Quantum Computing - What You Should Know

Quantum computing is moving from Science Fiction to Reality. Unlike normal computer bits, the qubit units used by quantum computers store information in two-state systems, such as electrons or photons, that are considered to be in all possible quantum states at once, a phenomenon known as super-position.

Here is what you need to know:

The first thing to know about quantum computing is that it won’t displace traditional, or ‘classical’ computing. 

The second thing to know: Quantum computing is still a nascent technology that probably won’t be ready for prime time for several more years.

And the third thing you should know? The time to start protecting your data’s security from quantum computers is now.

Here’s an overview of what you should know about quantum computing.

Quantum Computing Explained
The classical computers we’ve used for decades use a sequence of binary bits. Each bit is always in one of two definitive states – 0 or 1 – that act as on and off switches to drive computer functions.

In contrast, a quantum computer uses quantum bits, or qubits. Each qubit can represent both a 0 and a 1 simultaneously. Consequently, quantum computers can store far more information than classical computers and have the potential to process massive amounts of calculations running in parallel within seconds, far faster than the fastest classical computers.

Quantum-Computing Terms
Briefly, a few quantum computing terms to know are:

Quantum mechanics, aka quantum physics. A theory in physics that describes nature in terms of atoms and subatomic particles. Quantum computers are based on quantum mechanical phenomena such as superposition and entanglement.
Superposition. A qubit can be more than one thing at a time through a quantum-mechanics principle called superposition. Superposition gives quantum computers their speed and parallelism, enabling them to work on millions of computations at once, says Matthew Brisse, Vice President of Research for Data Center and Cloud Infrastructure with the Gartner for Technical Professionals service.
Entanglement is when qubits are linked with other qubits, so that the state of one qubit can depend upon the state of another. With entanglement combined with superposition, quantum computers have the potential to simultaneously process a vast number of possible outcomes.

The bottom line: “With quantum computing, we can do things in massively parallel systems that we couldn’t do before,” says Brisse.

Quantum-Computing Origins
During a 1959 lecture, physicist Richard Feynman, who helped develop the atomic bomb during World War II, raised the possibility of quantum computing. In the early 1980s, the concept of quantum computing started to talk hold, thanks to the work of Feynman, Paul Benioff and others.

“By the early 1980s, it was clear that in addition to conventional computing, we could do computations using the rule of quantum mechanics,” says Bob Wisnieff, IBM’s CTO of quantum computing.

“The question was, if you had a computer built on quantum mechanics, what kinds of computations could be done easier and faster? That question kicked off research into quantum computing at IBM.”

Why we’re talking about quantum computing now
To be sure, quantum computing is still in its infancy. Only 1 percent of organisations are budgeting for quantum computing projects, according to Brisse. But that’s expected to grow to 20 percent by 2023. So, why is quantum computing blipping on our radar screens now?

“We’re reaching the limits of what a classical computer can do,” says Ashish Nadkarni, Program Vice President of Computing Platforms, Worldwide Infrastructure at IDC. 

Many (though not all) experts believe that the phenomenon of Moore’s Law is coming to an end or is at least slowing to a crawl. At the same time, a growing number of companies, such as Google, have “an insatiable need for compute power,” Nadkarni says. Thus, the growing interest in quantum computing.

Quantum Computing Applications
Currently, quantum computers can only run limited business applications and specific quantum algorithms. Some believe quantum computers will always be specialised vs. general purpose. And most experts in the field say that quantum computers will integrate and work with, rather than replace, classical computers.

Given that, quantum computers are most likely to be used when there’s a huge volume of data to process within seconds.

“Financial-services companies could benefit from quantum computing, especially with services where the volume of data related to trades is high, and they want to simulate outcomes in seconds,” says Nadkarni.

Other likely applications: Drug and biotech research, gene editing and simulation, quantum chemistry, artificial intelligence, traffic pattern analysis, weather forecasting and cryptography.

“Quantum computers will be particularly good at solving big optimization problems, such as shipping logistics,” says Brisse.  

What enterprises should do to prepare for Quantum Computing

Move toward quantum-safe encryption. Because they can crunch unprecedented amounts of numbers in practically no time, there’s a fair amount of hand-wringing that for quantum computers might one-day crack even the strongest encryptions available today.

“If you have a big-enough machine, a quantum computer could instantly break all encryption,” says Arvind Krishna, Senior Vice President of Hybrid Cloud and Director of IBM Research. He predicts that won’t happen for at least five years.

Even so, anyone who wants to ensure their organisation’s data is safe for more than 10 years should start migrating toward quantum-safe encryption now, such as lattice cryptography.

Quantum computers have potential applications in cryptography, artificial intelligence, and weather forecasting because each additional qubit becomes entangled, or tied inextricably, to the others, exponentially increasing the number of possible outcomes for the measured state at the end. This very benefit, however, also has adverse effects on the system because errors may also scale exponentially with problem size.

Some experts predict that in the future, quantum computations of complex nuclei could even unravel important details about the properties of matter, the formation of heavy elements, and the origins of the universe.

NetworkWorld:        ScienceDaily:

You Might Also Read: 

IBM Breakthrough In Quantum Computing:

China Puts Quantum Encryption Into Orbit:

Power Of Nature To Enhance Internet Security:
 

 

« Countering Electoral Interference
N Korean Cyber Attacks Continue Despite Peace Talks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

SSL247

SSL247

SSL247 is Europe's leading Web Security Consultancy Firm. We enjoy long-standing partnerships with Certificate Authorities including Symantec, GlobalSign, Entrust Datacard, Comodo, Thales and Qualys.

Cristie Data

Cristie Data

Cristie have been a trusted, innovative and leading edge data storage, backup and virtualisation solutions provider across all sectors of industry for over 40 years.

TechInsurance

TechInsurance

TechInsurance is America's top technology insurance company offering a range of technology related products including Cyber Liability insurance.

DomainTools

DomainTools

DomainTools is the global leader for internet intelligence and the first place security practitioners go when they need to know.

Cybersprint

Cybersprint

Cybersprint's Digital Risk Protection platform continuously monitors your digital footprint so you can make informed decisions on exposure to online threats, identify vulnerabilities and take action.

Aspisec

Aspisec

Aspisec is a cybersecurity company specialized in Firmware Security and Critical Infrastructure Protection.

International Data Sanitization Consortium (IDSC)

International Data Sanitization Consortium (IDSC)

IDSC is a group composed of individuals and companies dedicated to standardizing terminology and practices across the data sanitization industry.

Cysiv

Cysiv

Cysiv SOC-as-a-Service combines all the elements of an advanced, proactive, threat hunting SOC, with a managed security stack for hybrid cloud, network, and endpoint security.

Cympire

Cympire

Cympire significantly increases an organisation’s Cyber Resilience through continuous Training and Assessment. Cyber Security Training Platform. Cloud-based and fully customizable Cyber Range.

Center for Information Technology Policy (CITP) - Princeton University

Center for Information Technology Policy (CITP) - Princeton University

The Center for Information Technology Policy at Princeton University is a nexus of expertise in technology, engineering, public policy, and the social sciences.

Securious

Securious

If you need to improve your cyber security or achieve cyber security accreditations, Securious provide an independent service that will identify and address your issues quickly and efficiently.

PeoplActive

PeoplActive

PeoplActive is an IT consulting and recruitment services organization with leading capabilities in digital, cloud and security.

Entro Security

Entro Security

Entro is the first holistic secrets security platform that detects, safeguards, and enriches with context your secrets across code, vaults, chats, and platforms.

Vertek

Vertek

Vertek is a leading provider of operations consulting, end-to-end business process outsourcing, business intelligence, software applications and managed cybersecurity solutions.

Keepit

Keepit

Keepit offer all-inclusive, secure, and reliable backup and recovery services for your data.

Venticento

Venticento

Venticento is an IT company specialized in consulting and network support and assistance for companies that need to make their business processes more effective.