Spies Want IBM’s Quantum Computer

 

As the physical limits of shrinking the components on computer chips get closer, it’s getting harder to attain more computing power. But quantum computers—which rely on the strange properties of atom-sized logic gates—could have exponentially more power than even today’s most advanced supercomputers. These machines could be used to develop new drugs, crack codes, or potentially even create true artificial intelligence.

IBM has been working on quantum computers for decades, and now it has the support of the US intelligence agencies. On Nov. 8th IBM announced that IARPA, the intelligence community’s research arm, had awarded the company a multi-year grant to continue its research into building quantum computers.

Classical computer, everything from the giant mainframes that used to take up entire rooms, to the smartphone in your pocket, consists of billions of tiny transistors. Those are switches, essentially, that can be turned on or off, represented on computers as 1 or 0. Every, tweet, text, document, and photo is composed of a series of those 1s and 0s, known as bits. In quantum computing, a transistor consists of a single atom, which can exist as a sort of combination, or “superposition,” of 1 and 0 at the same time. These quantum bits, or qubits, in essence allow a computer to perform multiple parts of a calculation at once, making it far more powerful.

But that’s assuming you can get enough qubits working in one place. These qubits are much less stable than traditional bits, and need to be isolated in large machines that can cool them to almost absolute zero. IBM has a few such machines, and the most powerful contains a mere eight qubits.

Right now, IBM is working on correcting errors that are thrown up during its quantum computing tests—due to the fragility of the qubits—and assuming it’s able to wrangle thousands of qubits in one place, all computing as desired, it would potentially have a computer far more powerful than one with a similar number of traditional bits.

One key area where quantum computers could have an impact is encryption and security. Governments could use them to crack even the strongest current forms of digital encryption, or create new forms that are unbreakable. This is likely one reason why IARPA is interested in quantum computing. The agency has been working with other companies, like D-Wave, to develop these machines. (Though some in the field aren’t entirely sure if D-Wave’s computers are really quantum computers, researchers at Google—which bought a D-Wave machine in 2013—have just posted some new findings that they say show “a 100-million-fold speed-up” on a certain, very specific kind of problem.)
 


IBM’s quantum roadmap

IBM outlined its quantum-computing roadmap (above) but told Quartz that it could well be many years, if not decades, before a viable quantum computer is built. But a patient, methodical, and practical approach to research is what has helped the company develop world-changing technologies in the past.
DefenseOne: http://bit.ly/1NmKmEW

« The Biggest Cybersecurity Risk Is Not Identity Theft
Can You Solve The GCHQ Christmas Card Puzzle? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Fastpath Solutions

Fastpath Solutions

Fastpath deliver software solutions that enable you to take control of your security, compliance and risk management initiatives.

Praetorian

Praetorian

Praetorian is an offensive cybersecurity company whose mission is to prevent breaches before they occur.

MaxMind

MaxMind

MaxMind is an industry-leading provider of IP intelligence and online fraud detection tools.

BlueID

BlueID

BlueID is an IDaaS technology product which enables your objects to securely connect and interact with your users’ smart phones and smart watches.

Cyber Defense Labs

Cyber Defense Labs

Cyber Defense Labs helps companies identify, mitigate and reduce risk as a trusted, reliable partner for cyber risk management.

SGBox

SGBox

SGBox is a highly flexible and scalable solution for IT security. Choose the modules which your company needs and implement it without any modification to your network infrastructure.

oneM2M

oneM2M

oneM2M is a global organization creating a scalable and interoperable standard for communications of devices and services used in M2M applications and the Internet of Things.

AlertEnterprise

AlertEnterprise

AlertEnterprise uniquely eliminates silos and uncovers blended threats across IT Security, Physical Access Controls and Industrial Control Systems.

Cybersecure Policy Exchange (CPX)

Cybersecure Policy Exchange (CPX)

Cybersecure Policy Exchange is a new initiative dedicated to advancing effective and innovative public policy in cybersecurity and digital privacy.

Ridge Security

Ridge Security

Ridge Security enables enterprise and web application teams, ISVs, governments, education, DevOps, anyone responsible for ensuring software security to affordably and efficiently test their systems.

Netox

Netox

Netox is a comprehensive IT service provider that combines IT support services, IT solutions and specialist services; specializing in cybersecurity solutions.

Vali Cyber

Vali Cyber

Vali Cyber was founded in 2020 with the mission of addressing the specific cybersecurity needs of Linux.

Xoriant

Xoriant

Xoriant is a technology leader and execution partner throughout the Build, Run and Transform lifecycle for companies that create and use technology products.

Actelis Networks

Actelis Networks

Actelis Networks is a market leader in cyber-hardened, rapid deployment networking solutions for wide-area IoT applications.

NewEvol

NewEvol

Don’t React, Evolve! Outsmart threats with real-time AI-powered dynamic defense capability of NewEvol all-in-one cybersecurity platform.

UFS Technology

UFS Technology

UFS, the bank technology outfitter for community banks, provides purpose-built, bank-exclusive technology services and solutions including cybersecurity.