{"id":49357,"date":"2025-02-21T10:29:42","date_gmt":"2025-02-21T10:29:42","guid":{"rendered":"https:\/\/kede.com.br\/news\/will-quantum-computers-disrupt-critical-infrastructure\/"},"modified":"2025-02-21T10:29:44","modified_gmt":"2025-02-21T10:29:44","slug":"will-quantum-computers-disrupt-critical-infrastructure","status":"publish","type":"post","link":"https:\/\/kede.com.br\/news\/will-quantum-computers-disrupt-critical-infrastructure\/","title":{"rendered":"Will quantum computers disrupt critical infrastructure?"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div id=\"\">\n<div data-component=\"byline-block\" class=\"sc-18fde0d6-0 dlWCEZ\">\n<div data-testid=\"byline-new\" class=\"sc-b42e7a8f-0 haItSe\">\n<div data-testid=\"byline-new-contributors\" class=\"sc-b42e7a8f-12 fcCDwR\">\n<div class=\"sc-b42e7a8f-5 evAEAB\">\n<div><span class=\"sc-b42e7a8f-7 khDNZq\">Joe Fay<\/span><\/p>\n<p><span>Technology Reporter<!-- --><\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<figure>\n<div data-component=\"image-block\" class=\"sc-18fde0d6-0 ejjhCR\">\n<div data-testid=\"hero-image\" class=\"sc-a34861b-1 jxzoZC\"><img sizes=\"(min-width: 1280px) 50vw, (min-width: 1008px) 66vw, 96vw\" srcset=\"https:\/\/ichef.bbci.co.uk\/news\/240\/cpsprodpb\/defa\/live\/4b76c4e0-bd21-11ef-aff0-072ce821b6ab.jpg.webp 240w,https:\/\/ichef.bbci.co.uk\/news\/320\/cpsprodpb\/defa\/live\/4b76c4e0-bd21-11ef-aff0-072ce821b6ab.jpg.webp 320w,https:\/\/ichef.bbci.co.uk\/news\/480\/cpsprodpb\/defa\/live\/4b76c4e0-bd21-11ef-aff0-072ce821b6ab.jpg.webp 480w,https:\/\/ichef.bbci.co.uk\/news\/640\/cpsprodpb\/defa\/live\/4b76c4e0-bd21-11ef-aff0-072ce821b6ab.jpg.webp 640w,https:\/\/ichef.bbci.co.uk\/news\/800\/cpsprodpb\/defa\/live\/4b76c4e0-bd21-11ef-aff0-072ce821b6ab.jpg.webp 800w,https:\/\/ichef.bbci.co.uk\/news\/1024\/cpsprodpb\/defa\/live\/4b76c4e0-bd21-11ef-aff0-072ce821b6ab.jpg.webp 1024w,https:\/\/ichef.bbci.co.uk\/news\/1536\/cpsprodpb\/defa\/live\/4b76c4e0-bd21-11ef-aff0-072ce821b6ab.jpg.webp 1536w\" src=\"https:\/\/ichef.bbci.co.uk\/news\/480\/cpsprodpb\/defa\/live\/4b76c4e0-bd21-11ef-aff0-072ce821b6ab.jpg.webp\" alt=\"Google An engineer works on part of a quantum computer.\" class=\"sc-a34861b-0 efFcac\"\/><span class=\"sc-a34861b-2 fxQYxK\">Google<\/span><\/div>\n<\/div>\n<p><figcaption class=\"sc-8353772e-0 cvNhQw\">Many organisations are developing quantum computers<!-- --><\/figcaption><\/p>\n<\/figure>\n<div data-component=\"text-block\" class=\"sc-18fde0d6-0 dlWCEZ\">\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">Twenty five years ago computer programmers were racing to fix the millennium bug amidst fears that it would cause banking systems to crash and planes to fall out of the sky.<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">Much to everyone&#8217;s relief <!-- --><a target=\"_self\" href=\"https:\/\/www.bbc.co.uk\/news\/technology-45083650\" class=\"sc-c9299ecf-0 bZUiKB\" rel=\"noopener\">the impact turned out to be minimal<!-- --><\/a>.<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">Today, some fear there is a new critical threat to the world\u2019s digital infrastructure. But this time, we cannot predict exactly when it will move from theory to reality, while the ubiquity of digital technology means fixing the problem is even more complicated.<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">That\u2019s because the arrival of quantum computing means that many of the encryption algorithms that underpin and secure our hyperconnected world will be trivially easy to crack.<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">Quantum computing is radically different to the \u201cclassical\u201d computing used today. Instead of processing binary bits which exist in one of two states \u2013 one or zero, on or off \u2013 quantum computing uses qubits, which can exist in multiple states, or superpositions.<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">\u201cThe reason why it&#8217;s so powerful is because you&#8217;re doing all those possible computations simultaneously,\u201d Prof Nishanth Sastry, director of research for computer science at the University of Surrey, explains. This means it&#8217;s \u201cmuch, much more efficient, much, much more powerful.\u201d<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">This means quantum systems offer the possibility of solving key problems that are beyond classical computers, is areas such as medical research and materials science, or cracking particularly complex mathematical problems.<!-- --><\/p>\n<\/div>\n<div data-component=\"text-block\" class=\"sc-18fde0d6-0 dlWCEZ\">\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">The problem is some of those same mathematical problems underpin the encryption algorithms that help to ensure trust, confidentiality and privacy across today\u2019s computer networks.<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">Today\u2019s computers would take thousands, even millions of years, to crack current encryption standards, such as RSA. A suitably powerful quantum computer could, theoretically, do the job in minutes.<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">This has implications for everything from electronic payments and ecommerce to satellite communications. \u201cAnything that&#8217;s protected by something that&#8217;s vulnerable becomes fair game for people that have access to quantum relevant computers,\u201d says Jon France, chief information security officer at non-profit cybersecurity organization ISC2.<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">Quantum computers capable of breaking asymmetric encryption are thought to be years away.<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">But progress is being made.<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">In December, <!-- --><a target=\"_self\" href=\"https:\/\/www.bbc.co.uk\/news\/articles\/c791ng0zvl3o\" class=\"sc-c9299ecf-0 bZUiKB\" rel=\"noopener\">Google said its new quantum chip<!-- --><\/a> incorporates key &#8220;breakthroughs&#8221; and &#8220;paves the way to a useful, large-scale quantum computer&#8221;.<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">Some estimates say a quantum device capable of breaking current encryption would require 10,000 qubits, while others say millions would be needed. Today\u2019s systems have a few hundred at most.<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">But businesses and governments face a problem right now, as attackers could harvest encrypted information and decrypt it later when they do gain access to suitably powerful devices.<!-- --><\/p>\n<\/div>\n<figure>\n<div data-component=\"image-block\" class=\"sc-18fde0d6-0 jFCfG\">\n<div data-testid=\"image\" class=\"sc-a34861b-1 jxzoZC\"><img src=\"https:\/\/www.bbc.com\/bbcx\/grey-placeholder.png\" class=\"sc-a34861b-0 cOpVbP hide-when-no-script\"\/><img sizes=\"(min-width: 1280px) 50vw, (min-width: 1008px) 66vw, 96vw\" srcset=\"https:\/\/ichef.bbci.co.uk\/news\/240\/cpsprodpb\/77c7\/live\/290e89c0-bd1b-11ef-a076-5dfcdbd8d0db.jpg.webp 240w,https:\/\/ichef.bbci.co.uk\/news\/320\/cpsprodpb\/77c7\/live\/290e89c0-bd1b-11ef-a076-5dfcdbd8d0db.jpg.webp 320w,https:\/\/ichef.bbci.co.uk\/news\/480\/cpsprodpb\/77c7\/live\/290e89c0-bd1b-11ef-a076-5dfcdbd8d0db.jpg.webp 480w,https:\/\/ichef.bbci.co.uk\/news\/640\/cpsprodpb\/77c7\/live\/290e89c0-bd1b-11ef-a076-5dfcdbd8d0db.jpg.webp 640w,https:\/\/ichef.bbci.co.uk\/news\/800\/cpsprodpb\/77c7\/live\/290e89c0-bd1b-11ef-a076-5dfcdbd8d0db.jpg.webp 800w,https:\/\/ichef.bbci.co.uk\/news\/1024\/cpsprodpb\/77c7\/live\/290e89c0-bd1b-11ef-a076-5dfcdbd8d0db.jpg.webp 1024w,https:\/\/ichef.bbci.co.uk\/news\/1536\/cpsprodpb\/77c7\/live\/290e89c0-bd1b-11ef-a076-5dfcdbd8d0db.jpg.webp 1536w\" src=\"https:\/\/ichef.bbci.co.uk\/news\/480\/cpsprodpb\/77c7\/live\/290e89c0-bd1b-11ef-a076-5dfcdbd8d0db.jpg.webp\" alt=\"Google Close up of Google's quantum computer chip called Willow\" class=\"sc-a34861b-0 efFcac\"\/><span class=\"sc-a34861b-2 fxQYxK\">Google<\/span><\/div>\n<\/div>\n<p><figcaption class=\"sc-8353772e-0 cvNhQw\">Google&#8217;s says its new computer chip brings useful quantum computers closer<!-- --><\/figcaption><\/p>\n<\/figure>\n<div data-component=\"text-block\" class=\"sc-18fde0d6-0 dlWCEZ\">\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">Greg Wetmore, vice president for software development at security firm Entrust, says if such devices could emerge in the next decade, technology leaders need to ask, \u201cWhat data in your organization is valuable for that period of time?\u201d<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">That could be national security information, personal data, strategic plans, and intellectual property and secrets &#8211; think of a soft drink company\u2019s \u201csecret\u201d formula or the precise balance of herbs and spices in a fast food recipe.<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">Mr France adds, if quantum computing becomes widespread, the threat becomes more immediate with the encryption that protects our daily banking transactions, for example, potentially trivial to break.<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">The good news is that researchers and the technology industry have been working on solutions to the problem. In August, the National Institute of Standards and Technology in the US released three post quantum encryption standards.<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">The agency said these would \u201csecure a wide range of electronic information, from confidential email messages to e-commerce transactions that propel the modern economy.\u201d It is encouraging computer system administrators to transition to the new standards as soon as possible, and said a further 18 algorithms are being evaluated as backup standards.<!-- --><\/p>\n<\/div>\n<figure>\n<div data-component=\"image-block\" class=\"sc-18fde0d6-0 jFCfG\">\n<div data-testid=\"image\" class=\"sc-a34861b-1 jxzoZC\"><img src=\"https:\/\/www.bbc.com\/bbcx\/grey-placeholder.png\" class=\"sc-a34861b-0 cOpVbP hide-when-no-script\"\/><img sizes=\"(min-width: 1280px) 50vw, (min-width: 1008px) 66vw, 96vw\" srcset=\"https:\/\/ichef.bbci.co.uk\/news\/240\/cpsprodpb\/8aed\/live\/c9e65d30-bd22-11ef-a076-5dfcdbd8d0db.jpg.webp 240w,https:\/\/ichef.bbci.co.uk\/news\/320\/cpsprodpb\/8aed\/live\/c9e65d30-bd22-11ef-a076-5dfcdbd8d0db.jpg.webp 320w,https:\/\/ichef.bbci.co.uk\/news\/480\/cpsprodpb\/8aed\/live\/c9e65d30-bd22-11ef-a076-5dfcdbd8d0db.jpg.webp 480w,https:\/\/ichef.bbci.co.uk\/news\/640\/cpsprodpb\/8aed\/live\/c9e65d30-bd22-11ef-a076-5dfcdbd8d0db.jpg.webp 640w,https:\/\/ichef.bbci.co.uk\/news\/800\/cpsprodpb\/8aed\/live\/c9e65d30-bd22-11ef-a076-5dfcdbd8d0db.jpg.webp 800w,https:\/\/ichef.bbci.co.uk\/news\/1024\/cpsprodpb\/8aed\/live\/c9e65d30-bd22-11ef-a076-5dfcdbd8d0db.jpg.webp 1024w,https:\/\/ichef.bbci.co.uk\/news\/1536\/cpsprodpb\/8aed\/live\/c9e65d30-bd22-11ef-a076-5dfcdbd8d0db.jpg.webp 1536w\" src=\"https:\/\/ichef.bbci.co.uk\/news\/480\/cpsprodpb\/8aed\/live\/c9e65d30-bd22-11ef-a076-5dfcdbd8d0db.jpg.webp\" alt=\"Getty Images An aerial shots of the round ponds of a water treatment plant.\" class=\"sc-a34861b-0 efFcac\"\/><span class=\"sc-a34861b-2 fxQYxK\">Getty Images<\/span><\/div>\n<\/div>\n<p><figcaption class=\"sc-8353772e-0 cvNhQw\">Critical infrastructure like water treatment plants will need security upgrades<!-- --><\/figcaption><\/p>\n<\/figure>\n<div data-component=\"text-block\" class=\"sc-18fde0d6-0 dlWCEZ\">\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">The problem is this means a massive upgrade process touching virtually all our technology infrastructure.<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">\u201cIf you think about the number of things out there with asymmetric encryption in them, it&#8217;s billions of things. We&#8217;re facing a really big change problem,\u201d says Mr France.<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">Some digital infrastructure will be relatively easy to upgrade. Your browser, for example, will simply receive an update from the vendor says Mr France. \u201cThe challenge really comes in discrete devices and the internet of things (IOT),\u201d he continues.<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">These might be hard to track down, and geographically inaccessible. Some equipment \u2013 legacy devices in critical national infrastructure such as water systems, for example \u2013 might not be powerful enough to handle the new encryption standards.<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">Mr Wetmore says the industry has managed encryption transitions in the past, but \u201cIt&#8217;s the sharper discontinuity that makes this threat more serious.\u201d<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">So, it is trying to help customers build \u201ccrypto agility\u201d by setting out policies now and using automation to identify and manage their cryptographic assets. \u201cThat&#8217;s the secret to making this transition an orderly one and not a chaotic one.\u201d<!-- --><\/p>\n<\/div>\n<div data-component=\"text-block\" class=\"sc-18fde0d6-0 dlWCEZ\">\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">And the challenge extends into space. Prof Sastry says many satellites \u2013 such as the Starlink network \u2013 should be relatively straightforward to upgrade, even if it means briefly taking an individual device offline temporarily.<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">\u201cAt any given point in time, especially with the LEO (low earth orbit) satellites, you&#8217;ve got 10 to 20 satellites above your head,\u201d Prof Sastry says. \u201cSo, if one can&#8217;t serve you, well so what? There are nine others that can serve you.\u201d<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">More challenging, he says, are \u201cremote sensing\u201d satellites, which include those used for geographical or intelligence purposes. These carry a lot more compute power on board and typically include some sort of secure computing module. A hardware upgrade effectively means replacing the whole device. However, says Prof Sastry, this is now less of a problem thanks to more frequent and lower cost satellite launches.<!-- --><\/p>\n<\/div>\n<div data-component=\"text-block\" class=\"sc-18fde0d6-0 dlWCEZ\">\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">While the impact of the millennium bug might have been minimal in the first days of 2000, that&#8217;s because an immense amount of work had gone into fixing it ahead of a known deadline, says Fran\u00e7ois Dupressoir, associate professor in cryptography at the University of Bristol.<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">By contrast, he adds, that it is not possible to predict when current encryption will become vulnerable.<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">&#8220;With cryptography,&#8221; says Mr Dupressoir &#8220;If somebody breaks your system, you will only know once they&#8217;ve got your data.&#8221;<!-- --><\/p>\n<\/div>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/www.bbc.com\/news\/articles\/cpq9zxxn72qo\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Joe Fay Technology Reporter Google Many organisations are developing quantum computers Twenty five years ago computer programmers were racing to fix the millennium bug amidst fears that it would cause banking systems to crash and planes to fall out of the sky. Much to everyone&#8217;s relief the impact turned out to be minimal. Today, some [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":49358,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[53],"tags":[13969,6141,5797,8540,3927],"_links":{"self":[{"href":"https:\/\/kede.com.br\/news\/wp-json\/wp\/v2\/posts\/49357"}],"collection":[{"href":"https:\/\/kede.com.br\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kede.com.br\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kede.com.br\/news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kede.com.br\/news\/wp-json\/wp\/v2\/comments?post=49357"}],"version-history":[{"count":1,"href":"https:\/\/kede.com.br\/news\/wp-json\/wp\/v2\/posts\/49357\/revisions"}],"predecessor-version":[{"id":49359,"href":"https:\/\/kede.com.br\/news\/wp-json\/wp\/v2\/posts\/49357\/revisions\/49359"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kede.com.br\/news\/wp-json\/wp\/v2\/media\/49358"}],"wp:attachment":[{"href":"https:\/\/kede.com.br\/news\/wp-json\/wp\/v2\/media?parent=49357"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kede.com.br\/news\/wp-json\/wp\/v2\/categories?post=49357"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kede.com.br\/news\/wp-json\/wp\/v2\/tags?post=49357"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}