Chinese Satellite Sends Hack-Proof Messages

China has successfully sent "hack-proof" messages from a satellite to Earth for the first time. The Micius satellite beamed messages to two mountain-top receiving stations 645 km (400 miles) and 1,200 km away.

The message was protected by exploiting quantum physics, which says any attempt to eavesdrop on it would make detectable changes.Using satellites avoids some limitations that ground-based systems introduce into quantum communication.

Weak signals

Complicated optics on the Chinese satellite protect messages with entangled photons - sub-atomic particles of light manipulated so that some of their key properties are dependent on each other.

The curious laws of the quantum realm dictate that any attempt to measure these key properties irrevocably changes them. By encoding a key to encrypt data using entangled photons, it becomes possible to send messages confident that they have reached a recipient free of interference.

Ground-based encryption systems that use entangled photons have been available for years. However, the maximum distance over which messages can be sent securely is about 200km. This is because the fibre-optic cables through which they travel gradually weaken the signals.

Repeater stations can boost distances but that introduces weak points that attackers may target to scoop up messages.

By contrast, laser signals sent through the atmosphere or via satellites in space can travel much further before being weakened.

Data transmission rates possible with satellites are about 20 orders of magnitude more efficient that fibre-optic cables, Jianwei Pan, lead scientist on the Chinese project, told Reuters.

"That, for instance, can meet the demand of making an absolute safe phone call or transmitting a large amount of bank data," he said.

The Micius test was one of several experiments "bringing the concept of a global quantum internet closer to fruition", wrote Robert Bedington, Juan Miguel Arrazola and Alexander Ling in a review article in the journal Nature.

The reviewers said many "challenges" remained to be ironed out before the technology could be widely adopted.

The Micius satellite was launched in August 2015 and the first tests of its laser-based communications system were carried out in June this year.

The satellite is named after the ancient Chinese scientist and philosopher.China is also working to establish a large ground-based network that also uses quantum communication to protect messages.

BBC

You Might Also Read: 

China Puts Quantum Encryption Into Orbit:

Quantum Computing: The US Airforce Needs Help:

IBM breakthrough in Quantum Computing:

« Ukrainian Postal Service Hit By Cyber Attack
HBO Offers Hackers $250,000 'bug bounty' »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

SolarWinds

SolarWinds

SolarWinds as a worldwide leader in solutions for network and IT service management, application performance, and managed services.

Herjavec Group

Herjavec Group

Herjavec Group's Managed Security Services practice defends your organization from increasingly sophisticated, targeted cybercrime threats.

Forcepoint

Forcepoint

Forcepoint provide a unified, cloud-centric platform that safeguards users, networks and data while eliminating the inefficiencies of managing multiple point security products.

Cyber Security For Critical Manufacturing (ManuSec)

Cyber Security For Critical Manufacturing (ManuSec)

Cyber Security For Critical Manufacturing (Manusec) is a global series of summits focusing on Cyber Security for Critical Manufacturing Sectors.

J2 Software

J2 Software

J2 Software is a leading African Information Security and ICT business providing information security, governance, risk and compliance solutions.

Visual Guard

Visual Guard

Visual Guard is a modular solution covering most application security requirements, from application-level security systems to Corporate Identity and Access Management Solutions.

Cynexlink

Cynexlink

Cynexlink offers Managed IT Services with Security, Network, Storage & Cloud solutions for all size of business.

CryptoSec.info

CryptoSec.info

CryptoSec.info is a web resource focused on educating the beginners in the cryptocurrency space on how to properly secure their online assets from hackers and scammers.

Cyber Risk Aware

Cyber Risk Aware

Cyber Risk Aware provide a security awareness and phishing simulation platform that focuses on real threats and educates and empowers employees to be the first line of defence.

Depth Security

Depth Security

Depth Security assessment services provide organizations with real-world visibility into threats facing their infrastructure and applications.

Secure Technology Integration Group (STIGroup)

Secure Technology Integration Group (STIGroup)

Secure Technology Integration Group, Ltd. (STIGroup) is an innovative firm that provides CyberSecurity consulting, secure IT engineering, managed security services, and human capital solutions.

Research Institute in Verified Trustworthy Software Systems (VeTSS)

Research Institute in Verified Trustworthy Software Systems (VeTSS)

The main purpose of VeTSS is to support program analysis, testing and verification, to achieve guarantees of software correctness, safety, and security.

Hong Kong Broadband Network (HKBN)

Hong Kong Broadband Network (HKBN)

HKBN are a leading integrated telecom and technology solutions provider that offers a comprehensive range of premier ICT services to both the enterprise and residential markets.

Badge

Badge

Badge authenticates you on-demand for every application, on any device, without storing any secrets.

Efex

Efex

Efex is one of Australia’s leading Managed Technology Solutions providers. We service local companies across Australia, providing accessible, fast and straightforward IT.

Layer 8 Security

Layer 8 Security

Layer 8 Security is a cybersecurity advisory, consulting, and technical services firm that arms businesses with practical compliance, risk management, and security program strategies.