China Puts Quantum Encryption Into Orbit

China has launched the world’s first quantum satellite. So what exactly does this mean?

“The satellite is designed to establish ultra-secure quantum communications by transmitting uncrackable keys from space to the ground,” Xinhua, China’s state news agency, wrote after the equipment was launched on a rocket from the Gobi desert. “It could also conduct experiments on the bizarre features of quantum theories, such as entanglement.”

Uncrackable keys? Bizarre features? Both true. This satellite is designed to literally teleport information, to distances 1,200 kilometers (746 miles) away.

Quantum theory: the basics

Here’s a quick refresher in case you haven’t thought about physics in a few years, because this story is cooler when you understand these basics. Skip ahead if you’re already a quantum geek.

Most human technology is built around the classical physics that Isaac Newton and his inheritors came up with (equal and opposite reactions, that sort of thing). When engineers hit on electricity, Michalakis says, they perceived it in aggregate as a kind of a force; it’s either on, or it’s off. This understanding led to electric switches, which became transistors, and when you put all those transistors in a box and start turning them off and on with instructions encoded “11010001101”… it’s a computer.

But as scientists were developing electric computers in the 20th century, theorists beginning with Max Planck were ripping up the rule books. Their experiments with light suggested that something about classical physics didn’t quite add up. Soon they developed mathematical proofs to explain that the tiny particles that make up matter—protons, neutrons, and electrons—don’t necessarily behave like you would expect particles to behave. They can act as if they are in two places at once, for instance. (That’s one of those “bizarre features” the Chinese are talking about.) This is quantum theory. The first and most famous application of these ideas came in nuclear weaponry and energy.

Physicists are still trying to agree on how classical and quantum physics come together coherently. But quantum theory already underlies a lot of modern technology; the transistors on a silicon chip, in fact, wouldn’t work without it. Now engineers are trying to apply it to more futuristic things.

Spooky action at a distance

Let’s say that you take a very small particle, and set it up so that it could be in either one of two states. Let’s call one state “up,” and the other one “down.” (Quantum computers do something like this, using single atoms trapped in a magnetic field to represent either a “0” or a “1”.)

If you do this, quantum theory says that two things will happen. The first is that, although the particle will always be either “up” or “down” if you look at it, when you’re not looking, it will be in a kind of combination of the two, called a superposition. In quantum mechanics, the act of measuring something changes it; the superposition “collapses,” in the parlance, to either up or down.

The second thing is that two or more of these particles can be put in a situation of “quantum entanglement,” where they form a single superposition together. Then their physical properties are correlated. For instance, you can set them up in advance so that if you look at one particle and find it’s up, then you know, without looking, that the other must be down, and vice versa.

Here’s where it gets really interesting. Let’s say you entangle two particles. Then you move one of them far, far away, to the other side of the planet, or to the moon. No matter the distance, quantum mechanics says, they remain entangled. If you look at the first one, and in doing so change it, collapsing the superposition, you will also change the other one. And this will happen instantaneously, however far apart they are.

Let that sink in, because this technique, called “quantum teleportation,” is crazy to think about. Light has a speed limit, and normally information cannot travel faster than light. Quantum teleportation is, in a sense, information traveling outside of space and time. Einstein called it “spooky action at a distance.”

Tangled up in space

Scientists have done experiments with quantum teleportation already. They have instantaneously exchanged information about the quantum states of photons, which are particles of light, transmitted 143 km between two of the Canary Islands.

But testing quantum teleportation at extremely long distances requires going to space. It’s the easiest way to set up laser communication between two distant points on the earth’s surface. That’s what the Chinese satellite, developed in cooperation with the Austrian Academy of Science, intends to do.

The satellite contains a machine that generates entangled pairs of photons by shooting a laser beam through a specially designed crystal. Each entangled pair will be split up and beamed down to stations on Earth approximately 1,200 km apart. If all goes as planned, researchers at those stations will share access to an entangled system. Any measurement on one of those photons will be instantaneously reflected in its opposite number at the other station.

A US company had partnered with researchers in Denmark and Singapore to launch a small satellite, or cubesat, with similar goals, but it was destroyed when the rocket taking it to the International Space Station exploded in 2014.

The key is the key

Besides demonstrating a super-long entanglement, the scientists working with the satellite want to test new communications technology. It’s important to realize that we can’t send information like “Hey, how are you?” through quantum teleportation, much less teleport actual things. But smart thinkers realized that being able to share basic information about the state of atomic particles across distance could create a powerful encryption tool.

This is where the unbreakable code comes in. Perhaps the most powerful method of encryption is the “one-time pad,” where messages are encoded using a private key known to both parties; theoretically, if the key is random, is as long as the message, is never reused, and is kept completely secret, it cannot be broken. Which sounds really good, code-wise, but it has long been impractical to ensure that two parties can always access a key that meets those standards.

Quantum entanglement could help. If people on two ground stations share access to a large enough set of entangled photons, beamed to them from a satellite in space, they can generate a sufficiently long, random key by teleporting quantum information between the entangled particles.

Nobody would be able to detect the transmission of the key. “It’s very secure from the point of view that if your eavesdropper wants to listen in, usually they are within space and time,” Michalakis says. “The data is not transmitted through space-time, it goes underneath in mathematical subspace.”

Once the people in the two stations have created a key, using their entangled particles, they can use it to encrypt a message. This can be sent by whatever method they want. “You can use a telephone the moment you are sharing a key that nobody has access to,” Michalakis says.

But what if someone managed to intercept the laser beam from the satellite that had originally shared the entangled photons between the two stations? Here’s what is truly amazing: Thanks to the laws of quantum mechanics, any attempt by a third party to measure the particles in the entangled system would be immediately detected by the other two, making them aware that their code could be broken.

Quantum supremacy

The field of quantum information is still in its infancy. As we continue to learn the fundamentals of how quantum phenomena work at a large scale, the data collected will help physicists understand “the process that takes you from the quantum richness of the universe to the classical world we see around us,” Michalakis says.

It may be easy to see in this shades of the Cold War race for technological dominance, but Michalakis is confident that research will be shared within the scientific community. His hope is that this experiment is the first step toward a global network of research facilities sharing access to entangled particles beamed down from space, a kind of global, cloud-based quantum computer.

Michalakis, for obvious reasons, is particularly excited about an announcement last week that the US needs a plan to invest in quantum technologies in a serious way; while US labs have done groundbreaking work in the field, there hasn’t been public funding on the scale available in Europe and Asia.

“Come on, this is for the US, we have some of the top institutions working on this, we have some of the best people, it makes no sense for us to not take this seriously,” he says. “There are economic reasons, and a matter of pride.”

At the moment, though, it’s China that looks like the pacesetter.

DefenseOne

 

« Iraqi Military Invent A Unique Robot To Fight ISIS
New Self-Driving Cars On The Market In 2019 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Skkynet Cloud Systems

Skkynet Cloud Systems

Skkynet is a leader in real-time data systems for the secure management and control of industrial processes (SCADA) and embedded devices (M2M).

Bugcrowd

Bugcrowd

As leaders in crowdsourced security testing, Bugcrowd connects companies and their applications to a crowd of tens of thousands of security researchers to identify critical software vulnerabilities.

Nozomi Networks

Nozomi Networks

Nozomi Networks is a leader in Industrial Control System (ICS) cybersecurity, with a comprehensive platform to deliver real-time cybersecurity and operational visibility.

Plurilock Security Solutions

Plurilock Security Solutions

Plurilock is a real-time cybersecurity solution that uses artificial intelligence to identify, prevent, and eliminate insider threats.

Fortra

Fortra

Fortra (formerly HelpSystems) is your cybersecurity ally, unified through the mission of providing solutions to organizations' seemingly unsolvable cybersecurity problems.

CyPhyCon

CyPhyCon

CyPhyCon is an annual event exploring threats and solutions to cyber attacks on cyber-physical systems such as industrial control systems, Internet of Things and Industrial Internet of Things.

Global Cyber Security Capacity Centre (GCSCC) - Oxford University

Global Cyber Security Capacity Centre (GCSCC) - Oxford University

GCSCC's work is focused on developing a framework for understanding what works, what doesn’t work and why – across all areas of cybersecurity capacity.

PA Consulting

PA Consulting

PA Consulting Group is a consultancy that specialises in strategy, technology and innovation. Our cyber security experts work with you to spot digital and technology security risks and reduce them.

Atlas VPN

Atlas VPN

Atlas VPN is a highly secure freemium VPN service with a goal to make safe and open internet accessible for everyone.

Kivera

Kivera

Kivera enforces your organisation governance and security policies across cloud deployments preventing misconfigurations turning into attack vectors.

Brunswick Group

Brunswick Group

Brunswick is a critical issues firm. We advise the world’s leading companies on how to navigate the critical issues they face and engage with their critical stakeholders.

Levio

Levio

Levio is a digital native business and technology consulting firm. As a true partner from start to finish, our goal is a long-lasting transformation that’s right for your business model.

ThreatDown

ThreatDown

ThreatDown, powered by Malwarebytes, is on a mission to overpower threats and empower IT by removing the complexity of detecting and stopping today’s most advanced threats.

Hartman Executive Advisors

Hartman Executive Advisors

Hartman Executive Advisors is an unbiased IT and cyber advisory firm uniquely designed to help mid-market executives maximize their IT investments.

OrbiSky Systems

OrbiSky Systems

OrbiSky Systems is a British tech startup specializing in data management and cybersecurity solutions.

Deimos

Deimos

Deimos is a technology, cloud, hybrid and multi-cloud focused, professional services company. Our expertise and focus is on cloud native Developer and Security Operations.