Skip to main content

China, launch an 'unhackable' internet communication

China is about to launch a new, "unhackable" communications network - at least in the sense that any attack on it would be quickly detected.

The technology it has turned to is quantum cryptography, a radical break from the traditional encryption methods around. The Chinese project in the city of Jinan has been touted as a milestone by state media.

The pioneering project is also part of a bigger story: China is taking the lead in a technology in which the West has long been hesitant to invest.

In the Jinan network, some 200 users from the military, government, finance and electricity sectors will be able to send messages safe in the knowledge that only they are reading them.

China's push in quantum communication means the country is taking huge strides developing applications that might make the increasingly vulnerable internet more secure. Applications that other countries soon might find themselves buying from China.

So, what is this technology into which the country is pouring massive resources?

'Unhackable' communication

If you send a message you want to keep secure from eavesdroppers, traditional encryption works by hiding the key needed to read the message in a very difficult mathematical problem.

But what is "difficult" in terms of maths? It means you have to think really fast to figure it out as you try endless combinations of long, numeric keys. In 2017, that means you need to use a very powerful computer.

Steady improvements in computer power mean that the number-based keys have to be lengthened periodically. Encryption has a shelf life and is rapidly becoming more vulnerable.

There are also fears that the development of quantum computers, which effectively represent a massive step change in number crunching ability, will render much of modern encryption software vulnerable.

Quantum communication works differently:

If you want to send your secure message, you first separately send a key embedded in particles of lightOnly then doyou send your encrypted message and the receiver will be able to read it with the help of the key sent beforehandImage copyrightSPLImage captionIf a key is embedded in light particles, any interception will be noticed

The crucial advantage of this so-called quantum key distribution is that if anyone tries to intercept the light particles, they necessarily alter or destroy them.

What this means is that any attempt at hacking will immediately be noticed by the original sender and the intended receiver - hence its description as "unhackable".

Leaving the West behind

If quantum communication can help to secure online communications, why is China so far ahead?

"For a long time people simply didn't think it was needed," says Prof Myungshik Kim of Imperial College, London, adding that it was not clear whether there was a commercial market for this technology.

"The mathematical difficulty of the current coding system was so high that it was not thought necessary to implement the new technology," he says.

The research itself is not new and China does not have an edge over the competition. Where it does have an advantage is when it comes to applications.

"Europe has simply missed the boat," says Prof Anton Zeilinger, a quantum physicist at Vienna University in Austria and a pioneer in the field.

He says he tried to convince the EU as early as 2004 to fund more quantum-based projects but it had little effect.

"Europe has been dragging its feet and this has hindered us from being able to compete," he says.

There are quantum key-based networks operating in the US and Europe but most are being carried out as research projects, rather than with commercial partners.

Creating a market

One problem is that it is expensive to build applications like the Jinan network. And if there is not yet a commercial market, it is hard to get investors or governments as backers.

"We have to admit that when China invests into something, they have the financial power and manpower that is beyond probably anything else in the world except the US military," says Valerio Scarani, a physicist with Centre for Quantum Technologies at the National University of Singapore.

The Jinan network is not the only quantum communication application China has developed.

Image copyrightCHINA DAILY/REUTERSImage captionChina's quantum satellite was launched from the Gobi Desert

Last year, it launched a satellite equipped to test quantum communication over large distances that cannot be bridged by cables. There has also been a link established between the country's two main hubs, Beijing and Shanghai, so both ends can communicate and know when others are listening in.

So while it might not be clear yet whether quantum communication will indeed be the one technology to replace traditional encryption, it is widely considered as one of the leading candidates.

And China, in turn, is the leading country when it comes to building and experimenting with real applications of it.

"It's a situation where the technology can create its market," says Prof Zeilinger.

Once the technology is sold by Chinese companies, international banks might well be the first lining up as customers.

Comments

Popular posts from this blog

Floyd Mayweather Baby Mama Sues for $20 Mil ... He's a Despicable Liar

Floyd Mayweather could lose tens of millions of dollars from his big payday if his baby mama gets her way ... because she's just filed a lawsuit claiming he ruined her with lies to save his own ass. Josie Harris, who has 3 kids with Floyd, claims he lied through his teeth in an interview with Katie Couric just 2 weeks before the big fight ... when he claimed Josie was in a drug-fueled rage and he had to "restrain" her during their infamous 2010 domestic violence incident. Point of fact ... Floyd was convicted of domestic violence and spent two months in jail. Josie recounts her terror in the lawsuit, explaining how she and Floyd had broken up ... but he flew into a jealous rage that night, broke into her home and viciously attacked her while she was sleeping on her couch ... and her kids saw part of the beating. Harris says she is now labeled a drug addict thanks to Mayweather's lies -- and was embarrassed and humiliated on a global scale.   Her lawyer, Dan Friedl...

Dangerous sex Positions For Men

The most common cause of pénile injury is found among the variety of potentially dangerous positions used for séxual intercourse. The most popular is the ‘woman-on-top’. This type of position can result in an impact between the pénis against the female pelvis or perineum that can easily traumatize the pénile cylinders. A pénis becomes érect when the lining of the cylinder within it is engorged with blood.  A pénis fracture can occur when there is trauma to the eréct pénis, resulting in a rupture of the cylinder lining. This very painful injury is often accompanied by an abrupt, distressing cracking noise that is immediately followed by dark bruising of the pénis due to blood escaping the cylinder. In ten to 30% of pénis fractures, the urethra is damaged and blood may be visible at the urinary opening. Given these signs, an injury should be relatively simple to diagnose, right? You would be surprised, even with the unsettling sounds of a fracture occurring, many men...

Google Authenticator, a formidable layer of protection to your account.

​Google Authenticator is a free security app that can protect your accounts against password theft. It's easy to set up and can be used in a process called two-factor authentication (2FA) offered on popular social media services like Gmail, Facebook, Twitter, Instagram, etc.  The app ( iOS / Android ) generates a random code used to verify your identity when you're logging into various services. The code can technically be sent to your phone via text message every time— but the Google Authenticator app provides an extra level of security.  SMS-based 2FA has a  known security flaw , and any devoted hacker can attempt to  socially engineer  an attack against your phone company. The Google Authenticator app eliminates the possibility of an SMS-based attack  using algorithms  to generate the codes on your phone. Here's how to set it up: 1. Download Google Authenticator from either the Apple App Store or the Android Google Play store. It's free. 2. Nex...