China’s quantum satellite

China gets closer to totally hack-proof comms

A Chinese team has just succeeded in the satellite transmission of a “secret” encryption key between two ground situations located roughly 700 miles apart.

So why, you may ask, is this big news?

It’s down to a concept physicists call quantum entanglement. Putting it to work, Chinese scientists seem to have established the first truly unbreakable link between a satellite and its terrestrial controllers. It raises the possibility of a ​theoretical “100%” secure global communications network, with China in the driving seat in its development.

Here’s a rundown of what it all means – and why cyber security enthusiasts should care.

Table Of Contents

Add a header to begin generating the table of contents

Background: quantum computing in a nutshell

  • All computers rely on the ability to store and manipulate information.
  • The computers we all use right now manipulate individual bits, which are basically binary switches: they can either be in the off position (0), or in the one position (1).
  • Rather than bits, quantum computers manipulate data via qubits. As well as being on or off, qubits can also be in ‘superposition’, where they are both on and off at the same time, or else somewhere in the spectrum between the two states.
  • If a standard computer is instructed to find a correct solution from multiple alternatives, it will generally explore each option in turn, until the right one is discovered. Quantum computers are able to consider every option at once.
  • Even compared to today’s most powerful supercomputers, quantum computing opens up the possibility of much faster processing, massively enhanced problem-solving capabilities, including the ability to analyse uncertainty.
  • Quantum computing may enable the rapid acceleration of artificial intelligence development. It could also allow developers to simulate complex and uncertain scenarios. Possible uses include gaining a better understanding of disease pathology and predicting the behaviour of people and markets.
  • So far, the theories surrounding quantum computers have advanced farther than the actual hardware. Companies (e.g. Google and IBM) as well as nation states are all involved in what has been dubbed the quantum arms race: the competition to build the first usable, stable quantum computer.

Quantum computing and the threat to encryption

  • The idea behind encryption is simple enough: data is encrypted (i.e. scrambled), and can only be turned back into a readable form if you have access to the right encryption key.
  • In theory, any encryption key can be hacked. However, in reality, so long as you have a fit-for-purpose encryption system in place that uses a suitably strong algorithm, cracking the code with even an ultra-powerful standard computer is a practical impossibility.
  • Quantum computing could be a gamechanger. Cracking an encryption code involves breaking down a vast number of problems. A standard computer has to solve these problems one at a time. By contrast, quantum computing enables thousands of problems to be solved simultaneously. Theoretically, an encryption key that would take many months to crack on a standard computer could be hackable in hours with a quantum computer.

The solution: quantum key distribution

Quantum computing poses a threat to encryption. That said, quantum physics may offer an answer…

  • Quantum key distribution (QKD) is based on a particle physics principle known as quantum entanglement. Under this principle, where you have a pair of twinned light particles (photons), the properties of those two photons remain identical to each other, no matter how far apart those particles are.
  • So if you use one of those entangled particles to create an encryption key, only the person with the other particle can decode them.
  • Any attempt to interfere with or intercept the quantum key will prevent that key from working.
  • So how do you distribute your quantum key from A to B? It’s possible to do it via fiber optic cable. However, optical fibers are susceptible to interference. Also, transmission over ultralong distance relies on intermediate repeaters to boost the signal. In fact, so far, the longest recorded distance for successfully distributing a quantum key via a cable is just 62 miles.
  • Chinese quantum physicist, Pan Jianwei has been working on the distribution of quantum keys via satellite. To this end, China has also built Micius, a satellite designed specifically for quantum communications research.

The latest development

In 2017, Micius was used to set up a quantum key link between ground stations in Vienna and Beijing. However, in that case, Micius had to actually generate and distribute the encryption keys.

This year, Micius was used to send a secret key between two ground stations at Delingha and Urumqi, separated by around 700 miles. The satellite merely acted as a blind transmitter, with no information about the key.

The efficiency of the transmission was increased by fourfold compared to previous experiments. What’s more, the error rate in transmission was such that any attempt to eavesdrop on the message would be isolated from general noise and flagged up.

What it means

It’s important to remember that we’re still a long way from existing encryption methods being rendered redundant.

That said, the research shows that it is technically feasible to distribute a quantum key between two stations via satellite, and without that satellite having any information about the key. In other words, it’s a theoretical “100%” point-to-point secure transmission with the possibility of successful interception ruled out.

Ultimately, this method of key transmission could even be the basis of an ‘unhackable internet’.

CATEGORIES
  • Raynard Fenster says:

    This is major information I have been working on using signals from the satellite to satellite to ground to attack unfriendly military aircraft. I hope cyber command understands the importance of this research

  • travis mcghee says:

    If it was made by a human, it can be cracked by a human.

  • Jack says:

    I have also been working on a quantum internet connection. I expect to publish something soon.

  • Moir says:

    Use a stealth bomber to drop emp bombs on them in the shape of Winnie the Poo…

    • Nathan House says:

      “I know not with what weapons World War III will be fought, but World War IV will be fought with sticks and stones.”

      • Jason says:

        Those are the words of decent and sane human beings.
        Sadly there is a very tiny group of Degenerate individuals who think that they will win it. Even if that means going back to the stone age.

    • Frank Michael Salvo says:

      I understand humor, :-). Quantum computing is not only a new way to distribute bits, it is also a new way of distributing thoughts, ie a new age for human kind. Entanglement and superposition is only the beginning. We, Western Civilization, have a good track record of development, we should lead this new era. I just hope society realizes the purpose of WWII, to keep man/womankind free and not waste this new hidden social technology for greedy purpose$.

  • Miguel says:

    Very interesting articles. We should all be aware of the new totally hack-proof comms.

  • Jason says:

    On, off, xon, xoff

    Yet the construct of the Universe is binary yet the emanations of Elohim are infinite.

    From physics to metaphysics
    From chemistry to alchemy
    From astronomy to astrology

    The first Cryptography based document has been deciphered but by a few.

    Love you courses. Not the subject but the style of the facilitator!

  • Bruno del Conte says:

    OK, what’s a qubit again ? Fascinating though.

  • Alishia says:

    Quantum computing is promising in number of areas, like medical research, artificial intelligence, etc. But it could poses a threat to cybersecurity, requiring a change in how we encrypt our data.

  • Saket Jawandhia says:

    https://csrc.nist.gov/projects/post-quantum-cryptography

    Just found some interesting information regarding post quantum cryptography recently 🙂

  • Simon says:

    Article implies a unhackable internet. Does not sound like China to me. Be an unhackable Chinese intranet, we won’t get to use it.

  • Mike says:

    And seems like NIST is currently working with a lot of researchers to develop a post-quantum encryption algorithm. They have a few candidates for that.

    In the meantime, seems like AES-256 Rindajel is safe against quantum computer attacks.

    We need to make conventional computing secure, quantum computers will not replace the classical computing. Hybridization will happen in the research areas when required, but they will not replace classical computing.

    Regards

    • Nathan House says:

      Symmetric algorithms used for encryption, like AES, are still thought to be safe (with sufficient key length – e.g. AES-256 or larger); however, current asymmetric algorithms like RSA and ECDSA will be rendered essentially useless once quantum computers reach a certain scale.

      This will break nearly every practical application of cryptography in use today, making e-commerce and many other digital applications that we rely on in our daily lives totally insecure.

  • Mike says:

    Nice post!

    Seems like NIST is working hard to create a strong post quantum cryptographic algorithm.

    Classical computers will not be replaced by quantum computers but hybridization will happen.

  • anna says:

    Good article

  • Student says:

    What is quantum computing??
    Could some body tell it from zero

  • Arthur Juarez says:

    Just amazing knowledge about Quantum encryption. I read some articles from the weekly security email. I’m no security expert but these courses from station X make me hungry for more knowledge !

  • Aritra says:

    It was a great information to read. Thank you sir. Love from India

  • CisStraightWhiteGuy says:

    now if i could only figure out how to get Qubes to boot from this damn usb stick… 🙁

  • Mike says:

    Do you think quantum computers will replace the classical ones? Or they’ll be used as an extra piece of hardware to help classical computers to resolve other complicated problem such as a GPU helps processing graphics? Can you share me an article that represents your opinion on this matter?

  • >