Skip to main content

Quantum Communication, Sensing, and Security

The Unhackable Channel

In 2017, Chinese scientists held a video call between Beijing and Vienna. The call itself was ordinary. What made it extraordinary was the encryption: keys generated by quantum mechanics and distributed via a satellite called Micius.¹

The security didn't come from mathematical complexity—which future computers might break—but from the laws of physics. Any attempt to intercept the quantum key would necessarily disturb it, revealing the eavesdropper. The channel was, in a precise sense, unhackable.

This is quantum communication: using quantum properties to transmit information with security guaranteed by physics, not mathematics. Unlike quantum computing—which might be decades from practical use—quantum communication works today. Networks exist. Satellites orbit. Commercial products ship.

But quantum communication is more than secure messaging. Quantum sensing uses the same fragile quantum properties that make computing hard to measure the world with extraordinary precision. Your smartphone's GPS depends on atomic clocks—quantum sensors that define time with parts-per-trillion accuracy.

This chapter explores the "other" quantum technologies: communication and sensing. Less hyped than quantum computing, they may deliver practical impact sooner.


2026 Snapshot — Quantum Communication

Quantum Key Distribution (QKD)

What it is: Using quantum properties to generate and share encryption keys that cannot be intercepted without detection.

How it works: Sender transmits photons in quantum states. Receiver measures them. Any interception disturbs the states detectably. Shared key is provably secure.

Current deployment:

  • China: 4,600+ km fiber network connecting major cities; Micius satellite for intercontinental
  • Europe: Several metropolitan QKD networks; cross-border links developing
  • US: Research networks; limited commercial deployment
  • Commercial systems: ID Quantique, Toshiba, others selling QKD hardware

Limitations:

  • Distance: Fiber QKD works to ~100 km without repeaters
  • Speed: Key generation slower than data needs
  • Infrastructure: Requires dedicated fiber or satellite links
  • Cost: Expensive compared to classical encryption

Satellite QKD

The advantage: Free-space transmission loses fewer photons than fiber over long distances.

Micius satellite (China, 2016): First quantum communication satellite. Demonstrated intercontinental QKD.²

Other programs: EU, US, others developing quantum satellites.

Status: Proof of concept achieved. Commercial deployment beginning.

Quantum Networks

Current state: Point-to-point QKD. Limited networks exist.

Goal: A "quantum internet" connecting quantum devices, enabling distributed quantum computing, secure communication, and quantum sensing networks.

Key challenge: Quantum repeaters. Can't copy quantum states (no-cloning theorem), so can't use classical amplifiers. Need quantum memory and entanglement swapping.

Status: Quantum repeaters demonstrated in lab. Not yet practical.

Trusted Node Networks

Workaround: For long distances, use trusted intermediate nodes. Key is classical at nodes but never in the open.

China's network: Uses trusted nodes to span thousands of kilometers.

Limitation: Nodes must be physically secured. Not truly end-to-end quantum security.


2026 Snapshot — Quantum Sensing

Atomic Clocks

What they are: Devices that measure time by counting oscillations of atoms.

Precision: Optical atomic clocks accurate to one second in billions of years.³

Current use:

  • GPS: Satellite atomic clocks enable positioning
  • Telecommunications: Network synchronization
  • Finance: High-frequency trading timestamps
  • Science: Fundamental physics tests

Improving: Portable atomic clocks; chip-scale devices; optical clocks replacing microwave.

Magnetometers

What they are: Devices measuring magnetic fields with extreme sensitivity.

Quantum versions: Use atomic properties for unprecedented sensitivity.

Applications:

  • Medical: Magnetoencephalography (MEG) for brain imaging
  • Geological survey: Mineral exploration, underground mapping
  • Defense: Submarine detection, navigation without GPS
  • Scientific: Fundamental physics experiments

Status: Some commercial; others approaching deployment.

Gravimeters and Accelerometers

What they are: Devices measuring gravitational fields and acceleration.

Quantum versions: Use atom interferometry for extreme precision.

Applications:

  • Geological survey: Underground structure mapping
  • Navigation: GPS-independent positioning for submarines, spacecraft
  • Civil engineering: Infrastructure monitoring
  • Defense: Various classified applications

Status: Laboratory demonstrations; moving toward field deployment.

Quantum Imaging

What it is: Using quantum properties of light for enhanced imaging.

Applications:

  • Ghost imaging: Form images using correlations, not direct detection
  • Quantum radar: Potentially detect stealth aircraft
  • Quantum illumination: Imaging in noisy environments

Status: Research stage; some practical applications emerging.


Notable Players

Quantum Communication

ID Quantique (Switzerland):

  • Pioneer in QKD
  • Commercial systems deployed globally
  • Random number generators; encryption products

Toshiba:

  • Long-standing QKD research
  • Commercial QKD systems
  • Record transmission distances

China Telecom, China Unicom:

  • Operating world's largest QKD networks
  • Government-backed deployment

BT, Deutsche Telekom, SK Telecom:

  • Building QKD network trials
  • Preparing for commercial deployment

QKD Startups:

  • Qubitekk (US): Telecom-focused QKD
  • Nu Quantum (UK): Photonic quantum technology
  • Arqit (UK): Satellite QKD; public company

Quantum Sensing

Infleqtion (formerly ColdQuanta):

  • Cold atom technology
  • Atomic clocks, sensors, computing
  • Defense contracts

SandboxAQ (Alphabet spin-off):

  • Quantum sensing and AI
  • Magnetic navigation
  • Enterprise focus

Atomionics:

  • Quantum gravity sensors
  • Underground mapping
  • Singapore-based

Q-CTRL:

  • Quantum control software
  • Improves sensor and computer performance
  • Australian origin; global presence

AOSense, Muquans, others:

  • Various quantum sensor technologies
  • Government and commercial customers

National Programs

China: Most advanced deployment. Micius satellite; national fiber network; major investment.

United States: Research leadership; limited deployment. National Quantum Initiative includes communication and sensing.

European Union: Quantum Flagship program; EuroQCI network planned.

United Kingdom: National Quantum Technologies Programme; emphasis on sensing.


How Quantum Communication Works

The Physics

Photon polarization: A photon can be polarized in various directions. This is a quantum state.

Superposition: A photon can be in superposition of polarization states.

Measurement disturbs: Measuring a quantum state changes it. This is key to security.

No-cloning theorem: Quantum states cannot be copied exactly. Prevents interception without detection.

BB84 Protocol

The original QKD protocol (Bennett & Brassard, 1984):⁴

  1. Alice sends photons with random polarizations in one of two bases
  2. Bob measures each photon in a randomly chosen basis
  3. Alice and Bob compare which basis they used (not the results)
  4. When they used the same basis, they keep those bits as key
  5. They sacrifice some bits to check for interception
  6. If error rate is low, key is secure

Why it's secure: An eavesdropper (Eve) must measure photons to learn their state. But measuring disturbs them. When Alice and Bob compare, they detect the disturbance.

Entanglement-Based QKD

Alternative approach: Use entangled photon pairs.

  1. Source generates entangled pairs
  2. One photon to Alice, one to Bob
  3. They measure in random bases
  4. Correlations enable key generation
  5. Bell inequality violations prove no eavesdropper

Advantage: Stronger security proofs; source can be untrusted.

Disadvantage: More complex to implement.

Practical Challenges

Photon loss: Most photons don't make it through fiber. Limits distance.

Detector flaws: Real detectors have imperfections. Attackers can exploit them.

Side channels: Information can leak through unintended channels.

Key rate: Secure key generation is slow—kbps to Mbps, not Gbps.

Cost: Specialized equipment more expensive than classical encryption.


How Quantum Sensing Works

Atomic Clocks

Principle: Atoms absorb and emit radiation at precise frequencies. Count oscillations to measure time.

Cesium standard: Defines the second (9,192,631,770 oscillations).

Optical clocks: Use higher-frequency optical transitions. More oscillations per second means finer measurement.

Current precision: Optical clocks accurate to ~10⁻¹⁸. Would neither gain nor lose a second in the age of the universe.⁵

Atom Interferometry

Principle: Matter has wave properties. Atoms can interfere like light waves.

How it works:

  1. Cool atoms to near absolute zero
  2. Split atomic wave packet
  3. Let paths diverge, experiencing different conditions
  4. Recombine and measure interference

What it measures: Anything that affects the paths differently—gravity, acceleration, rotation.

Sensitivity: Can detect gravity changes of parts per billion.

Magnetometry

NV centers: Nitrogen-vacancy defects in diamond are sensitive to magnetic fields.

Atomic magnetometers: Atoms whose properties change in magnetic fields.

SQUID: Superconducting quantum interference devices (classical but quantum-enabled).

Sensitivity: Can detect fields from individual neurons.


Security Applications

Current Cryptographic Vulnerability

The threat: Shor's algorithm on a quantum computer can break RSA, Diffie-Hellman, ECC—the foundations of internet security.

Timeline: Unknown. Possibly 10-20+ years. But "harvest now, decrypt later" means secrets collected today may be vulnerable.

What's at risk:

  • Financial transactions
  • Government communications
  • Medical records
  • Infrastructure control
  • Military communications
  • Everything encrypted with current methods

Three Responses

Post-quantum cryptography (PQC):

  • Classical algorithms resistant to quantum attack
  • NIST standardization complete
  • Transition underway
  • Mathematical security (could be broken with new math)

Quantum key distribution:

  • Physics-based security
  • Available today
  • Limited by distance and infrastructure
  • Proven secure against quantum computers

Hybrid approach:

  • Use both PQC and QKD
  • Defense in depth
  • Belt and suspenders

Who Needs QKD?

High-value secrets: Government communications, military, intelligence.

Long-term secrets: Information that must remain secure for decades.

Financial infrastructure: Interbank communication, central banks.

Critical infrastructure: Power grid, telecommunications.

Healthcare: Long-term medical records.

Not needed (probably): Consumer internet traffic. PQC sufficient.

QKD vs. PQC Debate

QKD advocates: Physics-based security can't be broken by better algorithms. Proven secure against any computer, quantum or classical.

PQC advocates: QKD requires expensive infrastructure. Implementation has vulnerabilities. PQC sufficient for almost all uses.

Reality: Both have roles. QKD for highest security needs; PQC for broad deployment.


Sensing Applications

The problem: GPS can be jammed or spoofed. Military adversaries would target it. Space operations can't rely on it.

Quantum solution: Inertial navigation using quantum accelerometers and gyroscopes. Self-contained; can't be jammed.

Status: Military interest high. Development ongoing. Submarines may already use quantum navigation.

Underground Mapping

The problem: Traditional surveying can't see underground. Important for mining, construction, archaeology.

Quantum solution: Quantum gravimeters detect density variations underground. Map without digging.

Applications:

  • Mineral exploration
  • Underground utility mapping
  • Archaeological discovery
  • Void detection (sinkholes, tunnels)

Status: Field trials underway. Commercial deployment approaching.

Medical Imaging

Current technology: MEG (magnetoencephalography) uses SQUIDs to image brain activity.

Quantum improvement: More sensitive magnetometers; room-temperature operation; better spatial resolution.

Applications:

  • Brain-computer interfaces
  • Epilepsy diagnosis
  • Cognitive research
  • Earlier disease detection

Status: Research systems operational. Clinical applications emerging.

Timekeeping Infrastructure

Current: GPS provides time reference. Critical for power grid, telecom, finance.

Quantum improvement: Better clocks mean better synchronization. Optical clocks approaching deployment.

Applications:

  • Resilient time distribution
  • Better GPS accuracy
  • Financial transaction ordering
  • Scientific experiments

Status: Transitioning from cesium to optical standards over next decade.


The Path Forward

Near-Term Likely (2026-2032)

QKD deployment expands: More metropolitan networks. Government and financial adoption. Satellite links multiply.

Quantum-resistant transition: Major systems migrate to post-quantum cryptography. Hybrid approaches common.

Quantum sensing commercializes: Portable atomic clocks become common. Gravimeters deployed for geology. Magnetometers for medical.

Quantum repeaters advance: Laboratory demonstrations improve. Practical repeaters still years away.

No quantum internet yet: Point-to-point links; no true quantum network.

Plausible (2032-2040)

Practical quantum repeaters: Enable true long-distance quantum communication without trusted nodes.

Early quantum internet: Quantum networks connecting cities, then nations. Research and high-security applications.

Quantum sensing ubiquitous: Clocks in phones. Gravity surveys routine. Magnetic navigation deployed.

QKD infrastructure matures: Part of telecom infrastructure for sensitive communications.

Wild Trajectory (2040+)

Global quantum internet: Quantum communication as routine as classical. Distributed quantum computing.

Quantum sensing revolution: Underground is transparent. Navigation never fails. Medical diagnosis transformed.

End of traffic analysis: Quantum communication protocols hide not just content but metadata.

Or: Classical security proves sufficient. Quantum communication remains niche. Sensing provides main value.


Risks and Guardrails

Premature Quantum Computer

Risk: Adversary achieves fault-tolerant quantum computing before defenses ready. Mass cryptographic failure.

Guardrails: Accelerate post-quantum transition; deploy QKD for sensitive data; prepare key rotation infrastructure.

QKD Security Flaws

Risk: Implementation vulnerabilities make QKD less secure than advertised. False confidence.

Guardrails: Rigorous security proofs; implementation standards; continuous testing; defense in depth.

Quantum Arms Race

Risk: Quantum technology becomes focus of international competition. Instability.

Guardrails: International dialogue; arms control for quantum weapons applications; research collaboration where appropriate.

Sensing Privacy

Risk: Quantum sensing enables intrusive surveillance—seeing through walls, tracking movement, detecting lies.

Guardrails: Legal frameworks for sensor use; privacy protection; disclosure requirements.

Unequal Access

Risk: Quantum security available only to wealthy nations and organizations. Security inequality.

Guardrails: Technology transfer; international standards; commercial competition reducing costs.


Second-Order Effects

Trust Architecture Changes

Current: Trust relies on mathematical complexity. Encryption is trusted because breaking it seems hard.

Quantum change: Trust can rely on physics. QKD is trusted because breaking it violates physical law.

Implication: Different threat model. Implementation matters more than algorithm choice.

Verification Possibilities

With quantum sensing: Verify what can't be verified today. Underground nuclear tests. Hidden facilities. Environmental claims.

Implication: Arms control may become easier. Or adversaries develop countermeasures.

Current: GPS dependency is a vulnerability.

With quantum navigation: Self-contained positioning. No external reference needed.

Implication: Submarines, spacecraft, military units can navigate without revealing position.

Time Redefined

Current: Cesium standard defines the second.

Coming: Optical clocks are far better. Second will be redefined.

Implication: More precise time enables more precise science, better networks, new applications.


Conclusion

While quantum computing garners headlines and billions in investment, quantum communication and sensing are quietly delivering practical applications today.

Quantum key distribution provides security that no computer—quantum or classical—can break. The physics is proven. The systems work. The limitation is infrastructure and cost, not fundamental capability.

Quantum sensing exploits the same fragile quantum properties that make computing hard. Atomic clocks already underpin GPS and global time. Gravimeters and magnetometers are approaching commercial deployment for geology, navigation, and medicine.

These technologies won't replace classical systems. Post-quantum cryptography will secure most communications. Classical sensors will remain valuable. But for the highest security requirements and most demanding measurements, quantum approaches offer capabilities that classical physics simply cannot match.

The quantum revolution isn't just about computing. It's about a new relationship with information and measurement—using the strange rules of quantum mechanics not despite their weirdness but because of it.

Communication secured by physical law. Measurement limited only by fundamental uncertainty. Navigation that doesn't depend on external signals. Time measured with the precision of atomic transitions.

These aren't science fiction. They're engineering challenges being solved. The quantum future is arriving—not in a single dramatic moment but in the steady deployment of technologies that exploit quantum mechanics for practical ends.

Less flashy than quantum computing, perhaps. But potentially more immediately useful.


Endnotes — Chapter 45

  1. Beijing-Vienna quantum-secured video call conducted September 2017; used Micius satellite for intercontinental quantum key distribution.
  2. Micius (Mozi) satellite launched August 2016; first dedicated quantum communication satellite; demonstrated 1,200 km satellite-to-ground QKD.
  3. Optical atomic clocks using strontium, ytterbium, and aluminum ions have demonstrated accuracy of ~10⁻¹⁸, corresponding to less than one second error over the age of the universe.
  4. BB84 protocol published by Charles Bennett and Gilles Brassard in 1984; first QKD protocol; remains basis for most commercial systems.
  5. NIST and other labs have demonstrated optical clocks with fractional frequency uncertainty of 10⁻¹⁸; transitioning official time standard from cesium to optical is underway.
  6. China's quantum communication network spans 4,600+ km connecting Beijing, Shanghai, and other major cities; uses fiber and trusted nodes.
  7. "Harvest now, decrypt later" refers to adversaries collecting encrypted data today for future decryption when quantum computers become available.
  8. Post-quantum cryptography algorithms selected by NIST (2022) include CRYSTALS-Kyber (key exchange) and CRYSTALS-Dilithium (signatures).
  9. Quantum gravimeters using atom interferometry have demonstrated sensitivity of ~10⁻⁹ g, enabling detection of underground density variations.
  10. Quantum magnetometers using NV centers in diamond can detect magnetic fields of a few femtotesla, enabling single-neuron-level brain imaging.