4_quantum crypto
π Digital π Geopolitics
Are we prepared for a cyberpandemic?

Quantum computers : a data security risk ?

with Sophy Caulier, Independant journalist
On March 3rd, 2021 |
3min reading time
Youssef Laarouchi
Youssef Laarouchi
Cybersecurity project manager at EDF R&D
Key takeaways
  • Big companies like EDF are now partnering with the world of academic research to design better cyber-protection systems and anticipate technological change.
  • Nowadays, some computer viruses are capable of evading all forms of detection by firewalls and intrusion detection systems. Companies must now resort to artificial intelligence and machine learning to identify them.
  • New quantum technologies will soon be capable of “breaking” the encryption keys currently used in cryptography. As such, EDF is working on “post-quantum” cryptography techniques to protect its sensitive data.

In order to pro­tect IT, indus­trial and pro­duc­tion sys­tems French ener­gy com­pa­ny, EDF, is conduc­ting advan­ced research stu­dies in cyber­se­cu­ri­ty to explore the full range of inno­va­tions in this area.

“We are pre­pa­ring our­selves for the events that will inevi­ta­bly occur!”, begins Yous­sef Laa­rou­chi, R&D cyber­se­cu­ri­ty pro­ject mana­ger at EDF and part­ner of the Sei­do Lab with Télé­com Paris (IP Paris). To pre­pare for new threats against indus­trial power sys­tems, Yous­sef Laa­rou­chi and his team stu­dy the contri­bu­tion of arti­fi­cial intel­li­gence in detec­tion of pos­sible attacks.

The issue that they are most inter­es­ted in is how people who desi­gn viruses and other mal­ware manage to conceal them and make them increa­sin­gly dif­fi­cult to detect. Not only does mal­ware spread by remai­ning hid­den, they also now pos­sess an advan­ced form of intel­li­gence which allows them to evade the detec­tion of clas­sic pre­ven­tion sys­tems such as intru­sion detec­tion sys­tems, intru­sion pre­ven­tion sys­tems, or firewalls.

To ana­lyse the beha­viour of these mal­wares, the team uses a range of advan­ced tech­no­lo­gies and works in col­la­bo­ra­tion with the aca­de­mic research world. “To improve the detec­tion rate, we use AI algo­rithms and couple weak attack signals to volumes of net­work traf­fic data, for example”, explains Yous­sef Laarouchi.

Data cou­pling was not stu­died much until now. “But today, we have mature AI and machine lear­ning algo­rithms, and most impor­tant­ly ade­quate com­pu­ta­tio­nal power, because these ana­lyses demand sub­stan­tial com­pu­ting time. This makes it pos­sible to conduct inter­es­ting ana­lyses with neu­ral net­works, super­vi­sed machine lear­ning, etc.”

In addi­tion to impro­ving the detec­tion of mal­ware, the team broa­dens its research field to stu­dy new attacks tar­ge­ting the lower layers of phy­si­cal sys­tems. “These mal­wares direct­ly attack the core of the pro­ces­sor by inser­ting a com­mand to gain pri­vi­leges. This type of attack is gene­ral­ly invi­sible to the system’s higher levels”, spe­ci­fies Yous­sef Laarouchi.

Ensu­ring confi­den­tia­li­ty of per­so­nal data is yet ano­ther research sub­ject. Data must be secure when they are trans­fer­red from one place to ano­ther or when they are sto­red on a ser­ver. It is pos­sible to encrypt data, but they must be rea­dable when requi­red. “So, the ques­tion is : how can we use data without seeing and acces­sing them ? This new field of cryp­to­gra­phy is a key issue for an indus­trial com­pa­ny such as EDF. It makes it pos­sible, for example, to offer ser­vices to clients that gua­ran­tee the pro­tec­tion of these data, which must remain private.”

The team also leads stu­dies on quan­tum cryp­to­gra­phy. Future quan­tum acce­le­ra­tors will soon be able to “break” the encryp­tion keys cur­rent­ly in use. “We are pre­pa­ring for this issue by deve­lo­ping and tes­ting new encryp­tion algo­rithms, and by stu­dying cer­tain quan­tum pro­per­ties which we could use in post-quan­tum cryptography.”

This is a cha­rac­te­ris­tic of research in indus­try : it consists of applied research on real data, somew­here bet­ween fun­da­men­tal research and mar­ket solu­tions. The aim is to pro­vide busi­nesses with the tools they need and help to imple­ment them​.To stay up to date with fun­da­men­tal research, EDF par­ti­ci­pates in the Chaire Cyber CNI (cyber­se­cu­ri­ty of cri­ti­cal infra­struc­tures) of the Ins­ti­tut Mines-Télé­com, in part­ner­ship with Télé­com Paris, Télé­com Sud­Pa­ris, the Pôle d’ex­cel­lence cyber de la région Bre­tagne, as well as manu­fac­tu­rers inclu­ding Nokia Bell Labs or Air­bus. “We have com­mon goals, we might as well try to achieve them by wor­king toge­ther!”, concludes Yous­sef Laarouchi.

Chaire Cyber CNI, research to sup­port cri­ti­cal infrastructures 

Cri­ti­cal infra­struc­tures include Ope­ra­tors of Vital Impor­tance (OVI) and Ope­ra­tors of Essen­tial Ser­vices (OES), which account for over 200 govern­ment enti­ties and pri­vate com­pa­nies. Their acti­vi­ties, faci­li­ties and infra­struc­tures are dee­med cri­ti­cal to run the nation State, inclu­ding trans­por­ta­tion, ener­gy, ban­king, food, health, etc. Their infor­ma­tion sys­tems are sub­ject to a par­ti­cu­lar atten­tion from the Agence natio­nale de la sécu­ri­té des sys­tèmes d’in­for­ma­tion (ANSSI, Natio­nal Agen­cy for the Secu­ri­ty of Infor­ma­tion Sys­tems) that assists them in secu­ring their sen­si­tive systems.

They also bene­fit from research stu­dies led in dif­ferent ins­ti­tu­tions, such as the Chaire CNI, dedi­ca­ted to the cyber­se­cu­ri­ty of cri­ti­cal infra­struc­tures that are ener­gy grids, water treat­ment plants, indus­trial pro­cesses or finan­cial systems.Created in 2016, this research chair of the Ins­ti­tut Mines-Télé­com is sup­por­ted by IMT Atlan­tique. It conducts research work in part­ner­ship with Télé­com Paris and Télé­com Sud­Pa­ris. The work ini­tial­ly focu­sed on the beha­viou­ral stu­dy of mal­wares or the diag­no­sis of the causes of inci­dents. During its second phase, laun­ched in 2019, the Chaire CNI expan­ded its area of exper­tise to new research topics, inclu­ding the use of arti­fi­cial intel­li­gence (AI) in cyber­se­cu­ri­ty, blo­ck­chain tech­no­lo­gy or the indus­trial appli­ca­tions of connec­ted objects (Inter­net of Things).

Support accurate information rooted in the scientific method.

Donate