Challenge
An electric utility company, responsible for power generation, transmission, and distribution across a large region, recognized that its grid operations are part of the nation’s critical infrastructure that must remain secure and reliable against all threats. In light of reports that quantum computers could eventually crack common encryption, the utility grew concerned about the resilience of its control systems and communication networks. The electric grid relies on myriad digital components: SCADA systems that manage generation plants and substations, encrypted communications between control centers, smart meters at customer premises, and sensor networks monitoring the grid’s health. Many of these systems were designed years ago with classical encryption baked in, often with hardware that might not be easily upgraded. The challenge was twofold: address the security risks (imagine a scenario where an attacker with a quantum computer decodes substation VPN traffic or impersonates control signals, potentially causing blackouts or equipment damage), and explore new quantum technologies that might benefit grid management (like quantum sensors or better optimization algorithms for power flow). The utility’s leadership knew they had to start preparing, also anticipating that regulators would soon expect critical utilities to have quantum resilience plans. Lacking in-house quantum expertise, they turned to us to assess the situation and guide their strategy.
What We Did
We initiated a collaborative project with the utility’s cybersecurity team, grid operations engineers, and IT department to perform a Quantum Vulnerability Audit of the power infrastructure. This audit was exhaustive: we mapped out all communications in the grid control network – from the control center dispatch signals to generators, to relay protection commands between substations, and even down to how smart meters report usage data. We identified every point where cryptography is used. For example, we noted encrypted PLC (programmable logic controller) communications in substations, VPN tunnels carrying telemetry over public networks, and the use of secure protocols (like IEC 60870-5-104 and DNP3 with encryption extensions) in remote monitoring.
Our analysis pinpointed critical areas of concern. One was the SCADA VPN connections between regional control centers and power plants: these often utilized standard public-key infrastructure for authentication and key exchange. If those were compromised via quantum attacks, an intruder could theoretically impersonate a control center. Another area was the substation devices – many had firmware that supported only older cryptographic algorithms and might not get vendor support for upgrades, meaning a plan was needed to safeguard them or phase them out.
Using these findings, we developed a phased Quantum-Safe Grid Roadmap:
-
Phase 1: Immediate Risk Mitigation: We focused on measures that could be implemented relatively quickly. For instance, we recommended upgrading the encryption of critical link communications to quantum-resistant alternatives as soon as feasible. In practice, this meant working with the utility’s network team to deploy updated VPN software (or appliances) that could run hybrid encryption modes. We guided them in configuring a pilot where their control center to substation VPN used a combination of classical AES encryption with keys exchanged via both RSA and a post-quantum key exchange (like a lattice-based algorithm). This hybrid approach ensured that even if RSA was later broken, the keys would still be protected by the post-quantum method. We also advised increasing symmetric key lengths for now (e.g., moving from 128-bit to 256-bit keys for any symmetric encryption in the interim) since that’s a simple step to boost security margin.
-
Phase 2: Infrastructure Upgrade Planning: We helped the utility plan for the long-term replacement or upgrading of equipment that cannot meet quantum-safe requirements. We prioritized which substation and control hardware would need retiring or vendor intervention. For example, the digital protection relays that safeguard the grid from faults – if they used fixed RSA keys for firmware updates, we put those high on the list for upgrade or replacement with models that support newer crypto. We compiled vendor-specific recommendations and even engaged with some manufacturers on behalf of the utility to discuss their roadmap for PQC support, thus influencing the supply chain. Additionally, we updated the utility’s technical standards documents: any new system (be it a software for grid management or an IoT sensor network for power lines) must now include a section on quantum safety compliance, ensuring all future procurement asks the right questions.
-
Integration with Regulation and Policy: The utility operates under oversight from an energy regulator. Anticipating future regulatory moves, we drafted an internal whitepaper for the client outlining how they are addressing quantum risk, and we helped them include quantum readiness in their regulatory filings and cybersecurity compliance reports. This way, they demonstrate proactiveness and can shape the conversation with regulators. In fact, we facilitated a workshop between the utility’s leadership and government energy security officials to share knowledge from our project, effectively helping the regulator consider quantum risk in broader energy sector guidelines.
-
Quantum Opportunities – Sensing and Optimization: While security was the priority, we also examined potential quantum sensing solutions. One idea we explored was deploying quantum sensors for grid monitoring. For instance, quantum optical sensors or quantum magnetometers could detect minute changes in electric and magnetic fields, potentially identifying issues like grid stress or faults faster than conventional sensors. We identified a startup developing a quantum magnetic field sensor and coordinated a small proof-of-concept: installing one at a substation to compare its readings on grid fluctuations with the standard sensors. At the same time, we looked at quantum computing for grid optimization problems (like optimal power flow or unit commitment in generation). We set up a collaboration between the utility’s analytics team and a quantum computing company to test if a quantum algorithm could help with, say, scheduling which power plants to run for minimizing costs and losses, given a simplified model of their network.
Outcome
Through our engagement, the electric utility took significant strides in future-proofing the grid. In the short term, several actionable changes were made: the utility successfully upgraded the encryption on a number of its critical network links. For example, the pilot hybrid VPN we set up between a regional control center and a key substation is now permanent – it runs using both classical and post-quantum key exchange mechanisms. Tests showed this dual approach did not noticeably slow down their SCADA polling intervals, which gave the operations team confidence to eventually extend similar upgrades to dozens of other links systematically. Their network administrators and engineers, initially unfamiliar with PQC, have become comfortable with the concept and even documented the configuration so it can be replicated as a standard practice.
Long-term planning is now concrete. The utility’s capital improvement plan – which looks 5-10 years ahead – has explicitly incorporated the replacement of non-compliant devices. They’ve budgeted for gradual swapping out of certain substation controllers and are aligning it with other upgrade cycles to minimize cost. Importantly, procurement going forward is locked-in on quantum safety: recently, when they ordered a new batch of smart grid equipment, they only accepted bids from vendors who could demonstrate a path to implement PQC in their devices. This stance by such a large utility sends a signal to the market and will likely accelerate vendors’ development of quantum-safe firmware, benefiting the entire sector.
On the regulatory front, the client has turned their preparedness into a strategic advantage. In the latest meeting with the energy regulator, they presented the whitepaper we helped craft. It detailed their quantum readiness efforts and plans. The regulator was impressed and is considering using it as an example for other utilities. Our client is effectively helping shape future compliance standards, rather than reacting to them.
As for the exploratory projects, the quantum sensor installed at the substation started capturing data right away. Early findings show it can detect transient events on the grid (like sudden voltage spikes or dips) with exceptional sensitivity. This has intrigued the utility’s engineers; if scaled, such sensors might enhance early warning systems for grid instability. They are continuing that pilot with academic help to validate the results. And the quantum computing test for power plant scheduling, while still in a research stage, gave a taste of how a quantum algorithm might handle the combinatorial complexity of the problem. It didn’t outperform their classical optimizer yet (no surprise given the nascent state of quantum hardware), but it proved the company’s ability to formulate real grid problems in a quantum-friendly way – a crucial learning step.
In summary, by the end of this engagement, the electricity provider completed a robust first phase of quantum readiness. They moved from uncertainty to having tangible defences and a clear plan. The power grid under their stewardship is now significantly more resilient to the prospect of quantum-enabled cyberattacks, and the organization has cultivated a forward-looking culture. They are not only guarding against the quantum threat but also setting themselves up to adopt quantum innovations that could make the grid smarter and more efficient.
© 2026 Applied Quantum. All rights reserved