January 18, 2017 By Tousif Syed 3 min read

Have you seen the Jackie Chan movie “Twin Dragons” or its remake, “Judwa,” with Bollywood star Salman Khan? The story is about twin brothers who are entangled with one another despite having been separated at birth. The entanglement causes each brother to feel and experience the actions and sensations of the other, and the quality of the connection diminishes with increasing distance.

This connection is quite similar to Albert Einstein’s theory of quantum entanglement. In simple terms, here’s how it works: Two quantum particles (atoms, photons or ions) become correlated with each other, meaning that if one particle changes its state, the entangled particle will undergo the same change. Therefore, by measuring one particle, you can also determine the state of the other.

Unlike in the movies, this quantum entanglement phenomenon can occur at any distance — even from opposite sides of the universe. The change of state happens instantly. Without quantum particles, this communication would need to travel many times faster than the speed of light, which, according to the theory of relativity, is impossible. For this reason, Einstein himself rejected the phenomenon as “spooky action at a distance.”

Applying Quantum Mechanics to the Three Pillars of Secure Communication

Researchers are currently studying quantum entanglement for possible applications to secure communication. This type of communication is built on three key principles: nonrepudiation, confidentiality and integrity. Let’s take a closer look at these components.

1. Nonrepudiation

While quantum mechanics can facilitate trusted communications, untrusted transactions still need to ensure nonrepudiation. This means that several different entities must verify the digital signature of the sender. Therefore, a quantum intermediary is still required for untrusted communications in which nonrepudiation is possible and can be exploited. Quantum digital signatures require the message recipient to have a copy of sender’s public key. The exact identity of the recipient is only known to the sender.

2. Confidentiality

Communication through the public key encryption system can only ensure confidentiality or nonrepudiation at a given time. The public key is used to encrypt the message, which can only be decrypted by the receiver’s private key. Although the confidentiality is maintained, the nonrepudiation of the sender cannot be established.

Similarly, when the sender encrypts a message using his or her private key, nonrepudiation is maintained but confidentiality cannot be established. The number of public keys for the distribution of quantum digital signatures must be limited to be secure. If the public key is allowed only one time, then the communication becomes confidential and secure. However, this is a costly solution.

3. Integrity

If an eavesdropper tries to measure the state of a photon, the laws of quantum mechanics cause the entangled particles to lose their magic connection. This property makes the communication secure, since any attempt to eavesdrop would change the state of the particle and thus be exposed.

How does a quantum particle change its state in response to a change in the other entangled particle? What if an organization discovers the mechanism of communication and uses this knowledge for malicious purposes, such as spying on communications? The problem is that the mechanism of communication is not completely known. Particles don’t just magically change states without a medium.

It will take time, but the medium for type of communication will eventually be discovered. The situation is similar to Einstein’s 1916 speculation about gravitational waves, a phenomenon that was first detected nearly 100 years later.

A Bright Future and a Long Road Ahead

The quantum technology used for data security comes with plenty of implementation challenges. The concept is still being researched and use of the technology requires costly infrastructure. In addition, long-distance surface communications are impeded by the Earth’s curvature and the limitations of fiber communication. This means that quantum transactions might require satellite technology to be effective.

On Sept. 29, 2017, the Austrian and Chinese academies of science used a key generated through quantum entanglement to conduct secure communication between two stations 700 miles apart. The successful test augurs well for the future of communication, but there is still much ground to cover when it comes to employing the principles of quantum mechanics to data security.

More from Data Protection

SpyAgent malware targets crypto wallets by stealing screenshots

4 min read - A new Android malware strain known as SpyAgent is making the rounds — and stealing screenshots as it goes. Using optical character recognition (OCR) technology, the malware is after cryptocurrency recovery phrases often stored in screenshots on user devices.Here's how to dodge the bullet.Attackers shooting their (screen) shotAttacks start — as always — with phishing efforts. Users receive text messages prompting them to download seemingly legitimate apps. If they take the bait and install the app, the SpyAgent malware gets…

Exploring DORA: How to manage ICT incidents and minimize cyber threat risks

3 min read - As cybersecurity breaches continue to rise globally, institutions handling sensitive information are particularly vulnerable. In 2024, the average cost of a data breach in the financial sector reached $6.08 million, making it the second hardest hit after healthcare, according to IBM's 2024 Cost of a Data Breach report. This underscores the need for robust IT security regulations in critical sectors.More than just a defensive measure, compliance with security regulations helps organizations reduce risk, strengthen operational resilience and enhance customer trust.…

Skills shortage directly tied to financial loss in data breaches

2 min read - The cybersecurity skills gap continues to widen, with serious consequences for organizations worldwide. According to IBM's 2024 Cost Of A Data Breach Report, more than half of breached organizations now face severe security staffing shortages, a whopping 26.2% increase from the previous year.And that's expensive. This skills deficit adds an average of $1.76 million in additional breach costs.The shortage spans both technical cybersecurity skills and adjacent competencies. Cloud security, threat intelligence analysis and incident response capabilities are in high demand. Equally…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today