Spies Want IBM’s Quantum Computer

 

As the physical limits of shrinking the components on computer chips get closer, it’s getting harder to attain more computing power. But quantum computers—which rely on the strange properties of atom-sized logic gates—could have exponentially more power than even today’s most advanced supercomputers. These machines could be used to develop new drugs, crack codes, or potentially even create true artificial intelligence.

IBM has been working on quantum computers for decades, and now it has the support of the US intelligence agencies. On Nov. 8th IBM announced that IARPA, the intelligence community’s research arm, had awarded the company a multi-year grant to continue its research into building quantum computers.

Classical computer, everything from the giant mainframes that used to take up entire rooms, to the smartphone in your pocket, consists of billions of tiny transistors. Those are switches, essentially, that can be turned on or off, represented on computers as 1 or 0. Every, tweet, text, document, and photo is composed of a series of those 1s and 0s, known as bits. In quantum computing, a transistor consists of a single atom, which can exist as a sort of combination, or “superposition,” of 1 and 0 at the same time. These quantum bits, or qubits, in essence allow a computer to perform multiple parts of a calculation at once, making it far more powerful.

But that’s assuming you can get enough qubits working in one place. These qubits are much less stable than traditional bits, and need to be isolated in large machines that can cool them to almost absolute zero. IBM has a few such machines, and the most powerful contains a mere eight qubits.

Right now, IBM is working on correcting errors that are thrown up during its quantum computing tests—due to the fragility of the qubits—and assuming it’s able to wrangle thousands of qubits in one place, all computing as desired, it would potentially have a computer far more powerful than one with a similar number of traditional bits.

One key area where quantum computers could have an impact is encryption and security. Governments could use them to crack even the strongest current forms of digital encryption, or create new forms that are unbreakable. This is likely one reason why IARPA is interested in quantum computing. The agency has been working with other companies, like D-Wave, to develop these machines. (Though some in the field aren’t entirely sure if D-Wave’s computers are really quantum computers, researchers at Google—which bought a D-Wave machine in 2013—have just posted some new findings that they say show “a 100-million-fold speed-up” on a certain, very specific kind of problem.)
 


IBM’s quantum roadmap

IBM outlined its quantum-computing roadmap (above) but told Quartz that it could well be many years, if not decades, before a viable quantum computer is built. But a patient, methodical, and practical approach to research is what has helped the company develop world-changing technologies in the past.
DefenseOne: http://bit.ly/1NmKmEW

« The Biggest Cybersecurity Risk Is Not Identity Theft
Can You Solve The GCHQ Christmas Card Puzzle? »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CERT-SE

CERT-SE

CERT-SE is the national and governmental Computer Security Incident Response Team of Sweden.

Rockwell Automation

Rockwell Automation

Rockwell Automation offer industrial security solutions to protect the integrity and availability of your complex automation solutions.

4N6

4N6

4N6 is a privately-owned firm founded with the goal of providing expert knowledge of computer forensics.

Prevalent

Prevalent

Prevalent takes the pain out of third-party risk management. Companies use our services to eliminate the security and compliance exposures that come from working with vendors and suppliers.

Online Business Systems

Online Business Systems

Online Business Systems is an information technology and business consultancy. We design improved business processes enabled with robust and secure information systems.

Cyverse

Cyverse

Cyverse is a cyber-security firm which provides corporations with state-of-the-art cyber-security service-based and technological solutions made in Israel.

ioXt Alliance

ioXt Alliance

The ioXt Alliance is a group of manufacturers, industry alliances and government organizations dedicated to harmonizing best security practices in a highly connected world.

Salient Law

Salient Law

Salient Law is a virtual law firm that specialises in advising providers and users of technology on contracts involving technology.

Hawk Network Defense

Hawk Network Defense

HAWK.io is the First Fully Automated, Multi-Tenant, Cloud-Based, MDR Service Company.

DeepSeas

DeepSeas

DeepSeas is the result of a merger between Security On-Demand (SOD) and the commercial Managed Threat Services (MTS) business of Booz Allen Hamilton.

Quartz Network

Quartz Network

Quartz Network is a curated community for change-makers, up-and-comers, and professionals who are ready to grow, adapt, and thrive.

CyberGate Technologies

CyberGate Technologies

CyberGate Technologies is a world-class, customer focus cyber security service and consultancy company operating the UK, Europe, Middle East, and Africa.

DeXpose

DeXpose

DeXpose is a hybrid dark/deep web monitoring and attack surface mapping platform to help you find compromised data or exposed assets related to your organization way before threat actors.

Everfox

Everfox

Everfox (formerly Forcepoint Federal) has been defending the world's most critical data and networks against the most complex cyber threats imaginable for more than 25 years.

Socket

Socket

Socket protects software applications and critical services from malware and security threats originating in open source code.

Basalt

Basalt

Basalt provide qualified consulting services in information security, personnel security and physical security.