Archive for the ‘Quantum Computing’ Category

IBM Quantum Safe Technology: Protects Data From Encryption-Busting Attacks By Next-Generation Quantum Computers – Forbes

IBM

Quantum computing represents a loomingand inevitablethreat to almost every aspect of our digital world that is protected by current forms of encryption. Either within this decade or the next, quantum computers will become powerful enough to easily overwhelm todays state-of-the-art cryptography. Our most popular encryption algorithms are based on mathematics impossible for supercomputers to solve but pose no meaningful challenge for the advanced technology of future quantum computers.

Even though we dont know exactly when it will be possible for quantum computing to crack classical encryption, the fact that it will happen is beyond doubt. Quantum machines of the future will have the potential to break encryption algorithms that protect online transactions, financial data, and even national security and government communications.

There is only one way to avoid these potential financial disruptions every existing security algorithm must be remediated with quantum-resistant encryption.

IBM has been working on Quantum Safe technology to solve this problem for several years. Before we examine IBM's solution, we need to understand how we got here.

The current states of quantum computing and traditional cryptography

From a development standpoint, today's quantum computers are late-stage prototypes equipped with 30 to 1,000 qubits that use various hardware technologies for qubits such as supercomputing, trapped ions, neutral atoms and even particles of light.

Fault-tolerant quantum computers of the future equipped with millions of qubits are expected to improve our lives by solving problems such as assist with climate change, simulation of large molecules and the creation of new materials and drugs. However, that class of quantum computers also represents a significant threat to cryptography and the financial underpinnings of companies, society and government.

In 1994, Bell Labs mathematician Peter Shor ignited a storm of interest in quantum computing when he developed an algorithm that could theoretically factor large prime numbers. When he published his paper on whats now called Shor's algorithm, there were no quantum computers to run it. Fast forward to today, there are quantum computers, but none yet powerful enough to run Peter Shors algorithm at least, not yet.

RSA encryption is one of the most common forms of asymmetric cryptography. It is susceptible to being hacked using the Shor algorithm because it uses two large prime numbers that are multiplied together to create a public key and a private key. The public key is used to encrypt data, while the private key is used to decrypt it. The public key can be shared with everyone, while the private key is kept secret.

How much quantum computing power is needed to break encryption?

It is generally accepted by scientists that a classical supercomputer would require millions of years to crack a 2,048-bit RSA key. A long time, yes, but the number of possible combinations of prime numbers that could be used to create such a key is so vast that it would be impossible to test them in less than a few million years.

However, the same feat will be possible with an advanced quantum computer within a few hours to a few days and therein lies the problem. While classical supercomputers pose no risk to current cryptography and encryption, quantum computers will have no problem penetrating existing cryptography schemes.

One study theorized that someone would need a 20-million-qubit fault-tolerant quantum computer to break RSA-2,048 encryption in 8 hours.

RSA could also be broken with fewer qubits, but it would take longer. Fujitsu researchers estimated that a fault-tolerant quantum computer equipped with 10,000 logical qubits (a logical qubit contains multiple physical qubits) and 2.23 trillion quantum gates could also crack RSA. It wouldn't be a fast processit would take 104 daysbut it would be feasible.

Lets put those millions of qubits in perspective.

This year, IBM's quantum roadmap calls for the release of its largest gate-based quantum computer processors to date, one that uses 1,100 qubits.

Despite the limited size of our present-day quantum computers, most experts have little doubt that the technology will eventually develop the power needed to break RSA encryption within an actionable amount of time.

When will it be possible to break encryption?

But how long is eventually? There is no way to say precisely when quantum computers will be able to break current cryptographic algorithms. That said, whenever it does happen, it won't be a surprise. The capability will evolve along a sequential timeline of well-defined improvements in quantum computing power.

Besides the scale and fault-tolerance mentioned above, the cryptography-defeating quantum machine of the future will also likely employ a quantum-centric supercomputer architecture.

There have been predictions about when encryption-hacking might occur by a few expert sources:

These estimates were made several years ago. Even though a great deal of progress in quantum computing has been made since then, fault tolerance remains a significant technical challenge that may require another five or more years before it is achieved. Error mitigation will provide a partial solution, but not enough to scale quantum machines to the level needed to run a robust version of Shor's algorithm that can break RSA encryption and reveal its public and private keys.

Which types of systems are at risk?

IBM

We live in a world where almost every digital asset is protected by some type of encryption, ranging from private email accounts to subscription services to online bank and stock trading accounts to critical infrastructure systems such as the national electrical grid and municipal water systems.

It is a simple equivalence. Todays traditional encryption cannot coexist within an environment of advanced quantum computing because none of the protected systems will be secure.

Here are a few ways in which bad actors that could ranging from large state-sponsored groups to rogue criminal organizations, could damage or even cause a complete collapse of our entire financial system:

These are only a few examples of how quantum computing could be used to cause financial havoc within individual lives, companies, society, the government, or the world as a whole. The actual impact of quantum computing on economic systems is hard to predict, but such actions would clearly have a significant effect.

Many disruptions, such as those involving systems like power grids or airline traffic routing, would not remain isolated; these events would likely have significant ripple effects throughout the world economy and for an extended period. It has been estimated that losses caused by encryption intrusions could reach as much as several trillion dollars each.

The World Economic Forum recently estimated that more than 20 billion digital devices will need to be either upgraded or replaced in the next 1020 years to include new forms of quantum-safe encrypted communication.

IBM Quantum Safe Technology work has already begun

In November 2022, the U.S. Office of Management and Budget issued a memorandum ordering all federal agencies to start preparing to implement post-quantum cryptography to secure Federal data and information systems. This memo is a follow-up to a White House National Security Memorandum issued in May 2022 that made federal resources available to assist in migrating all U.S. digital systems to quantum-resilient cybersecurity standards by 2035.

Previously, NIST initiated a Post-Quantum Cryptography Standardization Process in 2016 to identify new algorithms that can resist threats posed by quantum computers. After three rounds of evaluation, NIST has identified new quantum-safe algorithms; it plans to have new quantum-safe standards in place by 2024.

The four algorithm finalists from NIST

IBM

In NISTs final round of consideration, IBM researchers were involved in developing three quantum-safe cryptographic algorithms based on lattice cryptography: CRYSTALS-Kyber, CRYSTALS-Dilithium and Falcon.

Industries have already begun to prepare for the quantum future as well. Last year the telecommunications industry organization GSMA formed a Post-Quantum Telco Network Taskforce. IBM and Vodafone were among the founding members of the taskforce to help define policy, regulation and operator business processes to protect telcos from the quantum threat.

What must be done to protect cryptography from quantum threats

As mentioned at the beginning of this article, there is only one way to protect the billions of encrypted products and services from damage that future quantum computers could cause. According to the best estimates, quantum computer threats to existing encrypted services and products will begin to happen around 2030. That means we only have six to seven years for every organization and every government agency to replace its existing public-key cryptography applications with new NIST quantum-safe algorithms.

As announced at IBMs Think 2023 conference, IBM researchers and the companys partners have been actively developing quantum-safe remediation techniques and algorithms for that exact purpose. The objective is to allow an unhampered flow-through of future quantum computing power and benefits while simultaneously providing a shield again quantums disruptive encryption-breaking power.

IBM Quantum Safe

IBMs Quantum Safe is an end-to-end solution that will assist enterprises and government agencies in identifying and replacing existing cryptography algorithms with new algorithms. Quantum Safe includes a comprehensive set of tools and capabilities to assist in transforming to an environment that can resist quantum threats.

What IBM Quantum Safe is

IBM

Quantum Safe technology brings three critical capabilities: IBM Quantum Safe Explorer, IBM Quantum Safe Advisor and IBM Quantum Safe Remediator. Each of these technology capabilities perform transformational step in the transition process, to discover, observe and transform cryptography. .

Explorer can scan source and object codes, while Advisor provides a dynamic or operational view of system-wide cryptography usage. The combined views of Explorer and Advisor offer a comprehensive view of enterprise-wide cryptography usage, both from a dynamic and static standpoint. Combined information from Explorer and Advisor can also be used to monitor and manage cryptography and any associated vulnerabilities that may arise. It can also be an input to create a transformation roadmap detailing the issues to be addressed first or determine which actions will provide the most significant benefits.

The roadmap can then be used in the transformation process, where Remediator captures best practices and automates actions when possible.

Quantum Safe architecture

IBM

Even though Explorer, Advisor and Remediator are discrete capabilities within the Quantum Safe architecture, they are integrated by sharing the same common informational model.

The Quantum Safe system creates information as a Cryptography Bill of Materials (CBOM) fashioned after the Software Bill of Materials (SBOM). The CBOM is an essential tool for migrating to quantum-safe cryptography. It identifies and inventories cryptographic assets and the dependencies, helps plan for the migration to quantum-safe algorithms with single source of truth.

It is important to highlight crucial design consideration in the Quantum Safe system. IBM made a point not to require the installation of any additional agents within the enterprise framework. The objective was to integrate with what people already had. That's why there is integration with external systems and systems of record that already exist, particularly in the continuous integration and continuous deployment (CICD) pipeline, the network monitoring systems and the configuration management database. The CICD pipeline is the set of tools and processes that automate the development, testing and deployment of software.

IBM

The example above shows one of the many possible views of data that can be captured and viewed by having Explorer scan source and object code. This view of a portfolio of applications shows where cryptography exists, along with the remediation status of each instance. This example illustrates results obtained by selecting a specific endpoint in the repository containing Java code for an application. In this instance, Explorer has scanned all of the Java files and identified particular cryptography usage within the scanned files.

The labels are self-explanatory except for the far-left purple ring. In this case, it shows that 14 algorithms are not quantum safe. If any of the algorithms were quantum safe, a portion of the purple ring would be shown as green. Explorer calls out the specific algorithms being used, such as RSA, Diffie-Hellman, AES etc.

IBM

This dynamic view of Advisor shows network data and its corresponding usage of cryptography. Also displayed are the number of TLS services in use and quantum ciphers. Double-clicking on an item will show where it is being used, along with other contextual information. Combining this view with the previous screens can provide even more information about cryptography usage.

It will be vital to use Quantum Safe TLS because a future quantum computer capable of running the Shor algorithm could easily break current TLS communications algorithms. In addition, TLS data-in-transit that has been snooped and stored could be breached at a later time when large fault-tolerant quantum computers become available.

IBM currently provides API for integrating with network security scanning tools that clients already use and ingest that network scan logs to analyze.

IBM

Quantum Safe Remediator can do automated remediation; A this stage of development, there will likely be significant amounts of code that can't be automatically remediated. In those cases, architects and developers should adopt best practices for fixing the code.

Suppose it is necessary to implement a QSE-enabled VPN, or a quantum safe proxy implementation. To address that case, IBM has codified patterns that clients can instantiate in their environment so they can understand how it works and immediately begin using it.

Note that there are only a handful of remediation patterns available. IBM has explained that it will not be creating hundreds of patterns. Instead, the company believes that right now best practice dictates the creation of engagement-driven, high-value codified patterns to provide maximum benefit for clients. It should also be noted that IBM has a library of known patterns. Based on ongoing discovery with Explorer and Advisor, IBM will be able to codify new patterns and make them available to clients.

The Quantum Safe roadmap tracks milestones and timelines

IBM

IBM's Quantum Safe roadmap is designed to identify and reinforce digital transformation initiatives based on emerging technologies. The roadmap will also support remediation efforts to make existing data assets and services quantum-safe. The roadmap also lists dates for significant industry milestones that are driven by standardization, federal government requirements or CNSA guidelines.

Roadmap data should be helpful for federal or civilian agencies or healthcare companies that must follow strict regulations about tracking requirements and dates. Suppliers can also use this information to stay abreast of quantum certification requirements.

The bottom channel on the roadmap consists of IBM infrastructure hardware and software products that on the journey to quantum-safe.

Wrapping up

We cannot predict when the first encryption-protected service or product might be breached by a quantum machine. It could be within this decade or even the next decade. Yet the crucial point remains the same: today's cryptography cannot stop future quantum computers from hacking it.

All data is at risk. Even before quantum computers can crack encryption on the fly, data that uses current encryption methods can be captured and stored by a hacker until quantum computers become powerful enough to defeat the stored data's encryption. And again, any computer system that needs to operate securely for long periods without major modification must be remediated with quantum-safe encryption. Given that almost every digital service and product in use today relies on some form of encryption for protection, it is important for every organization to begin a program to identify and swap out the old encryption for new quantum-safe algorithms as soon as possible. Remediating the old encryption won't be simple and it won't be fast. But it will be worth all the effort.

IBM Quantum Safe greatly simplifies the process of remediating old algorithms, but similar to IBMs existing quantum roadmap, Quantum Safe is an agile product that follows and improves upon the roadmap along the way. IBM will continue to add features to Quantum Safe while experimenting and working with clients to validate and improve its capabilities.

Paul Smith-Goodson is the Vice President and Principal Analyst for Quantum Computing and Artificial Intelligence at Moor Insights & Strategy. You can follow him on Twitter for current information and insights about Quantum, AI, Electromagnetics, and Space.

Moor Insights & Strategy provides or has provided paid services to technology companies like all research and tech industry analyst firms. These services include research, analysis, advising, consulting, benchmarking, acquisition matchmaking, and video and speaking sponsorships. The company has had or currently has paid business relationships with 88, Accenture, A10 Networks, Advanced Micro Devices, Amazon, Amazon Web Services, Ambient Scientific, Ampere Computing, Anuta Networks, Applied Brain Research, Applied Micro, Apstra, Arm, Aruba Networks (now HPE), Atom Computing, AT&T, Aura, Automation Anywhere, AWS, A-10 Strategies, Bitfusion, Blaize, Box, Broadcom, C3.AI, Calix, Cadence Systems, Campfire, Cisco Systems, Clear Software, Cloudera, Clumio, Cohesity, Cognitive Systems, CompuCom, Cradlepoint, CyberArk, Dell, Dell EMC, Dell Technologies, Diablo Technologies, Dialogue Group, Digital Optics, Dreamium Labs, D-Wave, Echelon, Ericsson, Extreme Networks, Five9, Flex, Foundries.io, Foxconn, Frame (now VMware), Fujitsu, Gen Z Consortium, Glue Networks, GlobalFoundries, Revolve (now Google), Google Cloud, Graphcore, Groq, Hiregenics, Hotwire Global, HP Inc., Hewlett Packard Enterprise, Honeywell, Huawei Technologies, HYCU, IBM, Infinidat, Infoblox, Infosys, Inseego, IonQ, IonVR, Inseego, Infosys, Infiot, Intel, Interdigital, Jabil Circuit, Juniper Networks, Keysight, Konica Minolta, Lattice Semiconductor, Lenovo, Linux Foundation, Lightbits Labs, LogicMonitor, LoRa Alliance, Luminar, MapBox, Marvell Technology, Mavenir, Marseille Inc, Mayfair Equity, Meraki (Cisco), Merck KGaA, Mesophere, Micron Technology, Microsoft, MiTEL, Mojo Networks, MongoDB, Multefire Alliance, National Instruments, Neat, NetApp, Nightwatch, NOKIA, Nortek, Novumind, NVIDIA, Nutanix, Nuvia (now Qualcomm), NXP, onsemi, ONUG, OpenStack Foundation, Oracle, Palo Alto Networks, Panasas, Peraso, Pexip, Pixelworks, Plume Design, PlusAI, Poly (formerly Plantronics), Portworx, Pure Storage, Qualcomm, Quantinuum, Rackspace, Rambus, Rayvolt E-Bikes, Red Hat, Renesas, Residio, Samsung Electronics, Samsung Semi, SAP, SAS, Scale Computing, Schneider Electric, SiFive, Silver Peak (now Aruba-HPE), SkyWorks, SONY Optical Storage, Splunk, Springpath (now Cisco), Spirent, Splunk, Sprint (now T-Mobile), Stratus Technologies, Symantec, Synaptics, Syniverse, Synopsys, Tanium, Telesign,TE Connectivity, TensTorrent, Tobii Technology, Teradata,T-Mobile, Treasure Data, Twitter, Unity Technologies, UiPath, Verizon Communications, VAST Data, Ventana Micro Systems, Vidyo, VMware, Wave Computing, Wellsmith, Xilinx, Zayo, Zebra, Zededa, Zendesk, Zoho, Zoom, and Zscaler.

Moor Insights & Strategy founder, CEO, and Chief Analyst Patrick Moorhead is an investor in dMY Technology Group Inc. VI, Fivestone Partners, Frore Systems, Groq, MemryX, Movandi, and Ventana Micro.

See the original post here:
IBM Quantum Safe Technology: Protects Data From Encryption-Busting Attacks By Next-Generation Quantum Computers - Forbes

Weird particle that remembers its past discovered by quantum … – New Scientist

A mysterious and long-sought particle that can remember its past has been created using a quantum computer. The particle, called an anyon, could improve the performance of quantum computers in the future.

The anyon is unlike any other particle we know because it keeps a kind of record of where it has been. Normally, repeatedly swapping particles like an electron or a photon renders them completely exchangeable, making it impossible to tell the swap has taken place.

But in the 1970s, physicists realised this wasnt the case for certain quasiparticles that can only exist in two dimensions, which were later dubbed anyons. Quasiparticles, as the name suggests, arent true particles, but rather collective vibrations that behave as if they are particles.

Unlike other particles, swapping anyons fundamentally changes them, with the number of swaps influencing the way they vibrate. Groups of a particular variety, called a non-Abelian anyon, bear a memory of the order in which they were swapped, just as a braided piece of rope retains the order in which its strands have been crossed over. But where the threads of a rope interact physically, anyons interact through the strange quantum phenomena of entanglement, where particle properties are inextricably linked through space.

This inherent memory, and the quasiparticles quantum nature, make non-Abelian anyons an attractive way to do quantum computing, but they had never been found experimentally.

Now, Henrik Dryer at quantum computing firm Quantinuum and his colleagues say they have done just that. The researchers developed a new quantum processor, called H2, which uses ytterbium and barium ions trapped using magnetic fields and lasers to create qubits, or quantum bits, the basic building block of a quantum computer.

They then entangled these qubits in a formation called a Kagome lattice, a pattern of interlocking stars common in traditional woven Japanese baskets. This gave the qubits identical quantum mechanical properties to those predicted for anyons and, when the team adjusted the interactions between the qubits in a way that was equivalent to moving the anyons around, they could test for and confirm the distinctive swap-dependent changes to the anyons properties.

This is the first convincing test thats been able to do that, so this would be the first case of what you would call non-Abelian topological order, says Steven Simon at the University of Oxford. The fact that you can play around with the anyons using the quantum computer is also useful for researchers who want to better understand this exotic state of matter, he says.

But not everyone agrees that Quantinuum has actually created non-Abelian anyons, rather than merely simulating them. I know theyre very excited about their work and they should be excited, but it is still a simulation, says Jiannis Pachos at the University of Leeds, UK. That means it might lack certain properties present in the real thing, he says.

Dryer takes a different view, saying that the quasiparticle nature of anyons means that a simulation is identical to the real thing. A counterintuitive property of these anyons is that they are not really physical, they dont care what theyre made of, says Dryer. Theyre just about information and entanglement so if you have any system that can create that kind of entanglement, you can create the same type of anyons.

Topics:

Continued here:
Weird particle that remembers its past discovered by quantum ... - New Scientist

Jellybeans: A sweet solution for overcrowded circuitry in quantum computer chips – Phys.org

This article has been reviewed according to ScienceX's editorial process and policies. Editors have highlighted the following attributes while ensuring the content's credibility:

fact-checked

peer-reviewed publication

trusted source

proofread

The silicon microchips of future quantum computers will be packed with millions, if not billions of qubitsthe basic units of quantum informationto solve the greatest problems facing humanity. And with millions of qubits needing millions of wires in the microchip circuitry, it was always going to get cramped in there.

But now engineers at UNSW Sydney have made an important step toward solving a long-standing problem about giving their qubits more breathing spaceand it all revolves around jellybeans.

Not the kind we rely on for a sugar hit to get us past the 3pm slump. But jellybean quantum dotselongated areas between qubit pairs that create more space for wiring without interrupting the way the paired qubits interact with each other.

As lead author Associate Professor Arne Laucht explains, the jellybean quantum dot is not a new concept in quantum computing, and has been discussed as a solution to some of the many pathways toward building the world's first working quantum computer.

"It has been shown in different material systems such as gallium arsenide. But it has not been shown in silicon before," he says.

Silicon is arguably one of the most important materials in quantum computing, A/Prof. Laucht says, as the infrastructure to produce future quantum computing chips is already available, given we use silicon chips in classical computers. Another benefit is that you can fit so many qubits (in the form of electrons) on the one chip.

"But because the qubits need to be so close together to share information with one another, placing wires between each pair was always going to be a challenge."

In a study published today in Advanced Materials, the UNSW team of engineers describe how they showed in the lab that jellybean quantum dots were possible in silicon. This now opens the way for qubits to be spaced apart to ensure that the wires necessary to connect and control the qubits can be fit in between. Credit: University of New South Wales

In a normal quantum dot using spin qubits, single electrons are pulled from a pool of electrons in silicon to sit under a "quantum gate"where the spin of each electron represents the computational state. For example, spin up may represent a 0 and spin down could represent a 1. Each qubit can then be controlled by an oscillating magnetic field of microwave frequency.

But to implement a quantum algorithm, we also need two-qubit gates, where the control of one qubit is conditional on the state of the other. For this to work, both quantum dots need to be placed very closely, just a few 10s of nanometers apart so their spins can interact with one another. (To put this in perspective, a single human hair is about 100,000 nanometers thick.)

But moving them further apart to create more real estate for wiring has always been the challenge facing scientists and engineers. The problem was as the paired qubits move apart, they would then stop interacting.

The jellybean solution represents a way of having both: nicely spaced qubits that continue to influence one another. To make the jellybean, the engineers found a way to create a chain of electrons by trapping more electrons in between the qubits. This acts as the quantum version of a string phone so that the two paired qubit electrons at each end of the jellybean can continue to talk to another. Only the electrons at each end are involved in any computations, while the electrons in the jellybean dot are there to keep them interacting while spread apart.

The lead author of the paper, former Ph.D. student Zeheng Wang says the number of extra electrons pulled into the jellybean quantum dot is key to how they arrange themselves.

"We showed in the paper that if you only load a few electrons in that puddle of electrons that you have underneath, they break into smaller puddles. So it's not one continuous jellybean quantum dot, it's a smaller one here, and a bigger one in the middle and a smaller one there. We're talking of a total of three to maybe ten electrons.

"It's only when you go to larger numbers of electrons, say 15 or 20 electrons, that the jellybean becomes more continuous and homogeneous. And that's where you have your well-defined spin and quantum states that you can use to couple qubits to another."

A/Prof. Laucht stresses that there is still much work to be done. The team's efforts for this paper focused on proving the jellybean quantum dot is possible. The next step is to insert working qubits at each end of the jellybean quantum dot and make them talk to another.

"It is great to see this work realized. It boosts our confidence that jellybean couplers can be utilized in silicon quantum computers, and we are excited to try implementing them with qubits next."

More information: Zeheng Wang et al, Jellybean Quantum Dots in Silicon for Qubit Coupling and OnChip Quantum Chemistry, Advanced Materials (2023). DOI: 10.1002/adma.202208557

Journal information: Advanced Materials

Read the original here:
Jellybeans: A sweet solution for overcrowded circuitry in quantum computer chips - Phys.org

LightSolver debuts ‘laser processing unit’ as alternative to quantum … – SiliconANGLE News

High-performance computing startup LightSolver Ltd. today announced what it says is the worlds first pure laser-based processing unit, providing businesses with an alternative to expensive supercomputers and unstable quantum computing platforms.

The LightSolver LPU is designed to solve business challenges that involve multiple variables. Defined as NP-hard optimization problems, they traditionally require specific mathematical models and vast amounts of computational power to solve.

LightSolver said these optimization problems are commonly faced in industries such as finance, centered around portfolio management, risk management and trading optimization. Its platform also targets problems around resource allocation, assembly line balancing and facility layout optimization in the manufacturing industry, and engineering challenges such as complex material design.

Organizations have traditionally relied on supercomputers to solve these challenges, and are also invested in quantum computers, which have the potential to become vastly more powerful. However, LightSolver says supercomputers are close to approaching their computational limits, while quantum computers are neither scalable or practical yet. Both options are incredibly expensive and require significant expertise and resources, it says.

LightSolver is different, because its LPU platform is accessible as a software-as-a-service for any organization. The startup said its quantum-inspired technology employs coupled lasers to perform extremely complex computations for intricate multi-variable problems. Built from well-understood laser technology, it can provide solutions to business optimization problems that were previously considered to be unsolvable, the company said.

Co-founder and Chief Executive Ruti Ben-Shlomi (pictured, right, alongside co-founderChene Tradonsky) told SiliconANGLE that LightSolver is being made available via a user-friendly interface through a Python package.

Many large and medium-sized companies are already familiar with mapping their business challenges as mathematical optimization problems, she explained. For organizations that do not have these capabilities yet, we offer assistance in translating their business challenges into mathematical formulations that can be solved by our SaaS.

The LPU technology is said to mimic the power of quantum computing, using all-optical lasers that require no electronics to compute. Moreover, its platform is available in an extremely small form factor, no bigger than a desktop computer, meaning it has low power requirements and operates at room temperature.

Just as graphics processing units have surpassed the capabilities of central processing units, LPUs can outperform the most powerful supercomputers, LightSolver claims. They work at the speed of light to calculate every possible variable in a problem instantaneously. For any given problem, the LPU will convert a mathematical representation into a physical logic formulation, then map it into obstacles within the lasers optical path. The laser beams will then converge into the most practical solution, which is then translated back into the business language of the user.

LightSolver says its great advantage is its ability to harness the natural properties of light to break the physical limits of electronics, enabling it to solve problems faster and with more accuracy than any supercomputer.

Ben-Shlomi was keen to point out some of the specific use cases where LightSolver can deliver a significant advantage to companies. For instance, he said that in industries such as aviation and aerospace, material manufacturing involves finding the optimized composition of materials to meet multiple constraints, such asrigidity, heat capacity and resistance.

This process can be challenging due to the complex nature of these constraints, Ben-Shlomi said. LightSolver provides fast and accurate solutions for these problems, with the ability to scale to a large number of variables.

It can also help with tasks such as warehouse optimization. If a customer has a representative mathematical model for the variables affecting the layout of its warehouses, it can simply input this into LightSolver to find the most streamlined option. If you dont have such a model yet, we can work with you to develop one that fits your specific needs, Ben-Shlomi added. Once the model is developed, you can then run it on our SaaS.

LightSolvers claims of superiority over supercomputers are backed up by a number of academic research papers. For instance, in a head-to-head challenge against an industry-leading deep learning solver, its platform was able to solve Max-2-SAT problems by up to 1,000 times faster. A second paper reveals how LightSolver was used to develop a quantum-inspired algorithm for sparse coding that resulted in more accurate estimations than classical approximation methods.

Ben-Shlomi said LightSolver will be able to maintain its advantage even when quantum computers become more mature, with the ability to scale up to thousands of variables. We can provideour solutions using a small-sized rack unit running at room temperature with low power consumption, she said. This means that we can leverage the power of quantum computing without the need for large, expensive hardware or specialized cooling systems and solve complex optimization problems more efficiently and cost-effectively.

TheCUBEis an important partner to the industry. You guys really are a part of our events and we really appreciate you coming and I know people appreciate thecontent you create as well Andy Jassy

THANK YOU

View original post here:
LightSolver debuts 'laser processing unit' as alternative to quantum ... - SiliconANGLE News

Why CBA placed an early bet on quantum computing – The Australian Financial Review

Most modern cryptography, like the codes that keep transactions safe online, is at threat from quantum computing, he said.

Theres a lot of research to design quantum-resistant cryptography. So, thats one area that were paying a lot of attention to make sure that we are able to do quantum-resistant cryptography well ahead of quantum computers being available.

Mr Hopper said that while commercially available general-purpose quantum computers were still likely decades away, the bank was preparing for a future with the powerful new computing resource.

If you think about the spread of the internet, companies who got in early on that were just in a better position. It was a smart thing to get in early, he said.

Following the release of the national quantum computing strategy last week, the federal government has allocated $101.2 million over five years to support businesses integrating quantum and artificial intelligence (AI) technologies into their operations.

The package includes $20 million over four years to establish an Australian Centre for Quantum Growth, $40 million to encourage business uptake, and $40 million to extend the CSIRO-run National AI Centre.

Mr Hopper welcomed a big, bold step forward for quantum across Australia that he said recognised its potential to be a world leader and the need for ongoing support from government, academia and industry.

Professor Simmons, CEO of Silicon Quantum Computing, said the package proved the government recognised the importance of quantum technologies for Australias future.

The approach contains a range of schemes that will bolster this growing sector and help accelerate commercialisation so that quantum technologies become a great source of future prosperity for Australia, she said.

Silicon Quantum Computing is achieving remarkable results in its devices but support from the government is essential in these deep tech areas where there is a global race.

Michael Biercuk, chief executive and founder of quantum start-up Q-CTRL, said Australia was facing an increasingly competitive landscape and there was a growing risk the local sector would lose its edge if funding dipped.

As other nations invest heavily in quantum technologies, Australia must stay vigilant and match long-term capital commitments to ambitions in order to avoid repeating missed opportunities of the past, Mr Biercuk said.

The Australian Information Industry Association had advocated for a $1 billion investment over five years in quantum technologies.

The budget is good for the tech sector, but there remains room for greater support, association chief executive Simon Bush said.

View post:
Why CBA placed an early bet on quantum computing - The Australian Financial Review