China Puts Quantum Encryption Into Orbit

China has launched the world’s first quantum satellite. So what exactly does this mean?

“The satellite is designed to establish ultra-secure quantum communications by transmitting uncrackable keys from space to the ground,” Xinhua, China’s state news agency, wrote after the equipment was launched on a rocket from the Gobi desert. “It could also conduct experiments on the bizarre features of quantum theories, such as entanglement.”

Uncrackable keys? Bizarre features? Both true. This satellite is designed to literally teleport information, to distances 1,200 kilometers (746 miles) away.

Quantum theory: the basics

Here’s a quick refresher in case you haven’t thought about physics in a few years, because this story is cooler when you understand these basics. Skip ahead if you’re already a quantum geek.

Most human technology is built around the classical physics that Isaac Newton and his inheritors came up with (equal and opposite reactions, that sort of thing). When engineers hit on electricity, Michalakis says, they perceived it in aggregate as a kind of a force; it’s either on, or it’s off. This understanding led to electric switches, which became transistors, and when you put all those transistors in a box and start turning them off and on with instructions encoded “11010001101”… it’s a computer.

But as scientists were developing electric computers in the 20th century, theorists beginning with Max Planck were ripping up the rule books. Their experiments with light suggested that something about classical physics didn’t quite add up. Soon they developed mathematical proofs to explain that the tiny particles that make up matter—protons, neutrons, and electrons—don’t necessarily behave like you would expect particles to behave. They can act as if they are in two places at once, for instance. (That’s one of those “bizarre features” the Chinese are talking about.) This is quantum theory. The first and most famous application of these ideas came in nuclear weaponry and energy.

Physicists are still trying to agree on how classical and quantum physics come together coherently. But quantum theory already underlies a lot of modern technology; the transistors on a silicon chip, in fact, wouldn’t work without it. Now engineers are trying to apply it to more futuristic things.

Spooky action at a distance

Let’s say that you take a very small particle, and set it up so that it could be in either one of two states. Let’s call one state “up,” and the other one “down.” (Quantum computers do something like this, using single atoms trapped in a magnetic field to represent either a “0” or a “1”.)

If you do this, quantum theory says that two things will happen. The first is that, although the particle will always be either “up” or “down” if you look at it, when you’re not looking, it will be in a kind of combination of the two, called a superposition. In quantum mechanics, the act of measuring something changes it; the superposition “collapses,” in the parlance, to either up or down.

The second thing is that two or more of these particles can be put in a situation of “quantum entanglement,” where they form a single superposition together. Then their physical properties are correlated. For instance, you can set them up in advance so that if you look at one particle and find it’s up, then you know, without looking, that the other must be down, and vice versa.

Here’s where it gets really interesting. Let’s say you entangle two particles. Then you move one of them far, far away, to the other side of the planet, or to the moon. No matter the distance, quantum mechanics says, they remain entangled. If you look at the first one, and in doing so change it, collapsing the superposition, you will also change the other one. And this will happen instantaneously, however far apart they are.

Let that sink in, because this technique, called “quantum teleportation,” is crazy to think about. Light has a speed limit, and normally information cannot travel faster than light. Quantum teleportation is, in a sense, information traveling outside of space and time. Einstein called it “spooky action at a distance.”

Tangled up in space

Scientists have done experiments with quantum teleportation already. They have instantaneously exchanged information about the quantum states of photons, which are particles of light, transmitted 143 km between two of the Canary Islands.

But testing quantum teleportation at extremely long distances requires going to space. It’s the easiest way to set up laser communication between two distant points on the earth’s surface. That’s what the Chinese satellite, developed in cooperation with the Austrian Academy of Science, intends to do.

The satellite contains a machine that generates entangled pairs of photons by shooting a laser beam through a specially designed crystal. Each entangled pair will be split up and beamed down to stations on Earth approximately 1,200 km apart. If all goes as planned, researchers at those stations will share access to an entangled system. Any measurement on one of those photons will be instantaneously reflected in its opposite number at the other station.

A US company had partnered with researchers in Denmark and Singapore to launch a small satellite, or cubesat, with similar goals, but it was destroyed when the rocket taking it to the International Space Station exploded in 2014.

The key is the key

Besides demonstrating a super-long entanglement, the scientists working with the satellite want to test new communications technology. It’s important to realize that we can’t send information like “Hey, how are you?” through quantum teleportation, much less teleport actual things. But smart thinkers realized that being able to share basic information about the state of atomic particles across distance could create a powerful encryption tool.

This is where the unbreakable code comes in. Perhaps the most powerful method of encryption is the “one-time pad,” where messages are encoded using a private key known to both parties; theoretically, if the key is random, is as long as the message, is never reused, and is kept completely secret, it cannot be broken. Which sounds really good, code-wise, but it has long been impractical to ensure that two parties can always access a key that meets those standards.

Quantum entanglement could help. If people on two ground stations share access to a large enough set of entangled photons, beamed to them from a satellite in space, they can generate a sufficiently long, random key by teleporting quantum information between the entangled particles.

Nobody would be able to detect the transmission of the key. “It’s very secure from the point of view that if your eavesdropper wants to listen in, usually they are within space and time,” Michalakis says. “The data is not transmitted through space-time, it goes underneath in mathematical subspace.”

Once the people in the two stations have created a key, using their entangled particles, they can use it to encrypt a message. This can be sent by whatever method they want. “You can use a telephone the moment you are sharing a key that nobody has access to,” Michalakis says.

But what if someone managed to intercept the laser beam from the satellite that had originally shared the entangled photons between the two stations? Here’s what is truly amazing: Thanks to the laws of quantum mechanics, any attempt by a third party to measure the particles in the entangled system would be immediately detected by the other two, making them aware that their code could be broken.

Quantum supremacy

The field of quantum information is still in its infancy. As we continue to learn the fundamentals of how quantum phenomena work at a large scale, the data collected will help physicists understand “the process that takes you from the quantum richness of the universe to the classical world we see around us,” Michalakis says.

It may be easy to see in this shades of the Cold War race for technological dominance, but Michalakis is confident that research will be shared within the scientific community. His hope is that this experiment is the first step toward a global network of research facilities sharing access to entangled particles beamed down from space, a kind of global, cloud-based quantum computer.

Michalakis, for obvious reasons, is particularly excited about an announcement last week that the US needs a plan to invest in quantum technologies in a serious way; while US labs have done groundbreaking work in the field, there hasn’t been public funding on the scale available in Europe and Asia.

“Come on, this is for the US, we have some of the top institutions working on this, we have some of the best people, it makes no sense for us to not take this seriously,” he says. “There are economic reasons, and a matter of pride.”

At the moment, though, it’s China that looks like the pacesetter.

DefenseOne

 

« Iraqi Military Invent A Unique Robot To Fight ISIS
New Self-Driving Cars On The Market In 2019 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

4ARMED

4ARMED

4ARMED specializes in penetration testing, information security consultancy and security training

CGI Group

CGI Group

CGI is a leading IT and business process services provider. Services include IT consulting, Systems Integration, Application Development, Infrastructure, Business Processes, Digital IP.

Leibniz-Rechenzentrum (LRZ)

Leibniz-Rechenzentrum (LRZ)

The LRZ supports ground-breaking research and teaching in a wide range of scientific disciplines including information security and data protection.

Maritime Cybersecurity Center (MCC)

Maritime Cybersecurity Center (MCC)

Maritime Cybersecurity Center is a not-for-profit organization focused on regional cybersecurity excellence and readiness, with a special emphasis on the maritime community.

Cyberlitica

Cyberlitica

Cyberlitica (formerly iPhish) provides a Workforce Threat Intelligence application that significantly augments companies’ cyber threat prevention efforts.

The Cyber Security Expert

The Cyber Security Expert

The Cyber Security Expert delivers cyber security consultancy, website and cloud security monitoring services, and specialist training services.

Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

The Computer Crime and Intellectual Property Section (CCIPS) is responsible for implementing the Department's national strategies in combating computer and intellectual property crimes worldwide.

CyberCube

CyberCube

CyberCube provide world-leading cyber risk analytics for the cyber insurance market.

iTechArt Group

iTechArt Group

iTechArt is a top-tier custom software development company offering Cybersecurity Consulting, Application Security Testing, Risk Management and Compliance, and Infrastructure Security services.

EVOKE

EVOKE

EVOKE is an award-winning Digital Transformation company that partners with its clients to build digital workplace solutions for organizational challenges.

Citadel Cyber Security

Citadel Cyber Security

Citadel is a leading 'One Stop Shop' provider of consulting services in cyber and information security. Our experts operate in hundreds of business organizations in Israel and around the world.

MainNerve

MainNerve

MainNerve helps secure networks, applications, people, and facilities… enabling businesses to reduce risk and increase their cybersecurity posture.

Resilience Cyber insurance

Resilience Cyber insurance

Resilience helps to improve cyber resilience by connecting cyber insurance coverage with advanced cybersecurity visibility and a shared plan to reinforce great cyber hygiene.

Infoline Tec Group Berhad

Infoline Tec Group Berhad

Infoline Tec Group Berhad is principally involved in providing IT infrastructure solutions, cybersecurity service provider and solutions, managed IT and other IT services.

Fairly AI

Fairly AI

Fairly AI is on a mission to democratize safe, secure, and compliant AI across the enterprise.

SecureAck

SecureAck

From our A-Op SaaS automation platform to Managed Automation-as-a-Service (MAaaS), SecureAck offer powerful security automation the way that best suits your organisation's needs.