Spies Want IBM’s Quantum Computer

 

As the physical limits of shrinking the components on computer chips get closer, it’s getting harder to attain more computing power. But quantum computers—which rely on the strange properties of atom-sized logic gates—could have exponentially more power than even today’s most advanced supercomputers. These machines could be used to develop new drugs, crack codes, or potentially even create true artificial intelligence.

IBM has been working on quantum computers for decades, and now it has the support of the US intelligence agencies. On Nov. 8th IBM announced that IARPA, the intelligence community’s research arm, had awarded the company a multi-year grant to continue its research into building quantum computers.

Classical computer, everything from the giant mainframes that used to take up entire rooms, to the smartphone in your pocket, consists of billions of tiny transistors. Those are switches, essentially, that can be turned on or off, represented on computers as 1 or 0. Every, tweet, text, document, and photo is composed of a series of those 1s and 0s, known as bits. In quantum computing, a transistor consists of a single atom, which can exist as a sort of combination, or “superposition,” of 1 and 0 at the same time. These quantum bits, or qubits, in essence allow a computer to perform multiple parts of a calculation at once, making it far more powerful.

But that’s assuming you can get enough qubits working in one place. These qubits are much less stable than traditional bits, and need to be isolated in large machines that can cool them to almost absolute zero. IBM has a few such machines, and the most powerful contains a mere eight qubits.

Right now, IBM is working on correcting errors that are thrown up during its quantum computing tests—due to the fragility of the qubits—and assuming it’s able to wrangle thousands of qubits in one place, all computing as desired, it would potentially have a computer far more powerful than one with a similar number of traditional bits.

One key area where quantum computers could have an impact is encryption and security. Governments could use them to crack even the strongest current forms of digital encryption, or create new forms that are unbreakable. This is likely one reason why IARPA is interested in quantum computing. The agency has been working with other companies, like D-Wave, to develop these machines. (Though some in the field aren’t entirely sure if D-Wave’s computers are really quantum computers, researchers at Google—which bought a D-Wave machine in 2013—have just posted some new findings that they say show “a 100-million-fold speed-up” on a certain, very specific kind of problem.)
 


IBM’s quantum roadmap

IBM outlined its quantum-computing roadmap (above) but told Quartz that it could well be many years, if not decades, before a viable quantum computer is built. But a patient, methodical, and practical approach to research is what has helped the company develop world-changing technologies in the past.
DefenseOne: http://bit.ly/1NmKmEW

« The Biggest Cybersecurity Risk Is Not Identity Theft
Can You Solve The GCHQ Christmas Card Puzzle? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Feitian Technologies

Feitian Technologies

Feitian Technologies provides authentication and transaction security products for financial institutions, telecoms, government and leading business enterprises.

ISACA

ISACA

ISACA is a global professional association and learning organization for members who work in information security, governance, assurance, rissk and privacy.

Cyberlytic

Cyberlytic

Cyberlytic applies artificial intelligence to combat the most sophisticated of web application threats, addressing the growing problem of high volumes of threat data.

TeleTrusT

TeleTrusT

TeleTrust is an IT Security association and network for IT security comprising members from industry, administration, consultancy and research.

Ahope

Ahope

Ahope is a mobile security solution provider in Korea with a long history of security solution development.

Cydome

Cydome

Cydome offers full-spectrum cybersecurity solutions tailored for the maritime industry.

Infowhiz solutions

Infowhiz solutions

Infowhiz provides solutions for backup/disaster recovery and network security.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Human Security

Human Security

Human (formerly White Ops) Bot Mitigation Platform enables complete protection from sophisticated bot attacks across advertising, marketing and cybersecurity.

Portshift

Portshift

Portshift leverages the power of Kubernetes and Service-Mesh to deliver a single source of truth for containers and cloud-native applications security.

Salt Cybersecurity

Salt Cybersecurity

Salt Cybersecurity offer a four-pronged approach to information security that includes Custom Security Policy, Vulnerability Assessment, Threat Detection, and Security Awareness Training.

International Association of Security Awareness Professionals (IASAP)

International Association of Security Awareness Professionals (IASAP)

IASAP provides a members-only virtual sharing platform where security awareness professionals engage in a lively, year-round exchange of information and ideas.

Evolution Equity Partners

Evolution Equity Partners

Evolution Equity Partners is an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies.

Antigen Security

Antigen Security

Antigen Security is a Digital Forensics, Incident Response and Recovery Engineering firm helping businesses and service providers prepare for, respond to, and recover from cyber threats.

InfoTrust

InfoTrust

InfoTrust is a leading specialised cybersecurity practice that combines a customer-first consulting approach with next-generation security solutions.

CoinCover

CoinCover

Blockchain technology is changing everything. However, it brings its own set of unique risks. Coincover ensures everyone is protected, enabling them to innovate freely, without constraints.