Quantum Science Will Revolutionise Security

Quantum computing is a fast-emerging area of computer science that is upending the foundations of cybersecurity. The need for rapid detection of chemical and biological threats has become far more serious issue  in recent time and quantum has the power to do this.

It's set to change how we secure our everyday communications, process credit cards, store data, and securely connect to websites. But it's also likely to disrupt modern security as we know it.

What is Quantum?

Conventional computing is based on a simple binary number concept developed for the first computers designed after World War II. Every computer instruction is translated into a sequence of 0s or 1s. In quantum computing, meanwhile, instructions can be in a state of 0 and 1 at the same time.

This allows them to work on millions of computations in parallel, exponentially speeding up the time it takes to process a task. 

This new approach to computing is predicted to radically change areas such as drug discovery, stock market prediction, gene sequencing, and, of course, cryptography, a key component of cybersecurity.

New Quantum Techniques

But now research into quantum techniques to more quickly detect explosives and exotic types of quantum camouflage have received funding from the US Department of Defense’s (DoD)  2020 Multidisciplinary University Research Initiative (MURI) program. The four faculty members who have been awarded projects in the competitive funding program are members of the Purdue Quantum Science and Engineering Institute PQSEI in Purdue’s Discovery Park, a multi-disciplinary hub. 

Purdue has a long history of supporting DoD missions. PQSEI fosters the development of practical and impactful aspects of quantum science, and focuses on discovering and studying new materials and basic physical quantum systems that will be suited for integration into tomorrow’s technology. 

The MURI program is supported by the US Army Research Office, the US Air Force Office of Scientific Research, and the US Office of Naval Research. According to the US Department of Defense, the program convenes teams of multiple disciplines to facilitate the growth of new technologies to solve the DoD’s unique problems.

One of the projects, New Approaches to Quantum Control with Individual Molecule Sensitivity, will seek to control individual atoms in order to fully embrace and leverage their quantum effects. 

This could lead to improved detectors for biological, chemical and explosive agents, and precise quantum control that can lead to advanced materials design. 

Another project, led by Purdue, will pursue the search of unintuitive new materials and systems that exhibit exotic electronic and optoelectronic properties, specifically those stemming from unique topological states, and truly represent a new phase of matter.

Purdue University:       ResearchGate:        OKTA:        I-HLS:        IBM

You Might Also Read:   

 

Quantum Computing Has Far Reaching Effects On Security:

 

 

« Careers In Artificial Intelligence
Solutions For Smarter Cities »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

SecureAuth

SecureAuth

SecureAuth delivers cutting edge identity and information security solutions for cloud, mobile, web, and VPN systems.

Applicure Technologies

Applicure Technologies

Applicure Technologies develops the leading multi-platform web application security software products to protect web sites and web applications from external and internal attacks.

Optiv

Optiv

Optiv is a market-leading provider of end-to-end cyber security solutions. We help clients plan, build and run successful cyber security programs that achieve business objectives.

Data Recovery Services (DRS)

Data Recovery Services (DRS)

DRS provides data recovery services from media including hard disk drives, RAID, solid state disks SSD, memory sticks, USB drives, SD cards, tapes and mobile phones.

Crosscheck Networks

Crosscheck Networks

Crosscheck products allow you to test your APIs across different protocols and message formats with functional automation, performance, and security testing capabilities.

Intersec Worldwide

Intersec Worldwide

Intersec Worldwide is a boutique Information Security Firm specializing in PCI Compliance, Assessment, Remediation, Forensics, Data Breach Investigations, Incident Response and IT Managed Services.

NSIT

NSIT

NSIT SAS is a consulting, advisory and service provider in IT systems. Solution areas include networking & infrastructure, IT management & administration, and cyber security.

Elemendar

Elemendar

Elemendar Artificial Intelligence reads cyber threat reports written by humans and translates them into industry-standard, machine-readable and machine-actionable data.

Belle de Mai Incubator

Belle de Mai Incubator

Belle de Mai Incubator supports and funds innovative startup ideas in digital industries.

Allthenticate

Allthenticate

Allthenticate Single Device Authentication (SDA), enables seamless authentication in both the physical and digital words while unifying management in one easy-to-use interface.

archTIS

archTIS

archTIS specialises in the design and development of products, solutions and services for secure information sharing and collaboration.

SubCom

SubCom

How Much Do You Trust Your Endpoint? With our ‘Habituation Neural Fabric’ based endpoint security platform, you can observe and manage the Trust Score of your endpoints in real-time.

Metabase Q

Metabase Q

Metabase Q protects you from financial and reputational losses with more efficient and intelligent cybersecurity, using the best worldwide in technologies, processes and specialists.

Catalyst Campus For Technology & Innovation

Catalyst Campus For Technology & Innovation

Catalyst Campus is a collaborative ecosystem to create community, spark innovation and stimulate business growth.

Lakera

Lakera

Lakera empowers developers and organizations to build GenAI applications without worrying about AI security risks.

Token

Token

Token is changing the way our customers secure their organizations by providing passwordless, biometric, multifactor authentication.