Protecting Powerlines And Pipelines: The Quantum Solution – Forbes

America dodged a major cyber bullet this past weekend, although the end-result of the ransomware attack on the Colonial Pipeline has been disruptive enough, producing economic shock across the country and gas lines in the Northeast.

Still, if the still-unidentified hackers had wanted to break into the technology operating the pipeline, instead of looking for easy blackmail money; the attack could have been catastrophic with effects lasting for months, even years. Instead, operators shut down the pipeline themselves to prevent such an occurrence from happening: a clear admission of how vulnerable our energy grid is, just like our power grid, even after a decade or more of warnings.

Taken together with the weather-related Texas power outage I wrote about in this space more than a month ago, the pipeline attack is a clear and present warningwith trillions of dollars in losses at stake. Unless we get serious about protecting our power and energy infrastructure, attacks like this weekends will become more disastrous and more disruptive, until we face the worst of alla future quantum computer attack that breaks the back of the entire United States economy.

FILE: A Colonial Pipeline Co. sign at the Pelham junction and tank farm in Pelham, Alabama, U.S., on ... [+] Monday, Sept. 19, 2016. Fuel suppliers are growing increasingly nervous about the possibility of gasoline and diesel shortages across the eastern U.S. almost two days after a cyberattack knocked out a massive pipeline. Colonial Pipeline said on Sunday, May 9, 2021, that it was still developing a plan for restarting the nations largest fuel pipeline -- a critical source of supply for the New York region -- and would only bring it back when safe to do so, and in full compliance with the approval of all federal regulations. Photographer: Luke Sharrett/Bloomberg

The government says it is really committed to action this time.But weve been here before.In 2007 we had the sweeping cyberattack on the U.S. government, including the Defense Department; an attack so comprehensive that I and others dubbed it a Cyber Pearl Harbor.More recently we had the hacking raid on OPM in 2015, affecting the records of at least 20 million federal employees.That was followed by the revelations about the Solar Winds hacks last year.

Yet here we are, still vulnerable, still exposed.Its as if after the bombs were dropped on Pearl Harbor that Sunday morning in December 1941, Americans had read about the crippling of the U.S. fleet, then rolled over and went back to sleep.

Sleeping through cyber disasters is no longer an option.Fortunately, the emerging technologies of the quantum revolution offer solutions both long-term and short-term to our worst infrastructure threatsincluding a future quantum computer attack itself.

The first solution are software algorithms that are specifically designed to protect against future quantum computer assault.Under the rubric of post-quantum cryptography (PQC), these algorithms are also insurance against conventional cyberattacks. At the National Institute of Standards and Technology (NIST) scientists and engineers are diligently preparing national standards for PQC, which are slated to be finished by 2024 and will then be ready to deploy to protect all public encryption. These algorithms will be eagerly awaited since they will provide protection against classical hackers, as wellindeed there are companies like Canadas ISARA Corp. which have been deploying PQC algorithms already.

The second quantum solution is even closer at hand.It uses the same scientific phenomenon that makes quantum computing possiblethe entanglement of sub-atomic particlesto provide hack-proof keys for communication between end-to-end users.

Some of these quantum-based cryptographic systems use quantum random number generators to produce quantum encryption keys.Another company, Qubitekk, produces entangled photons to generate identical symmetric keys at both ends of the communication link. In either case any unauthorized intrusion into the communication immediately severs the linkand everyone knows instantly theres been an attack.

Operator at work place in the system control room

These quantum-based solutions are especially suited for the Supervisory Control and Data Acquisition (SCADA) systems that control and monitor field devices from a central command center.Utilities and infrastructure companies have used SCADA for years to administer power stations and pipelines.These rely heavily on point-to-point communications for their operations, while communication protocols continually transfer data from sensors to SCADA servers, and back to the sensors.Quantum-based cryptography can offer tamper-proof protections for these protocols.Scientists at both at Oak Ridge Laboratories and Los Alamos have been working on quantum key distribution (QKD) capabilities to secure the energy sector. A range of American and European companies have successfully deployed similar quantum key networks for their clients.

Taken together, then, quantum solutions can secure systems now and in the future against quantum computer attacks.It simply doesnt make sense to spend billions on classical cyber protections that will be obsolete in 3-4 years as hackers inevitably find their way around those safeguards, instead of investing in quantum-based hack-proof protections that will last for decades.

Thanks to our on-going cyber vulnerabilities, America has become like a bank vault with the door wide open.Were simply inviting attackers, and when a truly determined predator like Russia or China steps in, it could mean ruin for the U.S. economy, not just for a few months or a year, but for good.Quantum technology may not offer all the answers, but it may be the ultimate firewall weve all been waiting forand that state and non-state hackers have been hoping we wouldnt discover.

Read the original here:
Protecting Powerlines And Pipelines: The Quantum Solution - Forbes

Related Posts

Comments are closed.