A Chinese team has just succeeded in the satellite transmission of a “secret” encryption key between two ground situations located roughly 700 miles apart.
So why, you may ask, is this big news?
It’s down to a concept physicists call quantum entanglement. Putting it to work, Chinese scientists seem to have established the first truly unbreakable link between a satellite and its terrestrial controllers. It raises the possibility of a theoretical “100%” secure global communications network, with China in the driving seat in its development.
Here’s a rundown of what it all means – and why cyber security enthusiasts should care.
Add a header to begin generating the table of contents
Background: quantum computing in a nutshell
- All computers rely on the ability to store and manipulate information.
- The computers we all use right now manipulate individual bits, which are basically binary switches: they can either be in the off position (0), or in the one position (1).
- Rather than bits, quantum computers manipulate data via qubits. As well as being on or off, qubits can also be in ‘superposition’, where they are both on and off at the same time, or else somewhere in the spectrum between the two states.
- If a standard computer is instructed to find a correct solution from multiple alternatives, it will generally explore each option in turn, until the right one is discovered. Quantum computers are able to consider every option at once.
- Even compared to today’s most powerful supercomputers, quantum computing opens up the possibility of much faster processing, massively enhanced problem-solving capabilities, including the ability to analyse uncertainty.
- Quantum computing may enable the rapid acceleration of artificial intelligence development. It could also allow developers to simulate complex and uncertain scenarios. Possible uses include gaining a better understanding of disease pathology and predicting the behaviour of people and markets.
- So far, the theories surrounding quantum computers have advanced farther than the actual hardware. Companies (e.g. Google and IBM) as well as nation states are all involved in what has been dubbed the quantum arms race: the competition to build the first usable, stable quantum computer.
Quantum computing and the threat to encryption
- The idea behind encryption is simple enough: data is encrypted (i.e. scrambled), and can only be turned back into a readable form if you have access to the right encryption key.
- In theory, any encryption key can be hacked. However, in reality, so long as you have a fit-for-purpose encryption system in place that uses a suitably strong algorithm, cracking the code with even an ultra-powerful standard computer is a practical impossibility.
- Quantum computing could be a gamechanger. Cracking an encryption code involves breaking down a vast number of problems. A standard computer has to solve these problems one at a time. By contrast, quantum computing enables thousands of problems to be solved simultaneously. Theoretically, an encryption key that would take many months to crack on a standard computer could be hackable in hours with a quantum computer.
The solution: quantum key distribution
Quantum computing poses a threat to encryption. That said, quantum physics may offer an answer…
- Quantum key distribution (QKD) is based on a particle physics principle known as quantum entanglement. Under this principle, where you have a pair of twinned light particles (photons), the properties of those two photons remain identical to each other, no matter how far apart those particles are.
- So if you use one of those entangled particles to create an encryption key, only the person with the other particle can decode them.
- Any attempt to interfere with or intercept the quantum key will prevent that key from working.
- So how do you distribute your quantum key from A to B? It’s possible to do it via fiber optic cable. However, optical fibers are susceptible to interference. Also, transmission over ultralong distance relies on intermediate repeaters to boost the signal. In fact, so far, the longest recorded distance for successfully distributing a quantum key via a cable is just 62 miles.
- Chinese quantum physicist, Pan Jianwei has been working on the distribution of quantum keys via satellite. To this end, China has also built Micius, a satellite designed specifically for quantum communications research.
The latest development
In 2017, Micius was used to set up a quantum key link between ground stations in Vienna and Beijing. However, in that case, Micius had to actually generate and distribute the encryption keys.
This year, Micius was used to send a secret key between two ground stations at Delingha and Urumqi, separated by around 700 miles. The satellite merely acted as a blind transmitter, with no information about the key.
The efficiency of the transmission was increased by fourfold compared to previous experiments. What’s more, the error rate in transmission was such that any attempt to eavesdrop on the message would be isolated from general noise and flagged up.
What it means
It’s important to remember that we’re still a long way from existing encryption methods being rendered redundant.
That said, the research shows that it is technically feasible to distribute a quantum key between two stations via satellite, and without that satellite having any information about the key. In other words, it’s a theoretical “100%” point-to-point secure transmission with the possibility of successful interception ruled out.
Ultimately, this method of key transmission could even be the basis of an ‘unhackable internet’.
This is major information I have been working on using signals from the satellite to satellite to ground to attack unfriendly military aircraft. I hope cyber command understands the importance of this research
If it was made by a human, it can be cracked by a human.
Current encryption can not be broken. Encryption tends not to be broken but circumvented or bypassed. This may still be possible.
Yes Travis, but not in the way we think today.
I have also been working on a quantum internet connection. I expect to publish something soon.
Please share here when finished.
Use a stealth bomber to drop emp bombs on them in the shape of Winnie the Poo…
“I know not with what weapons World War III will be fought, but World War IV will be fought with sticks and stones.”
Those are the words of decent and sane human beings.
Sadly there is a very tiny group of Degenerate individuals who think that they will win it. Even if that means going back to the stone age.
I understand humor, :-). Quantum computing is not only a new way to distribute bits, it is also a new way of distributing thoughts, ie a new age for human kind. Entanglement and superposition is only the beginning. We, Western Civilization, have a good track record of development, we should lead this new era. I just hope society realizes the purpose of WWII, to keep man/womankind free and not waste this new hidden social technology for greedy purpose$.
Very interesting articles. We should all be aware of the new totally hack-proof comms.
On, off, xon, xoff
Yet the construct of the Universe is binary yet the emanations of Elohim are infinite.
From physics to metaphysics
From chemistry to alchemy
From astronomy to astrology
The first Cryptography based document has been deciphered but by a few.
Love you courses. Not the subject but the style of the facilitator!
OK, what’s a qubit again ? Fascinating though.
Quantum computing is promising in number of areas, like medical research, artificial intelligence, etc. But it could poses a threat to cybersecurity, requiring a change in how we encrypt our data.
Just found some interesting information regarding post quantum cryptography recently 🙂
Thank you. Yes its good stuff.
Article implies a unhackable internet. Does not sound like China to me. Be an unhackable Chinese intranet, we won’t get to use it.
And seems like NIST is currently working with a lot of researchers to develop a post-quantum encryption algorithm. They have a few candidates for that.
In the meantime, seems like AES-256 Rindajel is safe against quantum computer attacks.
We need to make conventional computing secure, quantum computers will not replace the classical computing. Hybridization will happen in the research areas when required, but they will not replace classical computing.
Symmetric algorithms used for encryption, like AES, are still thought to be safe (with sufficient key length – e.g. AES-256 or larger); however, current asymmetric algorithms like RSA and ECDSA will be rendered essentially useless once quantum computers reach a certain scale.
This will break nearly every practical application of cryptography in use today, making e-commerce and many other digital applications that we rely on in our daily lives totally insecure.
Seems like NIST is working hard to create a strong post quantum cryptographic algorithm.
Classical computers will not be replaced by quantum computers but hybridization will happen.
Sorry, thought my first comment was not sent.
What is quantum computing??
Could some body tell it from zero
Just amazing knowledge about Quantum encryption. I read some articles from the weekly security email. I’m no security expert but these courses from station X make me hungry for more knowledge !
It was a great information to read. Thank you sir. Love from India
now if i could only figure out how to get Qubes to boot from this damn usb stick… 🙁
Do you think quantum computers will replace the classical ones? Or they’ll be used as an extra piece of hardware to help classical computers to resolve other complicated problem such as a GPU helps processing graphics? Can you share me an article that represents your opinion on this matter?