COMMENT

Should critical infrastructure be protected from experimental quantum computers?

Quantum computing is an extremely promising innovation of the future, but like every new technology, comes with associated risks. 

Fully capitalising upon its potential will require a genuine effort on behalf of governing bodies to ensure that society has the right safeguards in place prior to fully embracing the technology. In this article, we'll explore some of the potential risks posed by quantum computing, as well as a few ways organisations and governments can prepare for the fluid landscape that lies ahead.

What is Quantum Computing?

Quantum computing is a field of computer science that uses the principles of quantum mechanics to process information. Quantum computers use qubits (quantum bits) instead of traditional bits to store and process information. Qubits can represent multiple values at the same time, allowing them to process data much faster than traditional computers. This makes them ideal for solving complex problems that require large amounts of data to be processed, such as research in artificial intelligence, cryptography, and optimization.

Quantum computers are ideal for solving complex problems that require large amounts of data to be processed, such as research in artificial intelligence, cryptography, and optimization.

Quantum Computing and public infrastructure: What's the risk?

The adage 'with great power comes great responsibility' isn't just relevant to the plights of superheroes - it's also applicable to the world of quantum computing. With quantum computers promising to revolutionise many aspects of our lives, from medicine to finance and global security, the potential for misuse of the technology is a pressing concern.


In a recent joint article with cyber leaders from Deloitte, The World Economic Forum cited quantum computing as a powerful yet dangerous tool that "could have severe consequences" on common activities within our day-to-day lives. The independent and international organisation highlighted particular concern around encryption and how new technologies might be able to break current security standards in sensitive industries.

Any organisation with information that will remain valuable five to 15 years from now is vulnerable to a Quantum Computing backed attack.

The Forum noted that public infrastructure, such as healthcare and transportation networks, are particularly vulnerable to the potential of quantum computing threats. These are services that are essential to our lives, and therefore prime targets for malicious actors who are looking to exploit weaknesses in their security.


But things go beyond public-facing infrastructure; experts say that any organisation with information that will remain valuable five to 15 years from now is vulnerable to a quantum computing backed attack, and should take steps to mitigate its data exposure.


This includes industries such as finance, legal services, and government bodies who store information for extended periods of time. In short, any organisation that holds sensitive data is at risk of a quantum computing breach if they don't take action now.


Some people dismiss this call to bolster cybersecurity infrastructure as premature. After all, quantum computing still remains in developmental and experimental stages. Researchers have varying timelines for the full realisation of the technology's capabilities - which range from the near future to decades away.

There are a number of strategies criminals can use today to exploit infrastructure, as well as a potential for 'harvest now, decrypt later' attacks that can harvest data now and decrypt it later when Quantum Computing is available.

But experts agree that we won't have to wait until technology advances further for these threats to become serious.


It's not really a matter of when quantum computers might be stable and capable enough to affect existing encryption systems, but the relative risk of that possibility overall. There are a number of strategies criminals can use today to exploit infrastructure, as well as a potential for 'harvest now, decrypt later' attacks that can harvest data now and decrypt it later when quantum computing is available.


Really, the fact that the capabilities of quantum computing could exist at all in the future means that there's a risk for information that is now considered 'safe' to become vulnerable. That alone is enough of a warning that now is the time to start preparing for potential quantum computing attacks in the future.

Protecting critical infrastructure from Quantum Computers

Given what we know now, it's no longer a question of whether critical infrastructure 'should' be protected from experimental quantum computers, but 'how'. And the answer to that is multifaceted. There are a number of things both governing bodies and organisations can do to prepare for a quantum computing-enabled future, including:


Investing in quantum-safe skill sets


One of the most important things societies can do to prepare for quantum computing is to invest in skill sets that will best position us for a future where the technology is widely adopted.


Many higher education institutions have begun offering advanced degrees in quantum computing, and tech giants such as Google and Microsoft have begun investing heavily in the field. Organisations should consider taking advantage of these resources to better understand and prepare for potential quantum-enabled attacks.

Leverage government policy and power


Governments are one of the most powerful tools we have at our disposal when it comes to slowing, and even reframing the development of emerging technologies like quantum computing. Their ability to implement policies can be useful in ensuring digitally enabled infrastructure remains safe from malicious actors.


For example, governments can implement regulations that require organisations to take specific steps to ensure the security of their digital infrastructure, such as investing in quantum-safe tools and technologies. They can also use their approval, planning, procurement and funding powers to ensure that infrastructure any being built is designed with quantum security in mind.

Organisations should be investing in quantum-resistant algorithms and technologies, such as lattice-based cryptography and post-quantum encryption, or exploring alternative storage solutions, such as quantum-resistant distributed ledgers.

Organisations should be investing in quantum-resistant algorithms and technologies, such as lattice-based cryptography and post-quantum encryption, or exploring alternative storage solutions, such as quantum-resistant distributed ledgers.

Develop quantum-safe solutions


Organisations should also be investing in and developing their own quantum-safe solutions. This could include investing in quantum-resistant algorithms and technologies, such as lattice-based cryptography and post-quantum encryption, or exploring alternative storage solutions, such as quantum-resistant distributed ledgers.


Quantum Key Distribution (QKD) is also an emerging technology that should be explored, as it can provide secure and unbreakable communication links between two parties.

Quantum computing is a reminder for all of us that the security choices we make today can indeed have an impact on the losses of tomorrow. As technology advances, it's likely that those who erred on the side of caution the most, will benefit the most, in the long run. It's important for organisations and governments to understand this reality, and take steps now to prepare for a quantum-enabled future. Doing so can help minimise potential security risks and ensure the safety of our digital infrastructure for years to come.

Share this article