For a few minutes each night in certain parts of China, the brightest light in the sky is the lurid glow of the Micius satellite, shooting a green laser down to Earth as it swings through space 500 kilometres above. When conditions are right, you might also see a red beam lancing back through the darkness from one of the ground stations that send signals in reply.

Micius is not your average telecommunications satellite. On 29 September 2017, it made history by accomplishing an astonishing feat, harnessing the mysterious qualities of quantum entanglement – what Einstein called ‘spooky action at a distance’ – to ‘teleport’ information into space and back again. In doing so, it enabled the first intercontinental phone call – a video call, in fact, between Beijing and Vienna – that was completely unhackable.

The weird science of quantum physics that powers Micius is at the heart of a technology arms race. On one side are quantum computers, still in their infancy but with enormous potential once they grow in power. Among their most prized, and feared, applications is the capacity to cut through the complex mathematical locks that now secure computer encryption systems – the ones that mean you can confidently conduct financial transactions over the internet. On the other side is the only sure defence – encryption techniques that also rely on the laws of quantum physics.

Until recently scientists had managed to make quantum encryption work only across distances of a hundred kilometres or so. The Chinese scientists behind Micius have now reached around the world. It brings the ultimate prize tantalisingly closer. “I envision a space-ground integrated quantum internet,” says Pan Jianwei, whose team became frontrunners in the quantum communications race after Micius switched on.

That quantum internet will be both unquestionably secure and disconcertingly strange, opening new windows for science and computing.

The Tiangong-2 space laboratory, launched after the groundbreaking Micius satellite, will extend China’s quantum communications program, bringing a global quantum network closer to reality. VCG / Getty Images

Pan is used to thinking small. The Chinese physicist made his name with groundbreaking explorations of quantum entanglement, that curious kind of telepathy between subatomic particles that Einstein famously derided.

At the same time Pan thinks very big. He has led China’s massive quantum technology program for more than a decade.

After Micius launched from Jiuquan spaceport on the remote plains of Inner Mongolia in August 2016, it began to perform a series of experiments that steadily escalated in complexity. At their core was a crystal-based gadget that produces pairs of entangled photons and sends them via tightly focused laser beams to receiving stations on the ground.

Pan’s team first established long-range entangled connections between ground stations inside China. Then they succeeded in transmitting the quantum state of a particle – so-called quantum teleportation, which will be a vital technique for quantum computers to communicate. An extraordinary year was capped with the unhackable international videoconference, in which dignitaries from the Chinese and Austrian academies of science exchanged congratulations.

Pan has no shortage of resources at his disposal. Quantum technology is a key research priority for the Chinese government, as for many others.

The best estimate of the scale of global efforts comes from consulting firm McKinsey & Company. It reported in 2015 that about 7,000 researchers worldwide were working in the field, with about US$1.5 billion a year being spent. Those numbers are undoubtedly bigger now, and will only grow as governments and corporations chase the advantages of quantum technology.

High on their list of motivations: protecting secrets. “Security is the big selling point,” says Jacq Romero, a photonics expert at the University of Queensland. A quantum network could also be used to realise more exotic proposals, such as super-telescopes that combine light from multiple telescopes to massively enhance astronomical observations.

The work Pan and other scientists are doing now is part of what some call “the second quantum revolution”. The first quantum revolution began in the early decades of the 20th century with the discovery of the bizarre laws of the subatomic realm – in which an object can be both a wave and a particle – by pioneering scientists like Heisenberg, Schrödinger and Einstein. Applied to technology, these ideas ushered in the era of modern electronics with devices such as the transistor, the laser and the solar cell.

In the second quantum revolution, scientists are applying the quantum rules to the basic ideas of information technology.

Classical computing relies on binary information, represented by bits that are either 1s or 0s. Quantum information uses quantum bits, or qubits, which can be in both the 1 and 0 states at the same time. This can be done using the magnetic spin of electrons, for example, which can be ‘up’ , ‘down’ or some combination of up and down.

This combination quantum state, known as a ‘superposition’, is the first of several concepts that form the foundation of the second quantum revolution. A qubit only ‘chooses’ one state or the other – at random, though the probability depends on how much up and down are in the superposition – when it is measured. Until then qubits inside a quantum computer can effectively perform multiple calculations simultaneously.

The second important concept is entanglement, where the behaviour of distant particles can be inextricably connected – or ‘entangled’. When one entangled particle is measured – and hence ‘chooses’ a state – its partner is immediately bound by that choice, no matter how far away it is. Entanglement is the key to quantum communication.

The third concept is the ‘no-cloning theorem’, which says the information in a quantum particle can never be fully copied without changing the state of the particle. A hacker can make a copy of your email now without you ever knowing; a hack of a quantum system, however, is bound by the laws of physics to leave traces.

Together, these phenomena pave the way for quantum computers able to crunch through big data problems that involve finding optimum solutions from vast numbers of options. That includes efficiently reverse-engineering the encryption keys that protect your internet banking sessions. At the same time, they make possible hack-proof quantum communication, in which eavesdropping can always be detected.

If a particle with a particular set of properties disappears at one location and one with exactly the same properties appears elsewhere, how can anyone say they are not the same particle?

The seeds of a quantum internet were first sown in the 1970s by a physicist named Stephen Wiesner. As a graduate student at Columbia University in New York, Weisner realised how the strange laws of quantum mechanics could be used for new kinds of communication.

Wiesner’s ideas were developed into a detailed protocol for secure communication in 1984 by Charles Bennett and Gilles Brassard. Many cryptographic schemes involve a piece of information – known as a key – that is shared by the sender and the recipient of a message, but by no one else. The Bennett and Brassard scheme sought to solve the problem of sharing the key itself in a secure way.

Their idea involved a sender (conventionally known as Alice in cryptography) sending a long string of 1s and 0s to a recipient (call him Bob) that is encoded in photons in such a way that if an eavesdropper (Eve, naturally) conducted any measurements on it, Alice and Bob would know (because measuring a quantum particle changes its properties). They would then throw out any affected 1s and 0s, and be left with an ideal cryptographic key – a long random number they both know but no one else does.

Quantum cryptography suddenly became more relevant in 1994, when mathematician Peter Shor showed that quantum computers might one day be able to use quantum indeterminacy to break through existing cryptographic schemes with alarming ease. Cracking such schemes – like the ones that keep your internet banking sessions safe from prying eyes – involves finding the factors of extremely large numbers. Shor showed that a quantum computer would be able to do it much more quickly than a classical one.

Meanwhile, further developments in the theory of quantum communication – the practice was still some years off – made use of the even stranger phenomenon of entanglement, which can bind together the fates of objects separated by any distance.

This quantum connection turns out to be very handy for Alice and Bob in their quest to have a quiet chat without Eve interrupting. A pair of entangled particles is in a sense a single entity, no matter how far apart they are. This insight was extended to its logical yet absurd conclusion by theorist David Bohm, who noted that, as a consequence of quantum mechanics, “the entire universe must, on a very accurate level, be regarded as a single indivisible unit”.

In 1991, Oxford physicist Artur Ekert figured out exactly how entanglement could improve on the Bennett-Brassard scheme. Suppose Alice generates a stream of entangled photons and keeps one of each pair for herself, sending the other to Bob. She measures the polarisation of her own photons, and writes down a 1 every time it is horizontal and a 0 every time it is vertical. Eventually she will have a string of numbers. Thanks to entanglement, if Bob has done the same measurements he will have the identical string. If Eve has intercepted any photons, if will make detectable changes to the correlations between Alice and Bob’s measurements.

Another use for entanglement was discovered in 1993, when Bennett and Brassard, along with others, figured out that it could be used to transport the quantum state of a particle – a qubit, essentially – from one place to another. If Alice has a photon in some unknown superposition – the particular combination of 1 and 0 states – this ‘quantum teleportation’ technique lets her send information to Bob so he can create an identical photon. To collect this information, Alice must destroy the quantum state of her photon. Bob then uses that information to create a photon with the same attributes as Alice’s, including any entanglements.

Physicists call this teleportation because the properties of a subatomic particle, such as its position, momentum, polarisation and spin, are all there is to know about it. If a particle with a particular set of properties disappears at one location and one with exactly the same properties appears elsewhere, how can anyone say they are not the same particle?

This kind of weirdness highlights the deep connections between cryptography, information theory and fundamental physics that the quantum internet will exploit. Anton Zeilinger, an Austrian physicist who was Pan Jianwei’s mentor and is now his collaborator, put it bluntly in a 2005 essay in Nature: “the distinction between reality and our knowledge of reality, between reality and information, cannot be made.”

While the theory behind the quantum internet is mind-bending, building it is largely an engineering exercise. Even John Stewart Bell, the Belfast-born physicist who dreamed up the entanglement experiments that killed the idea of any kind of common-sense reality beneath quantum mechanics, described himself as a “quantum engineer”, and said he only had time to contemplate principles on Sundays.

So it is for today’s practical quantum scientists. Devices must be calibrated, experiments must be refined, noise must be reduced. Questions of why give way to figuring out how.

It is the ability to solve those discrete engineering problems that impresses Vikram Sharma, head of Quintessence Labs, a company based in Canberra, Australia, that builds quantum security systems.

Quintessence Labs is putting quantum technology to use in a network security system built around a device that uses quantum unpredictability to spit out a billion random numbers a second. <