Chinese Satellite Sends Hack-Proof Messages

China has successfully sent "hack-proof" messages from a satellite to Earth for the first time. The Micius satellite beamed messages to two mountain-top receiving stations 645 km (400 miles) and 1,200 km away.

The message was protected by exploiting quantum physics, which says any attempt to eavesdrop on it would make detectable changes.Using satellites avoids some limitations that ground-based systems introduce into quantum communication.

Weak signals

Complicated optics on the Chinese satellite protect messages with entangled photons - sub-atomic particles of light manipulated so that some of their key properties are dependent on each other.

The curious laws of the quantum realm dictate that any attempt to measure these key properties irrevocably changes them. By encoding a key to encrypt data using entangled photons, it becomes possible to send messages confident that they have reached a recipient free of interference.

Ground-based encryption systems that use entangled photons have been available for years. However, the maximum distance over which messages can be sent securely is about 200km. This is because the fibre-optic cables through which they travel gradually weaken the signals.

Repeater stations can boost distances but that introduces weak points that attackers may target to scoop up messages.

By contrast, laser signals sent through the atmosphere or via satellites in space can travel much further before being weakened.

Data transmission rates possible with satellites are about 20 orders of magnitude more efficient that fibre-optic cables, Jianwei Pan, lead scientist on the Chinese project, told Reuters.

"That, for instance, can meet the demand of making an absolute safe phone call or transmitting a large amount of bank data," he said.

The Micius test was one of several experiments "bringing the concept of a global quantum internet closer to fruition", wrote Robert Bedington, Juan Miguel Arrazola and Alexander Ling in a review article in the journal Nature.

The reviewers said many "challenges" remained to be ironed out before the technology could be widely adopted.

The Micius satellite was launched in August 2015 and the first tests of its laser-based communications system were carried out in June this year.

The satellite is named after the ancient Chinese scientist and philosopher.China is also working to establish a large ground-based network that also uses quantum communication to protect messages.

BBC

You Might Also Read: 

China Puts Quantum Encryption Into Orbit:

Quantum Computing: The US Airforce Needs Help:

IBM breakthrough in Quantum Computing:

« Ukrainian Postal Service Hit By Cyber Attack
HBO Offers Hackers $250,000 'bug bounty' »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CalCom

CalCom

CalCom Hardening Solution (CHS) for Microsoft OMS is a security baseline-hardening solution designed to address the needs of IT operations and security teams.

Ntrepid

Ntrepid

Ntrepid products provide protection from web threats and enable organizations to safely conduct their online activities.

Careers in Cyber Security (CiCS)

Careers in Cyber Security (CiCS)

CareersinCyberSecurity is a leading global job board and career resource for Cyber Security, IT Audit, Technology Risk and Data Protection professionals.

ThreatSTOP

ThreatSTOP

ThreatSTOP is a cloud-based automated threat intelligence platform that converts the latest threat data into enforcement policies to stop attacks before they become breaches.

DarkOwl

DarkOwl

DarkOwl provides the world’s largest index of darknet content and the tools to efficiently find leaked or otherwise compromised sensitive data.

Nokia

Nokia

Nokia is a proven leader in fixed, mobile and IoT security offering capabilities that range from systems design to integration and support.

Spin Technology

Spin Technology

SpinOne is a SaaS data protection platform designed to monitor, secure, and back up your G Suite and O365 data, improve compliance, and reduce IT costs.

Gotham Digital Science (GDS)

Gotham Digital Science (GDS)

Gotham Digital Science is an international security services company specializing in Application and Network Infrastructure security, and Information Security Risk Management.

Resolvo Systems

Resolvo Systems

Resolvo is provides comprehensive security assessment and testing services in Asia.

Oligo Security

Oligo Security

Oligo aims to streamline the usage of open source by making it secure and easy to protect. Through focusing developers on the relevant vulnerabilities we make the fixing process significantly shorter.

Sababa Security

Sababa Security

Sababa Security is the first Italian innovation cyber security vendor, that provides security products, training, and managed services to protect diverse IT and OT environments.

SequelNet

SequelNet

SequelNet is an emerging MSP, providing 360° business IT solutions and consulting services.

Xeol

Xeol

Software free of vulnerabilities, built and distributed by trusted entities. Our mission is to help customers secure their software from code to deploy.

Backblaze

Backblaze

The Backblaze Storage Cloud provides a foundation for businesses, developers, IT professionals, and individuals to build applications, host content, manage media, back up and archive data, and more.

SENTRIQS

SENTRIQS

SENTRIQS advanced encryption technology is engineered to defend against the most sophisticated cyber threats, keeping your operations efficient and secure.

Concertium

Concertium

Concertium is a complete cybersecurity partner equipped with the expertise and services to deliver end-to-end visibility and protection from evolving cyber threats.