{"id":45241,"date":"2013-06-18T14:44:59","date_gmt":"2013-06-18T18:44:59","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/"},"modified":"2021-08-16T22:17:02","modified_gmt":"2021-08-17T02:17:02","slug":"startup-taps-quantum-encryption-for-cybersecurity-2","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/startup-taps-quantum-encryption-for-cybersecurity-2\/","title":{"rendered":"Quantum Encryption for Grid Security"},"content":{"rendered":"<p class=\"intro\"><a href=\"https:\/\/web.archive.org\/web\/20240118202054\/https:\/\/wikibon.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-103105\" title=\"Quantum Encryption for Grid Security\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/quantum_network.jpg?resize=126%2C92&#038;ssl=1\" alt=\"Quantum Encryption for Grid Security\" width=\"126\" height=\"92\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/quantum_network.jpg?resize=150%2C110&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/quantum_network.jpg?resize=75%2C55&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/quantum_network.jpg?w=262&amp;ssl=1 262w\" sizes=\"auto, (max-width: 126px) 100vw, 126px\" \/><\/a>Vulnerabilities in the national grids and the potential for wide-scale outages have raised concerns over the past few years as high-profile companies have gone public with highly advanced hacking attempts. <a title=\"MIT\" href=\"http:\/\/web.mit.edu\/\" target=\"_blank\" rel=\"noopener noreferrer\">MIT<\/a>&#8216;s <a title=\"Technology Review\" href=\"http:\/\/www.technologyreview.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Technology Review<\/em><\/a> <a title=\"Startup Taps Quantum Encryption for Cybersecurity\" href=\"https:\/\/web.archive.org\/web\/20150910072244\/http:\/\/www.technologyreview.com\/view\/514586\/startup-taps-quantum-encryption-for-cybersecurity\/\" target=\"_blank\" rel=\"noopener noreferrer\">reported<\/a> on <a title=\"GridCOM Technologies\" href=\"http:\/\/web.archive.org\/web\/20130826155732\/http:\/\/gridcomtechnologies.com:80\/\" target=\"_blank\" rel=\"noopener noreferrer\">GridCOM Technologies<\/a>, a startup that recently secured seed funding from <a title=\"Ellis Energy Investment\" href=\"https:\/\/web.archive.org\/web\/20190919072247\/http:\/\/ellisenergyinvestments.com:80\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ellis Energy Investment<\/a> which\u00a0says <strong>quantum cryptography<\/strong> can make the <strong><a title=\"Electrical grid\" href=\"http:\/\/en.wikipedia.org\/wiki\/Electrical_grid\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">electricity grid<\/a><\/strong> control systems secure.<\/p>\n<h3>Quantum cryptography<\/h3>\n<p><span style=\"line-height: 1.538em;\"><a href=\"https:\/\/web.archive.org\/web\/20230127173259\/https:\/\/www.nasa.gov\/vision\/earth\/technologies\/23jan_entangled.html\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-119833 size-medium\" title=\"Quantum entanglement\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/entanglement.jpg?resize=150%2C89&#038;ssl=1\" alt=\"Quantum entanglement\" width=\"150\" height=\"89\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/entanglement.jpg?resize=150%2C89&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/entanglement.jpg?resize=75%2C45&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/entanglement.jpg?w=281&amp;ssl=1 281w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a><a title=\"Dr. Duncan Earl the chief technology officer of GridCOM\" href=\"http:\/\/web.archive.org\/web\/20130828092543\/http:\/\/gridcomtechnologies.com:80\/about-us\/\" target=\"_blank\" rel=\"noopener noreferrer\">Dr. Duncan Earl<\/a> the chief technology officer of <\/span><strong><span style=\"line-height: 1.538em;\">GridCOM Technologies<\/span><\/strong><span style=\"line-height: 1.538em;\"> told <em>TR<\/em> he plans to use the start-up money to build a prototype <a href=\"http:\/\/en.wikipedia.org\/wiki\/Quantum_key_distribution\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">quantum encryption<\/a> system designed specifically for the electricity grid. The company\u2019s hope is to show a working system working next year near its home base in <a title=\"San Diego\" href=\"http:\/\/maps.google.com\/maps?ll=32.715,-117.1625&amp;spn=0.1,0.1&amp;q=32.715,-117.1625 (San%20Diego)&amp;t=h\" target=\"_blank\" rel=\"geolocation noopener noreferrer\">San Diego<\/a>. Utilities would pay about <strong>$50 a month for access<\/strong> to a software service and hardware that encrypt critical communications in an area.<\/span><\/p>\n<p><span style=\"line-height: 1.538em;\">With <a title=\"GridCOM Technologies\" href=\"http:\/\/investing.businessweek.com\/research\/stocks\/private\/snapshot.asp?privcapid=237566060\" target=\"_blank\" rel=\"noopener noreferrer\">GridCOM Technologies<\/a>, Dr. Earl is trying to make critical infrastructure more <\/span><span style=\"line-height: 1.538em;\">secure by encrypting data sent to grid control systems. The article explains that traditional encryption techniques can\u2019t work at the low latency speeds\u2014measured in milliseconds\u2013required for <strong><a title=\"SCADA\" href=\"http:\/\/en.wikipedia.org\/wiki\/SCADA\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">SCADA<\/a> systems<\/strong>, which leaves them vulnerable to attack. CTO Earl is an expert in optical technologies who worked for the <a title=\"The Cyberspace Sciences and Information Intelligence Research (CSIIR) Group\" href=\"https:\/\/web.archive.org\/web\/20161115042435\/http:\/\/www.ioc.ornl.gov\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cyberspace Sciences and Information Intelligence Research<\/a> group at <a title=\"Oak Ridge National Laboratory\" href=\"https:\/\/www.ornl.gov\/\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">Oak Ridge National Laboratory<\/a> and helped spin out an\u00a0<a href=\"http:\/\/news.cnet.com\/Let-there-be-light%2C-optical-cables-included\/2100-11395_3-6110671.html\" target=\"_blank\" rel=\"noopener noreferrer\">optical lighting company in 2006<\/a>.<\/span><\/p>\n<h3>Quantum entanglement<\/h3>\n<p><a href=\"http:\/\/seuss.wikia.com\/wiki\/Thing_One_and_Thing_Two\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-103107\" title=\"twin photons\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Thing1-and-thing2.jpg?resize=102%2C110&#038;ssl=1\" alt=\"twin photons\" width=\"102\" height=\"110\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Thing1-and-thing2.jpg?resize=139%2C150&amp;ssl=1 139w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Thing1-and-thing2.jpg?resize=70%2C75&amp;ssl=1 70w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Thing1-and-thing2.jpg?w=180&amp;ssl=1 180w\" sizes=\"auto, (max-width: 102px) 100vw, 102px\" \/><\/a>GridCOM Technology\u2019s system works by generating two photons using a laser and storing them in <strong><a title=\"Optical fiber cable\" href=\"http:\/\/en.wikipedia.org\/wiki\/Optical_fiber_cable\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">optical fiber cables<\/a><\/strong>.\u00a0These <strong>twin photons<\/strong> each have an opposition polarization\u2014either a wave oscillating up and down or left and right, Dr. Duncan explained to the author, <a title=\"Martin LaMonica\" href=\"http:\/\/www.technologyreview.com\/contributor\/martin-lamonica\/\" target=\"_blank\" rel=\"noopener noreferrer\">Martin LaMonica<\/a>. According to <strong>quantum mechanics<\/strong>, if one tries to measure these photons, it will change the state of the other and the photons are no longer \u201centangled.\u201d This phenomenon allows a communications system to detect if a message has been intercepted.<\/p>\n<p>According to the article, the firm\u2019s service would create an <strong>encryption key<\/strong> based on the arrangement of the <strong>photon pair<\/strong>. A hardware receiver posts that information on the Internet and the company\u2019s hosted software will poll those devices. A subscriber to the service will be able to confirm that communications haven\u2019t been tampered with and encrypt messages, Mr. Duncan says. \u201cYou\u2019ve got physics that is ultimately securing the device, not mathematics. Mathematical complexity has been a great tool for encryption but it\u2019s not future proof,\u201d he told <em>TR<\/em>.<\/p>\n<p>GridCOM&#8217;s Duncan says a key advantage of the system, is that it works quickly, a necessity for <a title=\"SCADA\" href=\"https:\/\/web.archive.org\/web\/20131227124638\/http:\/\/searchcio-midmarket.techtarget.com:80\/definition\/SCADA\" target=\"_blank\" rel=\"noopener noreferrer\">SCADA<\/a> systems. \u201c<em>You\u2019ve eliminated the possibility of somebody <strong>eavesdropping to hack the key<\/strong>. There\u2019s no data latency and you\u2019ve leveraged a random bit stream &#8230; That\u2019s really all the grid needs.<\/em>\u201d<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/figure\/BB84-protocol-basic-scheme_fig11_309731586\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-119834\" title=\"Quantum Encryption \" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/QDK.jpg?resize=350%2C213&#038;ssl=1\" alt=\"Quantum Encryption \" width=\"350\" height=\"213\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/QDK.jpg?resize=150%2C91&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/QDK.jpg?resize=75%2C46&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/QDK.jpg?resize=768%2C467&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/QDK.jpg?w=850&amp;ssl=1 850w\" sizes=\"auto, (max-width: 350px) 100vw, 350px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3>Limitations<\/h3>\n<p>One of the main limitations is that the cryptography is only <strong>point-to-point<\/strong> over a fiber cable and can\u2019t work across switching equipment over the Internet. In GridCOM Technology\u2019s case, the system is limited to <strong>20 kilometers<\/strong> in distance. GridCOM&#8217;s CTO envisions that utilities will put a series of hardware receivers in secured buildings to encrypt communications for a whole region. There are already a number of efforts to build commercial <a title=\"quantum cryptography\" href=\"http:\/\/searchsecurity.techtarget.com\/definition\/quantum-cryptography\" target=\"_blank\" rel=\"noopener noreferrer\">quantum encryption<\/a> systems <a title=\"GigaOm\" href=\"http:\/\/gigaom.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>GigaOm<\/em><\/a> <a title=\"Government lab demonstrates stealth quantum security project\" href=\"https:\/\/web.archive.org\/web\/20211021073202\/https:\/\/gigaom.com\/2013\/05\/06\/government-lab-demonstrates-stealth-quantum-security-project\/\" target=\"_blank\" rel=\"noopener noreferrer\">reported<\/a> on the success that the scientists at <a title=\"Los Alamos National Lab: National Security Science\" href=\"https:\/\/www.lanl.gov\/\" target=\"_blank\" rel=\"noopener noreferrer\">Los Alamos<\/a> have had running a quantum network for over two years and <a title=\" ID Quantique\" href=\"http:\/\/www.idquantique.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">ID Quantique<\/a> in Switzerland.<\/p>\n<p><em>TR<\/em> concludes that quantum encryption offers one promising route to securing the grid, but it shouldn\u2019t be seen as a silver bullet. If it works, it would address one very specific application but securing something as complex as the power grid requires a full suite of options and above all good security practices.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20170309191040\/http:\/\/www.pcmag.com:80\/slideshow\/story\/261776\/albert-einstein-seven-things-you-didn-t-know\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-103109\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/albert_einstein.jpg?resize=150%2C107&#038;ssl=1\" alt=\"\" width=\"150\" height=\"107\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/albert_einstein.jpg?resize=150%2C107&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/albert_einstein.jpg?resize=75%2C54&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/albert_einstein.jpg?w=350&amp;ssl=1 350w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a><a title=\"Smart Grid Today\" href=\"https:\/\/web.archive.org\/web\/20230511171133\/http:\/\/smartgridtoday.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Smart Grid Today<\/em><\/a> provides (PDF) some background. <a title=\"Einstein Got It Wrong, Can You Do Better?\" href=\"https:\/\/www.science20.com\/hammock_physicist\/einstein_got_it_wrong_can_you_do_better-85544\" target=\"_blank\" rel=\"noopener noreferrer\">Quantum physics<\/a> was first described in a 1935 paper that included <strong><a title=\"Albert Einstein\" href=\"https:\/\/web.archive.org\/web\/20240408235633\/https:\/\/einstein.biz\/\" target=\"_blank\" rel=\"noopener noreferrer\">Albert Einstein<\/a><\/strong> as an author. <a title=\"The Nobel Prize in Physics 1933\" href=\"http:\/\/www.nobelprize.org\/nobel_prizes\/physics\/laureates\/1933\/schrodinger-bio.html\" target=\"_blank\" rel=\"noopener noreferrer\">Erwin Schr\u00f6dinger<\/a> coined the quantum term <strong>&#8220;entanglement&#8221;<\/strong> and that was the basis for his famous thought experiment of a <a title=\"Schr\u00f6dinger's cat\" href=\"http:\/\/youtu.be\/HCOE__N6v4o\" target=\"_blank\" rel=\"noopener noreferrer\">cat<\/a> that exists simultaneously in a state of being alive and dead.<\/p>\n<p><strong><a title=\"CERN\" href=\"http:\/\/home.web.cern.ch\/\" target=\"_blank\" rel=\"noopener noreferrer\">CERN<\/a><\/strong> to prove quantum entanglement, utterly confounding Einstein\u2019s theory of relativity because now information can be transmitted not at or below the speed of light, but literally instantaneously.<\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"https:\/\/web.archive.org\/web\/20140314082633\/http:\/\/www.wired.com:80\/wiredscience\/2013\/06\/quantum-cryptography-hack\" target=\"_blank\" rel=\"noopener noreferrer\">Laws of Physics Say Quantum Cryptography Is Unhackable. It&#8217;s Not<\/a> (wired.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>GridCOM plans to protect the electrical grid by using quantum entanglement to encrypt M2M communications between SCADA devices<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3044,3071,1233,824,1674,3082,1673,941,4],"class_list":["post-45241","post","type-post","status-publish","format-standard","hentry","category-security","tag-3044","tag-einstein","tag-electrical-grid","tag-encryption","tag-gridcom-technologies","tag-quantum-computing","tag-quantum-key-distribution","tag-scada","tag-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/45241","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=45241"}],"version-history":[{"count":23,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/45241\/revisions"}],"predecessor-version":[{"id":131625,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/45241\/revisions\/131625"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=45241"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=45241"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=45241"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}