China’s Quantum Satellite Changes Cryptography

QUESS Chief Scientist Pan Jianwei from the University of Science and Technology of China.

In the age of relentless cyberattacks and global electronic surveillance, nations and citizens are looking for any means to secure their communications. China is poised to launch a project that may provide the path to an uncrackable communications system, by turning messages quantum and taking them into space.

The new Quantum Space Satellite (QUESS) program is no mere science experiment. China is already becoming a world leader in quantum communications technology; a satellite that delivers quantum communications will be a cornerstone for translating cutting-edge research into a strategic asset for Chinese power worldwide.

Cryptography operates through the use of an encryption key (such as a numbers pad), which, when applied to an encryption algorithm, can be used to decrypt or encrypt a message. Quantum entanglement is the act of fusing two or more particles into complementary “quantum states.” In such states, no particle can be independently described, instead the particles exist in a hazy shared quantum state that “collapses” when observed.

Quantum encryption thus takes advantage of this feature, using it to detect would-be eavesdroppers, whose presence causes quantum states to collapse and reveal their spying to legitimate parties. Additionally, the complexity of quantum mechanics makes it virtually impossible to reverse engineer the quantum key generated through quantum entanglement.

Quantum keys are thus theoretically impossible to crack by even quantum computing -- a theoretical form of supercomputing that promises to defeat traditional forms of encryption. (It is important to note, however, that all is not perfectly secure. Quantum secured communications, like other forms of encryption, are vulnerable to denial of service, physically tampering of the quantum communications device, human failures in operational security and impersonation of sender).

Quantum keys are theoretically impossible to crack.

The Quantum Space Satellite, aka Quantum Experiments at Space Scale (QUESS), will seek to turn this theory into reality. It will be launched in July 2016. Chief scientist Pan Jianwei remarks that QUESS will complete China's growing quantum communications network, which includes a 2,000-kilometer-long network between Beijing and Shanghai.

QUESS's function is to test the phenomena of quantum entanglement. Operated by the China Academy of Sciences, this 500kg satellite contains a quantum key communicator, quantum entanglement emitter, entanglement source, processing unit, and a laser communicator. QUESS will relay transmissions between two ground stations (one in China, and the other in Europe) transmitting quantum keys.

Pan remarked that the distances involved (the QUESS orbits at an altitude of 1,000km) is ideal for testing quantum teleportation of photons. Additionally, the Austrian Academy of Sciences will provide the optical receivers for the European ground stations.

In addition to its own efforts, Chinese scientists are teaming up with their European counterparts on other quantum technologies such as photon teleportation, transmission error reduction and random number generators. If QUESS is successful, China will build an Asian-European quantum key distribution network by 2020, to be followed by a global quantum communications network in 2030.

QUESS is one of the National Space Science Center's "Strategic Priority Programs," which include scientific projects that look at black holes, dark matter, and cosmic background radiation. The program marks a significant shift in Chinese space programs, which have largely focused on human and robotic space exploration rather than space science. But there is no doubt of its security intent. Pan noted that the unbreakable security of quantum cryptography would be vital to any Chinese regional warfighting capabilities.

QUESS fits into a broader series of experimental quantum encryption programs which may be intended to address concerns over China's information security, particularly in the post Snowden era. Government, military, and financial networks are juicy targets for espionage, and quantum encryption promises to provide a level of potentially unbreakable encryption for these systems, as well as a sure-fire method to detect any attempts at intrusion.

Popsci: 

« Is The Cybersecurity Market Facing A Downturn?
Fighting The Invisible War In CyberSpace »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Security Mentor

Security Mentor

Security Mentor provides innovative, online security awareness training designed for how people learn and work.

Ericsson

Ericsson

Ericsson is a leading provider of telecommunications services and network infrastructure solutions including all aspects of network security.

National Cybersecurity and Communications Integration Center (NCCIC) - USA

National Cybersecurity and Communications Integration Center (NCCIC) - USA

NCCIC is a cyber situational awareness, incident response, and management center for the US Government, intelligence community, and law enforcement.

techUK

techUK

techUK represents companies operating in the tech sector in the UK. Focus areas cover all aspects of ICT including cyber security.

Suprema

Suprema

Suprema is a leading global provider of access control and biometrics solutions.

achelos

achelos

achelos is an independent software development company providing innovative technical solutions for micro-processor chips / security chips and embedded systems in security-critical application fields.

Secudos

Secudos

SECUDOS is an innovative appliance technology and services provider focused on IT security and compliance.

Northcross Group (NCG)

Northcross Group (NCG)

NCG provides services to help organizations meet the challenges of regulatory compliance. Our services include support, consultation, tools and accelerators for all parts of an organization.

Phy-Cy.X Security Group

Phy-Cy.X Security Group

Phy-Cy.X specialize in the “Physics” of Information Security through both physical and cyber domains. We are not an IT company, we ARE an Information Security company.

EYE Security

EYE Security

EYE provides enterprise-grade cyber security services and cyber insurance to SMEs in Europe, Cyber Incident Response and strategic advice in board rooms.

Swissbit

Swissbit

Swissbit AG is the leading European manufacturer of storage, security and embedded IoT solutions for demanding applications.

Route1

Route1

Route1 is an advanced provider of secure data intelligence solutions to drive your business forward.

Nine23

Nine23

Nine23 are a highly focused cyber security solutions company that defines, builds and manages innovative services, enabling end-users to use technology securely in today’s workplace.

ClosingLock

ClosingLock

ClosingLock is the leading provider of wire fraud prevention software for the real estate industry.

Hartman Executive Advisors

Hartman Executive Advisors

Hartman Executive Advisors is an unbiased IT and cyber advisory firm uniquely designed to help mid-market executives maximize their IT investments.

Badge

Badge

Badge authenticates you on-demand for every application, on any device, without storing any secrets.