Quantum computers got infamous as code breakers, waiting around the corner to put encryption down to its knees. Can they also do good for cryptography? Cryptographic algorithms rely on high-quality random numbers to be secure - and quantum machines are awesome at generating them! How? That's what I'm showing in the first of my upcoming articles about quantum computing for the iX-Magazin! What's in for you? - Get your head around the fundamentals of quantum computing - Develop quantum code in Q# that drives the generation of random numbers - Compare entropy sources in classical and quantum machines - Explore different instruction sets for quantum computers Only few days away from being purchasable in print, you can already read it online at heise online . Check it out: 👉 https://lnkd.in/eytWn-U9
Armin Berberovic’s Post
More Relevant Posts
-
the C64, if somone could remember them, is not dead and funny compared to the calculations of quantum computing of today. You can use a processor from a appliance toaster this days to make this working, will only take some more time.... https://lnkd.in/eZ4m8NAX
Forscher nutzen einen C64 für Berechnungen eines Quantencomputers – und ärgern damit IBM
t3n.de
To view or add a comment, sign in
-
The Quantum Threat is Real: The recent developments in quantum computing are just the beginning. As researchers overcome barriers like error correction and scalability in quantum systems, we are heading toward a future where quantum computers will be able to break existing cryptographic protocols in seconds. Zortrex, with its quantum-proof security, is the solution to stay ahead of this inevitable technological leap. https://lnkd.in/eyPPqFej
'Quantum hard drives' closer to reality after scientists resolve 10-year-old problem
msn.com
To view or add a comment, sign in
-
Scientists are exploring alternative methods to safeguard sensitive data from potential interception by future quantum computers. One proposed solution involves utilizing satellites to transmit data encoded as light particles globally, offering an additional layer of security beyond conventional encryption techniques. This concept, termed "space encryption," aims to heighten the difficulty for quantum computers to decipher encrypted information.
Future quantum computers will be no match for 'space encryption' that uses light to beam data around — with the 1st satellite launching in 2025
space.com
To view or add a comment, sign in
-
"Researchers at DTU have successfully distributed a quantum-secure key using a method called continuous variable quantum key distribution (CV QKD). The researchers have managed to make the method work over a record 100 km distance—the longest distance ever achieved using the CV QKD method. The advantage of the method is that it can be applied to the existing Internet infrastructure. Quantum computers threaten existing algorithm-based encryptions, which currently secure data transfers against eavesdropping and surveillance. They are not yet powerful enough to break them, but it's a matter of time. If a quantum computer succeeds in figuring out the most secure algorithms, it leaves an open door to all data connected via the internet. This has accelerated the development of a new encryption method based on the principles of quantum physics." #quantumencryption
100 kilometers of quantum-encrypted transfer
phys.org
To view or add a comment, sign in
-
Evaluation and Comparison of Lattice-Based Cryptosystems for a Secure Quantum Computing Era Electronics 2023, 12(12), 2643; https://lnkd.in/dWZu32Ne The rapid development of quantum computing devices promises powerful machines with the potential to confront a variety of problems that conventional computers cannot. Therefore, quantum computers generate new threats at unprecedented speed and scale and specifically pose an enormous threat to encryption. Lattice-based cryptography is regarded as the rival to a quantum computer attack and the future of post-quantum cryptography. So, cryptographic protocols based on lattices have a variety of benefits, such as security, efficiency, lower energy consumption, and speed. In this work, we study the most well-known lattice-based cryptosystems while a systematic evaluation and comparison is also presented.
Evaluation and Comparison of Lattice-Based Cryptosystems for a Secure Quantum Computing Era
mdpi.com
To view or add a comment, sign in
-
Understanding the difference between universal gate-based quantum computers and quantum annealers…. Quantum annealing is already in use commercially through D-Wave. The global race towards universal gate-based quantum computers is in progress. Don’t underestimate the timeframe. Geo-politics is speeding up development efforts so expect this technology to advance more rapidly than some have predicted. We are in the quantum equivalent of a space race. Cybersecurity professionals should be paying particular attention. NIST are officially launching their quantum-safe algorithms this year. Transition to becoming quantum safe is going to take years. Start the journey now, if you haven’t already, by learning about quantum technologies.
Quantum Computing Paradigms: Annealing, Gate-Based, and Simulators in Focus
medium.com
To view or add a comment, sign in
-
Preparing for the Quantum Computing Future… Today Summary: Quantum computing is transitioning from a theoretical concept to a tangible reality, with significant implications for security and commercial applications. Nils Gerhardt, Chief Technology Officer at Utimaco, discusses the challenges and potential future developments in quantum computing. Key Points: Historical Context and Progress: Quantum computing's theoretical foundation was laid in 1959 and formalized in 1985. The first working quantum computer was built in 1998. Over the last 40 years, the focus has been on overcoming technical hurdles and increasing the number of qubits. Security Implications: Quantum computers pose a potential threat to current encryption methods, such as RSA-2048, which could be easily broken by quantum computers in the future. Preparation for a post-quantum future is essential to mitigate these security risks. Error Correction Challenges: Quantum computers currently experience a high rate of 'bit flip errors,' making them unreliable for complex calculations. Error rates need to be reduced to one in a trillion for quantum computers to be as reliable as traditional computers. Solutions may include running operations multiple times or developing more advanced shielding techniques to protect qubits from external interference. Environmental Considerations: Quantum bits (qubits) need to be kept at near absolute zero to minimize errors caused by vibrations and interactions with outside atoms. Shielding quantum computers from external factors is crucial, similar to how computers designed for extreme environments are protected. Commercial Development: Initially, quantum computers will likely be used in government, military, and research roles rather than consumer applications. Commercial access to quantum computing will be through cloud services, accessible primarily to large companies due to high costs. Non-state hacking groups may not access quantum computing capabilities for years, reducing immediate threats. Future Preparations: Companies must prepare now for the post-quantum era by assessing and securing their current data. Sensitive data, such as bank account details, patent-protected information, and health data, will be vulnerable once quantum computing becomes commercially viable. Organizations need to evaluate what data they store today and its potential future value to ensure adequate protection. #QuantumComputing #DataSecurity #Encryption #ErrorCorrection #CommercialQuantumComputing #FutureTech #PostQuantumEra #CyberSecurity #Innovation #TechDevelopment #Utimaco
Preparing for the quantum computing future… today
datacenterdynamics.com
To view or add a comment, sign in
-
The quantum computer, though, will disrupt virtually everything to do with trust and security but will bring great advancements in computation. While not every problem will be able to be processed by quantum computers, there are some which can be significantly enhanced.
Welcome to the World of Quantum Processing
billatnapier.medium.com
To view or add a comment, sign in
-
A team of researchers from China has broken RSA encryption using quantum computing technology. Utilizing D-Wave’s advanced quantum annealing systems, this innovative research raises pressing concerns about the security of widely adopted cryptographic methods. The findings were published in the Chinese Journal of Computers under the title “Quantum Annealing Public Key Cryptographic Attack Algorithm Based on D-Wave Advantage.” This paper highlights the researchers’ pioneering approach to not only breaking RSA encryption but also launching attacks on symmetric encryption systems.
Chinese Researchers Break RSA Encryption Using Quantum Computing
thecyberexpress.com
To view or add a comment, sign in
-
Quantum Computing and the Future of RSA Encryption 🔐 In recent years, quantum computing has made significant strides, and one of the most talked-about topics is its potential to break RSA encryption. RSA is a widely used method for securing data, but it relies on the difficulty of factoring large prime numbers. What’s Happening? Chinese researchers have demonstrated that quantum algorithms, like Shor’s algorithm, can factorize large numbers much more efficiently than classical computers. This means that, in theory, quantum computers could break RSA encryption. Are We There Yet? Not quite. Current quantum computers are still in their infancy and lack the necessary power to break RSA encryption used in real-world applications. Experts estimate it might take another 20 to 25 years before we have quantum computers capable of this feat. What Does This Mean for Data Security? The potential of quantum computers to break RSA encryption highlights the need for quantum-resistant encryption methods. Researchers are already working on these new methods to ensure our data remains secure in the future. #QuantumComputing #DataSecurity
To view or add a comment, sign in
Vielen Dank für die spannenden Artikel. :-)