Archive for the ‘Quantum Computing’ Category

QuSecure Selected to Present at IEEE Women in Engineering International Leadership Conference Next Week – Yahoo Finance

Co-founder and CPO Rebecca Krauthamer to Present on Quantum Ethics in Security on June 6

SAN MATEO, Calif., June 02, 2022--(BUSINESS WIRE)--QuSecure, Inc., an innovator in post-quantum cybersecurity, (PQC), today announced that it has been selected to present at the IEEE Women in Engineering International Leadership Conference next week, being held at the San Diego Convention Center in San Diego, Calif.

Company Co-founder and Chief Product Officer (CPO) Rebecca Krauthamer will present "Quantum Ethics in Security" as part of the programs Track 2: Transforming Technology, Sustainable Technology, in Room 30CD at 1:15 pm PDT on June 6. Krauthamer is a strong advocate of building ethical technology and bringing awareness to cybersecurity and data privacy rights. Last year, she co-authored a report with a team of experts from the World Economic Forum on Quantum Computing Governance Principles, which was aimed at providing guidance to governments and organizations around policymaking for ethics-driven quantum computing development.

"Im honored to speak with the current and future female leaders at IEEEs conference," said Krauthamer. "We all have a responsibility to proactively protect peoples basic right to data privacy. It is critical to understand both the incredible opportunities quantum computers will afford us as well as the immediate threat they pose to our data privacy."

Launched in 2014, the mission of the IEEE Women in Engineering International Leadership Conference (IEEE WIE ILC) is to inspire, engage, and advance women in technology, whether in industry, academia, or government. The vision for the conference is to provide attendees with the opportunity to create communities that fuel innovation, facilitate knowledge sharing, and provide support through highly interactive sessions designed to foster discussion and collaboration. The IEEE WIE ILC focuses on providing leading-edge professional development for mid-level and senior-level women.

Story continues

At QuSecure, Krauthamer heads product development for QuProtect, which provides quantum-resilient cryptography, anytime, anywhere and on any device. QuProtect uses an end-to-end quantum security as a service (QSaaS) architecture that addresses the digital ecosystems most vulnerable aspects, uniquely combining zero-trust, next-generation post-quantum cryptography, quantum-strength keys, high availability, easy deployment, and active defense into a comprehensive and interoperable cybersecurity suite. The end-to-end approach is designed around the entire data lifecycle as data is stored, communicated, and used.

About Rebecca Krauthamer

Rebecca Krauthamer is Co-Founder and CPO of QuSecure, Inc., which has developed quantum resilience, protecting the enterprise and government from quantum and classical hacking. Krauthamer is a Forbes 30 under 30 list honoree in the extremely competitive category of science for her outstanding work in quantum computing. She was also listed as one of the Top 12 Women Pioneering the World of Quantum Computing, and is a Quantum Futures Council member at the World Economic Forum. Krauthamer also formerly served as CEO of Quantum Thought, a venture studio creating quantum intellectual property. She graduated with a degree in symbolic systems from Stanford University.

About QuSecure

QuSecure is an innovator in post-quantum cybersecurity (PQC) with a mission to protect enterprise and government data from quantum and classical cybersecurity threats. Its quantum-safe solutions provide an easy transition path to quantum resiliency across any organization. The companys QuProtect solution is the industrys first PQC software-based platform uniquely designed to protect encrypted communications and data with quantum-resilience using a quantum secure channel. QuSecure has current customer deployments in banking/finance, healthcare, space/satellite, IT/data enterprises, datacenters, and various Department of Defense agencies. QuSecure is investor backed and has offices in Silicon Valley. For more information visit http://www.qusecure.com.

QuSecure and QuProtect are registered trademarks of QuSecure in the United States and other countries. All other company and product names are either trademarks or registered trademarks of their respective companies.

View source version on businesswire.com: https://www.businesswire.com/news/home/20220602005366/en/

Contacts

Dan Spaldingdspalding@qusecure.com (408) 960-9297

Read this article:
QuSecure Selected to Present at IEEE Women in Engineering International Leadership Conference Next Week - Yahoo Finance

PH community to host webinar on quantum computing – Backend News

OneQuantum Philippines will host Reinvent your Careers with Quantum Computing online on June 3, 2002, at 7 p.m.

John Barnes, founder of Entangled Positions, will be the speaker. Asher Manangan and Bobby Corpus, both of OneQuantum Philippines, will be the moderators.

Quantum computing will impact the future of every area in Academia and Industry, so the need for a quantum-capable workforce is great. Join us for a career session in Quantum Computing, with John Barnes, founder of Entangled Positions and President of OneQuantum UK, and learn how to reinvent your careers and take exciting opportunities in this field.

John Barnes is a recruiter, headhunter, and community builder. Having founded Entangled Positions, and previously Profecta Associates, he is also President of OneQuantum UK and OneQuantum Europe, Special Advisor for Workforce and Talent to the Quantum Strategy Institute, and host of the Entangled Discussions podcast.

Deconstructing Quantum Computing

RSVP here.

OneQuantum Philippines is a local chapter of the OneQuantum global community. It aims to make the Philippines a quantum-ready nation by educating students at an early age so it would be easy for them to acquire quantum computing skills. For more information, visit OneQuantum Philippines website.

Related Stories

Read the original here:
PH community to host webinar on quantum computing - Backend News

Researchers Find Coherence in Quantum Chaos – HPCwire

May 26, 2022 A theoretical breakthrough in understanding quantum chaos could open new paths into researching quantum information and quantum computing, many-body physics, black holes, and the still-elusive quantum to classical transition.

By applying balanced energy gain and loss to an open quantum system, we found a way to overcome a previously held limitation that assumed interactions with the surrounding environment would decrease quantum chaos, said Avadh Saxena, a theoretical physicist at Los Alamos National Laboratory and member of the team that published thepaper on quantum chaosin Physical Review Letters. This discovery points to new directions in studying quantum simulations and quantum information theory.

Quantum chaos differs from classical-physics chaos theory. The latter seeks to understand deterministic, or non-random, patterns and systems that are highly sensitive to initial conditions. The so-called butterfly effect is the most familiar example, whereby the flap of a butterflys wings in Texas could, through a bewilderingly complicated but not random chain of cause and effect, lead to a tornado in Kansas.

On the other hand, quantum chaos describes chaotic classical dynamical systems in terms of quantum theory. Quantum chaos is responsible for the scrambling of information occurring in complex systems such as blackholes. It reveals itself in the energy spectra of the system, in the form of correlations between its characteristic modes and frequencies.

It has been believed that as a quantum system loses coherence, or its quantumness, by coupling to the environment outside the systemthe so-called quantum to classical transitionthe signatures of quantum chaos are suppressed. That means they cant be exploited as quantum information or as a state that can be manipulated.

It turns out thats not entirely true. Saxena, University of Luxembourg physicists Aurelia Chenu and Adolfo del Campo, and collaborators found that the dynamical signatures of quantum chaos are actually enhanced, not suppressed, in some instances.

Our work challenges the expectation that decoherence generally suppresses quantum chaos, Saxena said.

The energy values in the spectra of the quantum system were previously thought to be complex numbersthat is, numbers with an imaginary number componentand thus not useful in an experimental setting. But by adding energy gain and loss at symmetrical points in the system, the research team found real values for the energy spectra, provided that the strength of gain or loss is below a critical value.

Balanced energy gain and loss provides a physical mechanism to realize in the laboratory the kind of energy-spectral filtering that has become ubiquitous in theoretical and numerical studies of complex many-body quantum systems, del Campo said. Specifically, balanced energy gain and loss in energy dephasing leads to the optimal spectral filter. Thus, one could leverage balanced energy gain and loss as an experimental tool not only to probe quantum chaos but to study many-body quantum systems in general.

By changing the decoherence, Saxena and del Campo explained, the filter allows better control of energy distribution in the system. That can be useful in quantum information, for example.

Decoherence limits quantum computing, so it follows that because increasing quantum chaos reduces decoherence, you can keep computing longer, Saxena said.

The teams paper builds on previous theoretical work by Carl Bender (of Washington University at St. Louis and former Ulam scholar at Los Alamos) and Stefan Boettcher (formerly of Los Alamos and now at Emory University). They found that, contrary to the accepted paradigm from the early twentieth century, some quantum systems yielded real energies under certain symmetries even though their Hamiltonian was not Hermitian, which means it satisfies certain mathematical relations. In general, such systems are known as non-Hermitian Hamiltonians. A Hamiltonian defines the energy of the system.

The prevailing understanding was that decoherence suppresses quantum chaos for Hermitian systems, with real energy values, Saxena said. So we thought, what if we take a non-Hermitian system?

The research paper studied the example of pumping energy into a wave guide at a particular pointthats the gainthen pumping energy out againthe losssymmetrically. The wave guide is an open system, able to exchange energy with the environment. Instead of causing decoherence, they found, the process and interactions increase coherence and quantum chaos.

Paper:Spectral filtering induced by non-Hermitian evolution with balanced gain and loss: enhancing quantum chaos,by J. Cornelius, Z. Xu, A. Saxena, A. Chenu and A. del Campo, in Physical Review Letters. DOI: https://doi.org/10.1103/PhysRevLett.128.190402

Funding:The work was supported by Laboratory Directed Research and Development at Los Alamos National Laboratory.

Source: LANL

More here:
Researchers Find Coherence in Quantum Chaos - HPCwire

BlackBerry and NXP Join Forces to Help Companies Prepare For and Prevent Y2Q Post-Quantum Cyber Attacks – BlackBerry

WATERLOO, ONTARIO May 25, 2022 BlackBerry Limited (NYSE: BB; TSX: BB)today announced it will provide support for quantum-resistant secure boot signatures for NXP Semiconductors (NASDAQ: NXPI) crypto-agile S32G vehicle networking processors in a demonstration to illustrate how to mitigate the risk of potential quantum computing attacks on in-vehicle software.

The new integration will allow software to be digitally signed using the National Institute of Standards and Technologys (NIST) recently endorsed CRYSTALS Dilithium digital signature scheme that will be quantum resistant, providing peace of mind to those relying on and delivering long lifecycle assets such as systems in critical infrastructure, industrial controls, aerospace and military electronics, telecommunications, transportation infrastructure, and connected cars. The collaboration is set to guard against an increasingly risky future when quantum computers will be able to easily break traditional code signing schemes.

For more information, register to attend the one hour Post-Quantum Cyber Attacks, how to Prepare and Prevent webinar on June 9, 2022 at 11:00 a.m. ET.

While quantum computing promises to deliver huge leaps forward in processing power, it also has the potential to render today's public key cryptography useless. In recent months, NATO, the White House and NIST have all taken steps to prepare for a Y2Q scenario in which quantum computers become weaponized by threat actors and many widely used security methods become useless against next-generation attacks.

The BlackBerry Certicom Code Signing and Key Management Server leverages the NXP S32G chips secure boot flow to achieve fast and agile quantum protection. Using quantum-resistant signature schemes such as Dilithium for low-level device firmware, over-the-air software updates and software bills of material (SBOMs) mitigates the risk of potential quantum computing attacks on critical software updates, addressing a major security concern for a number of industries.

As quantum computers continue to advance in development, its increasingly important to work to secure todays systems against these future threats, said Joppe Bos, Senior Principal Cryptographer at NXP Semiconductors. Collaborating with BlackBerry strengthens our solution to address the critical need to harden code signing and software update infrastructure against future cryptosystem vulnerabilities.

In the lead up to Y2K, US business spent upwards of $100 billion to avoid calamity and the issue was simply a matter of adding two digits to the date field. Y2Q, when quantum attacks become possible, is on another level, posing a significant threat to industries selling or operating long-lived assets with updatable software, said Jim Alfred, VP, BlackBerry Technology Solutions. NXP shares our vision of mitigating the risk of quantum computing concerns and, thanks to their support for hash-based signatures, together we can provide cybersecurity teams with the tools they need now to prevent their existing security measures from becoming obsolete.

To learn more about the Code Signing and Key Management Server and why BlackBerry Certicom technology is widely deployed in smartphone chips, smart meters, car telematics, and IoT devices, please visit http://www.certicom.com.

###

About BlackBerry

BlackBerry (NYSE: BB; TSX: BB) provides intelligent security software and services to enterprises and governments around the world. The company secures more than 500M endpoints including over 195M vehicles. Based in Waterloo, Ontario, the company leverages AI and machine learning to deliver innovative solutions in the areas of cybersecurity, safety and data privacy solutions, and is a leader in the areas of endpoint security, endpoint management, encryption, and embedded systems. BlackBerrys vision is clear - to secure a connected future you can trust.

BlackBerry. Intelligent Security. Everywhere.

For more information, visit BlackBerry.com and follow @BlackBerry.

NXP and the NXP logo are trademarks ofNXP B.V. All other product or service names are the property of their respective owners. All rights reserved.2022 NXP B.V.

Trademarks, including but not limited to BLACKBERRY and EMBLEM Design are the trademarks or registered trademarks of BlackBerry Limited, and the exclusive rights to such trademarks are expressly reserved. All other trademarks are the property of their respective owners. BlackBerry is not responsible for any third-party products or services.

###

Media Contact:BlackBerry Media Relations+1 (519) 597-7273mediarelations@BlackBerry.com

Go here to see the original:
BlackBerry and NXP Join Forces to Help Companies Prepare For and Prevent Y2Q Post-Quantum Cyber Attacks - BlackBerry

Back to the Future: Protecting Against Quantum Computing – Nextgov

The previous two years have proven the importance of proactively working to secure our data, especially as organizations underwent digital transformations and suffered increased cyberattacks as a result. For those organizations that have been breached, but their data hasnt yet been exploited and released to the wild, it may already be too late.

Organizations that have already experienced a data breach may become victims of harvest today, decrypt tomorrow or capture-now-decrypt-later attacks. These attacks, also referred to as harvesting for short, capitalize on known vulnerabilities to steal data that may not even be truly accessible using todays decryption technologies.

These attacks require long-term planning and projections on the advancement of quantum-computing technologies. While these technologies may still be years away from being commercially available and widely used, organizations should look to protect against these threats now to prevent themselves from becoming a future casualty.

Before getting into more detail on the future threat posed by quantum computing, we should look to a historic example to inform our present decision-making.

Lessons from the Enigma

In 1919 a Dutchman invented an encoding machine that was universally adopted by the German army, called the Enigma. Unbeknownst to Germany, the Allied powers managed to break the coding scheme, and were able to decode some messages as early as 1939, when the first German boots set foot in Poland. For years, however, the German army believed the Enigma codes were unbreakable and was communicating in confidence, never realizing their messages were out in the open.

History may already be repeating itself. I cant help but think that most organizations today also believe that their encrypted data is safe, but someone else may be close to, or already, reading their secure mail without them even knowing.

Todays modern cryptography is often deemed unbreakable, but a big, shiny black building in Maryland suggests that governments may be better at this than is widely believed. Although a lot of credit goes to the magical and elusive quantum computer, the reality is different: poor implementations of crypto suites are the primary vector for breaking encryption of captured traffic. So are certificates captured through other means, brute-forced passwords and even brute-forced crypto, because insufficient entropy is used to generate random numbers.

All these techniques are part of the arsenal of any nation who wants to strategically collect information on the happenings of other international playerswhether government or private companies. These techniques also require higher levels of coordination and financial backing to be a successful part of an intelligence strategy. As I continue to see, when the value of the captured information is high enough, the investment is worth it. Consider then the vast data centers being built by many governments: they are full of spinning disks of memory storage just in case current approaches don't yield access. Data storage has become an investment in the future of intelligence gathering.

Looking towards the future

Harvesting attacks does not just work as a strategy for quantum computers. We will likely have more powerful processors for brute-forcing in the future. Additionally, other types of stochastic computation machines, such as spintronics, are showing promise and even the de-quantification of popular algorithms may one day see a binary computer version of Peter Shors algorithm. The latter helps us explain how quantum computing may help to make quick work of current encryption techniques. This will allow breaking of Diffie-Hellman key exchanges or RSA on a conventional computer in smaller time frames.

So how do we shield ourselves? It is hard to imagine armoring oneself against any possible threat to encryption. Just like it is difficult to predict exactly which stocks will do well, and which ones won't. There are too many factors and too much chaos. One is left with only the option of diversification: using an out-of-band key distributing strategy that allows multiple paths for key and data to flow, and a range of algorithms and keys to be used. By diversifying our cryptographic approaches we are also able to minimize the damage in case a particular strategy fails us. Monocultures are at risk of pandemics, let's not fall victim to encryption monoculture as we move into the future.

It is past time to take steps now that will protect organizations from future threats. This includes developing actionable standards. Both federal agencies and the private sector need to embrace quantum-safe encryption. Additionally, they should look to develop next-generation, standards-based systems that will address current encryption method shortcomings and poor key management practices. This will help to ensure not only quantum-safe protection from future threats, but also stronger security from contemporary threats.

Organizations face a dizzying array of threats and need to constantly remain vigilant to thwart attacks. While looking to protect against current threats is certainly important, organizations should begin projecting future threats, including the threat posed by quantum computing. As technology continues to advance each day, one should remember that past encryption, like the Enigma machine, didnt remain an enigma for long and was broken in time. The advent of quantum computing may soon make our unbreakable codes go the way of the dinosaur. Prepare accordingly.

Follow this link:
Back to the Future: Protecting Against Quantum Computing - Nextgov