Quantum data protection is the holy grail of encryption. Theoretically unhackable thanks to Heisenberg’s uncertainty principle and promising accurate information transfer at any distance, the field has seen major interest and investment over the past few years.

Still, challenges remain, including the development of a viable quantum memory storage solution. Historically, these systems have been too large to fit on a computer chip. However, according to Wired, researchers from the California Institute of Technology (CalTech) recently co-authored a paper that described a new quantum storage technology small enough to fit the bill. Is this the birth of the unhackable box?

Quantum Qualifications

By storing data in photons, organizations can transmit information at the speed of light, meaning that if the problem of absorption can be solved — photon-based signals are eventually absorbed into their communication medium — there’s huge potential for near-instantaneous connections.

But the bigger benefit comes from the consequence of observing particles. According to the uncertainty principle, it’s impossible to know the position and momentum of a particle because the mere act of observing a particle changes its behavior. As a result, attempts to extract quantum information alter the photon’s state, warning sender and recipient of the attempted breach.

Add in the benefits of quantum entanglement, which occurs in particle pairs created at the same time and causes their state to be interdependent, and there’s real promise here. Even if fraudsters could crack quantum boundaries, their actions would destroy the information they want.

The Evolution of Quantum Data Protection

There’s a pressing need for more effective data protection practices. As the Wired piece pointed out, experts anticipate that even advanced encryption algorithms won’t be enough to circumvent increased computing power for much longer.

But progress is well underway. The quantum storage box uses a nano-sized cavity filled with neodymium inside a crystal structure made of yttrium orthovanadate (YVO4), which acts as a photon resonator to enhance light-atom interactions and improve photon absorption. While the box alone won’t enable secure quantum communication, Andrei Faraon of CalTech, who co-authored the paper, noted that “it could be used to transfer information at the quantum level at long distances via optical fibers.”

Additional Efforts

Other efforts are also gaining ground. A research team from the University of Ottawa recently sent a 4-D encrypted message — so named because each photon encodes two bits of information — through the air “in realistic city conditions, including turbulence.” So far, the researchers have sent information just 0.3 km (0.18 miles), but the next step involves network links that are more than 5 km (3.1 miles) apart.

According to The Economist, Chinese researchers are developing a quantum-based satellite network that has already sent a secure key between the origin satellite and a ground-based station 2,500 km away, providing clear evidence that quantum entanglement can be maintained even through the vacuum of space.

Ideally, quantum data protection offers a way to safeguard transmissions over any distance by both notifying the sender and receiver of any tampering and rendering compromised information useless. While there’s still no guarantee of commercial viability, the field took a significant step forward with the creation of a chip-sized, fully functioning quantum box.

More from

Bridging the 3.4 Million Workforce Gap in Cybersecurity

As new cybersecurity threats continue to loom, the industry is running short of workers to face them. The 2022 (ISC)2 Cybersecurity Workforce Study identified a 3.4 million worldwide cybersecurity worker gap; the total existing workforce is estimated at 4.7 million. Yet despite adding workers this past year, that gap continued to widen.Nearly 12,000 participants in that study felt that additional staff would have a hugely positive impact on their ability to perform their duties. More hires would boost proper risk…

The Evolution of Antivirus Software to Face Modern Threats

Over the years, endpoint security has evolved from primitive antivirus software to more sophisticated next-generation platforms employing advanced technology and better endpoint detection and response.  Because of the increased threat that modern cyberattacks pose, experts are exploring more elegant ways of keeping data safe from threats.Signature-Based Antivirus SoftwareSignature-based detection is the use of footprints to identify malware. All programs, applications, software and files have a digital footprint. Buried within their code, these digital footprints or signatures are unique to the respective…

How Do Threat Hunters Keep Organizations Safe?

Neil Wyler started his job amid an ongoing cyberattack. As a threat hunter, he helped his client discover that millions of records had been stolen over four months. Even though his client used sophisticated tools, its threat-hunting technology did not detect the attack because the transactions looked normal. But with Wyler’s expertise, he was able to realize that data was leaving the environment as well as entering the system. His efforts saved the company from suffering even more damage and…

The White House on Quantum Encryption and IoT Labels

A recent White House Fact Sheet outlined the current and future U.S. cybersecurity priorities. While most of the topics covered were in line with expectations, others drew more attention. The emphasis on critical infrastructure protection is clearly a top national priority. However, the plan is to create a labeling system for IoT devices, identifying the ones with the highest cybersecurity standards. Few expected that news. The topic of quantum-resistant encryption reveals that such concerns may become a reality sooner than…