government links, command centers, and select satellite channels are natural early adopters for QKD and related schemes. China’s Jinan-1 experiments with South Africa in March and August 2025 show that Beijing is willing to use space-based quantum links as diplomatic and strategic signals, tying partners into a communications architecture that advertises security and technological prestige. (Phys.org) European work on EuroQCI and IRIS² signals a parallel effort to create allied, quantum-aware infrastructure rather than depend on foreign providers. (Defence Industry and Space)
Second, cryptographic migration will become a long, uneven campaign. NIST’s post-quantum standards, UK NCSC’s 2035 target, and RAND’s warnings about interoperability all point to a decade-long transition in which old and new systems coexist. (NIST) During that span, SIGINT agencies will still find exploitable seams: legacy protocols, poorly executed upgrades, and endpoints where human error matters more than mathematics.
Third, the content of SIGINT will narrow at the high end while the value of context grows. On well-managed quantum or post-quantum networks, classical decryption will grow harder, and adversaries may succeed in shielding more of their most sensitive planning. In response, collection priorities will shift toward traffic analysis, timing, routing, network topology, and cross-domain fusion with cyber, electronic warfare, and human intelligence. The field does not vanish; it changes its hunting grounds.
Finally, the geopolitical contest over quantum itself will feed back into space policy. Controls on outbound investment into Chinese quantum firms, EU reviews of technology flows, and NATO’s quantum strategy all tell the same story: leaders see quantum communications and computing as a strategic technology class that, like nuclear physics in an earlier age, reshapes alliances and red lines. (Reuters)
By December 21, 2025, it is clear that quantum communications do not herald the end of signals intelligence. They do, however, mark the end of complacency about cryptographic superiority. For policy and national security leaders, the task is to steer their states through a period where quantum discovery, post-quantum standards, and space architectures are all moving at once, and where failure to adapt may leave their communications exposed while their adversaries learn to hide in new ways.


