China Puts Quantum Encryption Into Orbit

China has launched the world’s first quantum satellite. So what exactly does this mean?

“The satellite is designed to establish ultra-secure quantum communications by transmitting uncrackable keys from space to the ground,” Xinhua, China’s state news agency, wrote after the equipment was launched on a rocket from the Gobi desert. “It could also conduct experiments on the bizarre features of quantum theories, such as entanglement.”

Uncrackable keys? Bizarre features? Both true. This satellite is designed to literally teleport information, to distances 1,200 kilometers (746 miles) away.

Quantum theory: the basics

Here’s a quick refresher in case you haven’t thought about physics in a few years, because this story is cooler when you understand these basics. Skip ahead if you’re already a quantum geek.

Most human technology is built around the classical physics that Isaac Newton and his inheritors came up with (equal and opposite reactions, that sort of thing). When engineers hit on electricity, Michalakis says, they perceived it in aggregate as a kind of a force; it’s either on, or it’s off. This understanding led to electric switches, which became transistors, and when you put all those transistors in a box and start turning them off and on with instructions encoded “11010001101”… it’s a computer.

But as scientists were developing electric computers in the 20th century, theorists beginning with Max Planck were ripping up the rule books. Their experiments with light suggested that something about classical physics didn’t quite add up. Soon they developed mathematical proofs to explain that the tiny particles that make up matter—protons, neutrons, and electrons—don’t necessarily behave like you would expect particles to behave. They can act as if they are in two places at once, for instance. (That’s one of those “bizarre features” the Chinese are talking about.) This is quantum theory. The first and most famous application of these ideas came in nuclear weaponry and energy.

Physicists are still trying to agree on how classical and quantum physics come together coherently. But quantum theory already underlies a lot of modern technology; the transistors on a silicon chip, in fact, wouldn’t work without it. Now engineers are trying to apply it to more futuristic things.

Spooky action at a distance

Let’s say that you take a very small particle, and set it up so that it could be in either one of two states. Let’s call one state “up,” and the other one “down.” (Quantum computers do something like this, using single atoms trapped in a magnetic field to represent either a “0” or a “1”.)

If you do this, quantum theory says that two things will happen. The first is that, although the particle will always be either “up” or “down” if you look at it, when you’re not looking, it will be in a kind of combination of the two, called a superposition. In quantum mechanics, the act of measuring something changes it; the superposition “collapses,” in the parlance, to either up or down.

The second thing is that two or more of these particles can be put in a situation of “quantum entanglement,” where they form a single superposition together. Then their physical properties are correlated. For instance, you can set them up in advance so that if you look at one particle and find it’s up, then you know, without looking, that the other must be down, and vice versa.

Here’s where it gets really interesting. Let’s say you entangle two particles. Then you move one of them far, far away, to the other side of the planet, or to the moon. No matter the distance, quantum mechanics says, they remain entangled. If you look at the first one, and in doing so change it, collapsing the superposition, you will also change the other one. And this will happen instantaneously, however far apart they are.

Let that sink in, because this technique, called “quantum teleportation,” is crazy to think about. Light has a speed limit, and normally information cannot travel faster than light. Quantum teleportation is, in a sense, information traveling outside of space and time. Einstein called it “spooky action at a distance.”

Tangled up in space

Scientists have done experiments with quantum teleportation already. They have instantaneously exchanged information about the quantum states of photons, which are particles of light, transmitted 143 km between two of the Canary Islands.

But testing quantum teleportation at extremely long distances requires going to space. It’s the easiest way to set up laser communication between two distant points on the earth’s surface. That’s what the Chinese satellite, developed in cooperation with the Austrian Academy of Science, intends to do.

The satellite contains a machine that generates entangled pairs of photons by shooting a laser beam through a specially designed crystal. Each entangled pair will be split up and beamed down to stations on Earth approximately 1,200 km apart. If all goes as planned, researchers at those stations will share access to an entangled system. Any measurement on one of those photons will be instantaneously reflected in its opposite number at the other station.

A US company had partnered with researchers in Denmark and Singapore to launch a small satellite, or cubesat, with similar goals, but it was destroyed when the rocket taking it to the International Space Station exploded in 2014.

The key is the key

Besides demonstrating a super-long entanglement, the scientists working with the satellite want to test new communications technology. It’s important to realize that we can’t send information like “Hey, how are you?” through quantum teleportation, much less teleport actual things. But smart thinkers realized that being able to share basic information about the state of atomic particles across distance could create a powerful encryption tool.

This is where the unbreakable code comes in. Perhaps the most powerful method of encryption is the “one-time pad,” where messages are encoded using a private key known to both parties; theoretically, if the key is random, is as long as the message, is never reused, and is kept completely secret, it cannot be broken. Which sounds really good, code-wise, but it has long been impractical to ensure that two parties can always access a key that meets those standards.

Quantum entanglement could help. If people on two ground stations share access to a large enough set of entangled photons, beamed to them from a satellite in space, they can generate a sufficiently long, random key by teleporting quantum information between the entangled particles.

Nobody would be able to detect the transmission of the key. “It’s very secure from the point of view that if your eavesdropper wants to listen in, usually they are within space and time,” Michalakis says. “The data is not transmitted through space-time, it goes underneath in mathematical subspace.”

Once the people in the two stations have created a key, using their entangled particles, they can use it to encrypt a message. This can be sent by whatever method they want. “You can use a telephone the moment you are sharing a key that nobody has access to,” Michalakis says.

But what if someone managed to intercept the laser beam from the satellite that had originally shared the entangled photons between the two stations? Here’s what is truly amazing: Thanks to the laws of quantum mechanics, any attempt by a third party to measure the particles in the entangled system would be immediately detected by the other two, making them aware that their code could be broken.

Quantum supremacy

The field of quantum information is still in its infancy. As we continue to learn the fundamentals of how quantum phenomena work at a large scale, the data collected will help physicists understand “the process that takes you from the quantum richness of the universe to the classical world we see around us,” Michalakis says.

It may be easy to see in this shades of the Cold War race for technological dominance, but Michalakis is confident that research will be shared within the scientific community. His hope is that this experiment is the first step toward a global network of research facilities sharing access to entangled particles beamed down from space, a kind of global, cloud-based quantum computer.

Michalakis, for obvious reasons, is particularly excited about an announcement last week that the US needs a plan to invest in quantum technologies in a serious way; while US labs have done groundbreaking work in the field, there hasn’t been public funding on the scale available in Europe and Asia.

“Come on, this is for the US, we have some of the top institutions working on this, we have some of the best people, it makes no sense for us to not take this seriously,” he says. “There are economic reasons, and a matter of pride.”

At the moment, though, it’s China that looks like the pacesetter.

DefenseOne

 

« Iraqi Military Invent A Unique Robot To Fight ISIS
New Self-Driving Cars On The Market In 2019 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Verve Industrial

Verve Industrial

Verve specialize in providing software and services to help protect and secure critical industrial control systems.

Trapezoid

Trapezoid

Trapezoid is a cybersecurity company developing Firmware Integrity Management solutions designed to detect unauthorized changes to firmware & BIOS across the entire data center infrastructure.

CyberSec.sk

CyberSec.sk

CyberSec.sk is the Slovak portal bringing the latest cyber security news, politics, tips and instructions on how to protect the internet.

Hacker House

Hacker House

Hacker House teaches you what hackers can learn about your business and systems so that preventative solutions to protect your assets can be applied through active measures.

Yelbridges

Yelbridges

Yelbridges is your reliable partner in all fields of IT-Security, from developing of Security Policies and Guidelines to the design and implementation of secure processes.

DANAK

DANAK

DANAK is the national accreditation body for Denmark. The directory of members provides details of organisations offering certification services for ISO 27001.

Netsecurity AS

Netsecurity AS

Netsecurity is a Norwegian owned company focused and specialised within IT security and cybersecurity-as-a service.

The Cyber AB

The Cyber AB

The Cyber AB is the official accreditation body of the Cybersecurity Maturity Model Certification (CMMC) Ecosystem.

OSI Security

OSI Security

OSI Security's primary services include penetration testing, security auditing, web application security testing and risk management.

CloudCover

CloudCover

CloudCover is a software-defined cybersecurity risk solution that provides risk awareness, risk analytics, and data security in real time.

Transparity Cyber

Transparity Cyber

Transparity Cyber is dedicated to cybersecurity. As part of the Transparity Group we’re an established name in the Microsoft Cloud landscape, with a focus on cybersecurity excellence.

Moro Hub

Moro Hub

Moro Hub, a subsidiary of Digital DEWA, is a UAE-based digital data hub focused on digital transformation and operational services.

AVANT Communications

AVANT Communications

AVANT is a premier distributor of next generation technologies with the resources and relationships needed to successfully navigate the ever-changing world of communications and IT infrastructure.

HIFENCE

HIFENCE

HIFENCE delivers cybersecurity and networking services that make your company safer and more secure. That’s all we do, so you can concentrate on all the things that you do best.

Disecto Technologies

Disecto Technologies

At Disecto, we provide SaaS based Data Discovery, Classification and a remediation solution for data privacy compliance.

Computer Futures

Computer Futures

Computer Futures are a global specialist IT recruitment partner, matching candidates with roles across niche IT markets and core technologies.