September 6, 2017 By Douglas Bonderud 2 min read

Quantum data protection is the holy grail of encryption. Theoretically unhackable thanks to Heisenberg’s uncertainty principle and promising accurate information transfer at any distance, the field has seen major interest and investment over the past few years.

Still, challenges remain, including the development of a viable quantum memory storage solution. Historically, these systems have been too large to fit on a computer chip. However, according to Wired, researchers from the California Institute of Technology (CalTech) recently co-authored a paper that described a new quantum storage technology small enough to fit the bill. Is this the birth of the unhackable box?

Quantum Qualifications

By storing data in photons, organizations can transmit information at the speed of light, meaning that if the problem of absorption can be solved — photon-based signals are eventually absorbed into their communication medium — there’s huge potential for near-instantaneous connections.

But the bigger benefit comes from the consequence of observing particles. According to the uncertainty principle, it’s impossible to know the position and momentum of a particle because the mere act of observing a particle changes its behavior. As a result, attempts to extract quantum information alter the photon’s state, warning sender and recipient of the attempted breach.

Add in the benefits of quantum entanglement, which occurs in particle pairs created at the same time and causes their state to be interdependent, and there’s real promise here. Even if fraudsters could crack quantum boundaries, their actions would destroy the information they want.

The Evolution of Quantum Data Protection

There’s a pressing need for more effective data protection practices. As the Wired piece pointed out, experts anticipate that even advanced encryption algorithms won’t be enough to circumvent increased computing power for much longer.

But progress is well underway. The quantum storage box uses a nano-sized cavity filled with neodymium inside a crystal structure made of yttrium orthovanadate (YVO4), which acts as a photon resonator to enhance light-atom interactions and improve photon absorption. While the box alone won’t enable secure quantum communication, Andrei Faraon of CalTech, who co-authored the paper, noted that “it could be used to transfer information at the quantum level at long distances via optical fibers.”

Additional Efforts

Other efforts are also gaining ground. A research team from the University of Ottawa recently sent a 4-D encrypted message — so named because each photon encodes two bits of information — through the air “in realistic city conditions, including turbulence.” So far, the researchers have sent information just 0.3 km (0.18 miles), but the next step involves network links that are more than 5 km (3.1 miles) apart.

According to The Economist, Chinese researchers are developing a quantum-based satellite network that has already sent a secure key between the origin satellite and a ground-based station 2,500 km away, providing clear evidence that quantum entanglement can be maintained even through the vacuum of space.

Ideally, quantum data protection offers a way to safeguard transmissions over any distance by both notifying the sender and receiver of any tampering and rendering compromised information useless. While there’s still no guarantee of commercial viability, the field took a significant step forward with the creation of a chip-sized, fully functioning quantum box.

More from

SoaPy: Stealthy enumeration of Active Directory environments through ADWS

10 min read - Introduction Over time, both targeted and large-scale enumeration of Active Directory (AD) environments have become increasingly detected due to modern defensive solutions. During our internship at X-Force Red this past summer, we noticed FalconForce’s SOAPHound was becoming popular for enumerating Active Directory environments. This tool brought a new perspective to Active Directory enumeration by performing collection via Active Directory Web Services (ADWS) instead of directly through Lightweight Directory Access Protocol (LDAP) as other AD enumeration tools had in the past.…

Smoltalk: RCE in open source agents

26 min read - Big shoutout to Hugging Face and the smolagents team for their cooperation and quick turnaround for a fix! Introduction Recently, I have been working on a side project to automate some pentest reconnaissance with AI agents. Just after I started this project, Hugging Face announced the release of smolagents, a lightweight framework for building AI agents that implements the methodology described in the ReAct paper, emphasizing reasoning through iterative decision-making. Interestingly, smolagents enables agents to reason and act by generating…

4 ways to bring cybersecurity into your community

4 min read - It’s easy to focus on technology when talking about cybersecurity. However, the best prevention measures rely on the education of those who use technology. Organizations training their employees is the first step. But the industry needs to expand the concept of a culture of cybersecurity and take it from where it currently stands as an organizational responsibility to a global perspective.When every person who uses technology — for work, personal use and school — views cybersecurity as their responsibility, it…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today