Techno

Will quantum computers disrupt critical infrastructure?

Joe Fi

Technology correspondent

Google works as an engineer on a portion of the quantum computer.Google

Many organizations are developing quantum computers

Twenty -five years ago, the computer programmer had been racing to repair the millennium insect amid fears that it would cause banking systems and aircraft from the sky.

A lot to relax everyone The effect turned into a minimum.

Today, there is some fear of a new decisive threat to digital infrastructure in the world. But this time, we cannot predict exactly the date of moving from theory to reality, while the spread of digital technology means fixing the problem more complicated.

This is because the arrival of quantum computing means that many encryption algorithms that support and secure our excessive world will be very easy.

Quantum computing is radically different from the “classic” computing used today. Instead of treating the bilateral bits in one of the two countries – one, zero, or outside or stopping – the quantum computing is used, which can be found in multiple cases, or overcoming.

“The reason is that it’s very strong is that you are doing all of these possible accounts at the same time,” explains Professor Nishanth Sastir, Director of Research for Computer Science at Sari University. This means it is “much more efficient, much more powerful.”

This means that quantum systems provide the ability to solve major problems that exceed classic computers, or areas such as medical research and material science, or breaking up in particular complex mathematical problems.

The problem is that some of these mathematical problems themselves support encryption algorithms that help ensure confidence, confidence and privacy through computer networks today.

Today, thousands of millions of years will take thousands of years to break the current encryption standards, such as RSA. A strong quantum computer, in theory, can do the task in minutes.

This has effects on everything from electronic payments and e -commerce to satellite communications. John France, chief information security official at the non -profit cybersecurity organization.

Combat computers are believed to be able to break the asymmetric encryption years away.

But progress is made.

In December, Google said the new quantum segment It includes the “breakthrough” key and “puts the road to a large -scale beneficial quantitative computer.”

Some estimates say that the quantum device capable of breaking the encryption of the current requires 10,000 quarter, while others say millions will be needed. Today’s systems have a few hundred at most.

But companies and governments are facing a problem at the present time, as attackers can harvest encrypted information and decipher it later when they can access the strong devices appropriately.

Google is close to the Google quantum computers called WillowGoogle

Google says of the new computer slice that approaches useful quantum computers

“What is the data in this institution in that time period?” Says Greg and Yimour, Vice President of Software Development at the Security Company.

This may be national security information, personal data, strategic plans, intellectual property and secrets – consider the “secret” formula of the soft drink company or the accurate balance of herbs and spices in the recipe of fast food.

Mr. France adds, if the quantum computing becomes widespread, the threat becomes more urgent with the encryption that protects our daily banking transactions, for example, is likely to be broken.

The good news is that researchers and technology industry are working on solutions to the problem. In August, the National Institute for Standards and Technology in the United States issued three quantum encryption standards.

The agency said that “this will secure a wide range of electronic information, from secret email messages to e -commerce transactions that drive the modern economy.” It is the matter of encouraging computer system officials to move to new standards as soon as possible, and he said 18 other algorithms are evaluated as standards for backup.

Getty photos of air footage of the round ponds of the water treatment plant.Gety pictures

Critical infrastructure, such as water treatment plants, will need security promotions

The problem is that this means a huge upgrade process that touches almost all our technology infrastructure.

“If you are thinking about the number of things with asymmetric encryption, it is billions of things. France says:” We are facing a really big change problem. “

It will be relatively easy to upgrade some digital infrastructure. Your browser, for example, will get an update from the seller. The master says France. “The challenge really comes in separate devices and the Internet of Things (IOT),” he continues.

It may be difficult to track, and cannot be reached geographically. Some equipment – old national infrastructure devices such as water systems, for example – may not be strong enough to deal with new encryption standards.

The industry says that the encryption transfers in the past, but “it is a more severe interruption that makes this threat more dangerous.”

Therefore, you are trying to help customers build a “light transparent movement” by setting policies now and using automation to identify and manage their encryption assets. “This is the secret of making this transition organized, not chaotic.”

The challenge extends to space. Professor Squri says that many satellites – such as Starlink – should be relatively clear for upgrade, even if this means in short a single device in a non -communication mode temporarily.

Professor Sacrry says: “At any time, especially with Liu moons (low -Earth orbit), you have 10 to 20 satellites over your head,” says Professor Salater. “So, if one cannot serve you, what is that? There are nine others who can serve you.”

He says that the most challenges are the “remote sensing” satellites, which include those used for geographical purposes or intelligence. This carries a lot of energy on the plane and usually includes a kind of safe computing unit. The upgrade of the devices effectively means replacing the entire device. However, Professor Squaret says, this is now a lower problem thanks to the most common and less expensive satellite launch.

François Dobriswir, assistant professor in Chefir at the University of Bristol, says the effect of the millennial insect may be small in the first days of 2000, because it is a huge amount of work that has been repaired before the well -known deadline.

In contrast, he adds, that the current encryption date cannot be predicted.

“With encryption,” says Mr. Dupressoir, if someone breaks your system, you will only know once you get your data. “

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button