Archive for the ‘Quantum Computing’ Category

India Approves National Quantum Mission. It Will Cost Rs 6,000 Crore – NDTV

Centre approved the National Quantum Mission at a cost to Rs 6,003.65 crore from 2023-24 to 2030-31.

The government today approved the National Quantum Mission to nurture and scale up scientific and industrial research and development in quantum technology.

The mission involves a cost to Rs 6,003.65 crore from 2023-24 to 2030-31.

The National Quantum Mission (NQM), approved at a meeting of the Union Cabinet chaired by Prime Minister Narendra Modi, will accelerate quantum technology-led economic growth and nurture the ecosystem in the country.

"NQM is going to give India a quantum jump in this arena," Science and Technology Minister Jitendra Singh told reporters here.

India will be the sixth country to have a dedicated quantum mission after the US, Austria, Finland, France and China.

"The new mission targets developing intermediate scale quantum computers with 50-1000 physical qubits in eight years in various platforms like superconducting and photonic technology," he said.

He said satellite-based secure quantum communications between ground stations over a range of 2000 km within India, long distance secure quantum communications with other countries, inter-city quantum key distribution over 2000 km as well as multi-node quantum network with quantum memories are also some of the deliverables of the mission.

Mr Singh said the mission will help develop magnetometers with high sensitivity in atomic systems and atomic clocks for precision timing, communications and navigation.

It will also support design and synthesis of quantum materials such as superconductors, novel semiconductor structures and topological materials for fabrication of quantum devices, Mr Singh said.

He said single photon sources/detectors, entangled photon sources will also be developed for quantum communications, sensing and metrological applications.

Mr Singh said four thematic hubs (T-Hubs) will be set up in top academic and national research and development institutes on the domains - quantum computing, quantum communication, quantum sensing and metrology, and quantum materials and devices.

"The hubs which will focus on generation of new knowledge through basic and applied research as well as promote R&D in areas that are mandated to them," the minister said.

Mr Singh said the mission can take the technology development ecosystem in the country to a globally competitive level.

The mission would greatly benefit communication, health, financial and energy sectors as well as drug design, and space applications.

It will provide a huge boost to National priorities like Digital India, Make in India, Skill India and Stand-up India, Start-up India, Self-reliant India and Sustainable Development Goals (SDG), Mr Singh said.

(Except for the headline, this story has not been edited by NDTV staff and is published from a syndicated feed.)

Waiting for response to load...

Read this article:
India Approves National Quantum Mission. It Will Cost Rs 6,000 Crore - NDTV

Quantum light source goes fully on-chip, bringing scalability to the quantum cloud – Interesting Engineering

Scientists from the Leibniz University Hannover in Germany, the University of Twente in the Netherlands, and a start-up company QuiX Quantum have demonstrated a fully integrated quantum light source on a chip smaller than a one-euro coin.

The study published in Nature Photonics on April 17, 2023, could be a game-changer for enabling quantum technologies such as quantum computers and unhackable secure communication channels.

Quantum light sources produce photons (light particles) that can be used as quantum bits or qubits. Integrated or on-chip photonics are becoming popular for processing optical quantum states as they are robust, compact, and scalable, making them ideal for various quantum applications.

However, one of the significant challenges with quantum sources is that they are bulky laser systems. Additionally, they are external sources and off-chip, which makes the qubits susceptible to noise, thereby limiting the usability of quantum sources even more.

To overcome these problems, scientists used hybrid technology. They did this to combine the indium phosphide laser, a laser cavity, and a filter, all on a single chip. This technology not only overcomes the earlier-mentioned challenges but also allows the development of quantum systems on a chip at room temperature and lowers the production cost for various quantum computing applications.

Follow this link:
Quantum light source goes fully on-chip, bringing scalability to the quantum cloud - Interesting Engineering

SandboxAQ Unveils Security Suite for End-to-end Cryptographic Vulnerability Scanning and Remediation – Quantum Computing Report

By Carolyn Mathas

Large fault-tolerant quantum computers provide a substantial threat to existing public-key cryptography, rendering sensitive data and systems vulnerable to attacks. Moving to new encryption methods, however, may take a decade or longer to complete. In response, SandboxAQ just unveiled itsSandboxAQ Security Suite, an end-to-end cryptographic-agility platform providing cryptographic vulnerability scanning and remediation. SandboxAQ claims that its Security Suite is the industrys first complete solution for cryptographic inventory that includes analysis and inventory of filesystems, applications, and networks.

The SandboxAQ Security Suite architecture is based on three modules that enable discovery, management and remediation.

Enterprises and government agencies already making use of one or more modules of the SandboxAQ Security Suite include global banks, Cloudera, Informatica, the U.S. Air Force and the U.S. Department of Health & Human Services. Strategic alliances are also in place with Deloitte and EY to help enterprise customers identify and remediate encryption vulnerabilities. Small organizations also able to benefit from the suite by subscribing to a SaaS service and paying only for the modules and usage they need. In comparison, large enterprise customers typically access the solution on-premises or self-hosted in their own cloud.

According to Graham Steel, head of product in SandboxAQs Quantum Security division, Getting started right now is critical. Adversaries are not waiting for quantum computers to launch their attackstheyre already engaged in Store Now Decrypt Later attacks, acquiring sensitive encrypted data now for future decryption, Steel further explained that transitioning to quantum-safe encryption and implementing crypto-agility could take years. Many organizations with complex IT infrastructures are concerned whether this can be completed before large-scale quantum computers are available to carry out decrypt right now attacks. Our Security Suite is designed to accelerate every stage of this process, he added.

The SandboxAQ Security Suites cryptographic agility enables customers to seamlessly swap cryptographic protocols amid ever-changing regulatory requirements and cyber threats. This concept of crypto-agility will become mandatory to protect organizations against classical and quantum-based attacks, while maintaining regulatory compliance.

Additional information about the SandboxAQ Security Suite is available in a press release posted here.

April 19, 2023

The rest is here:
SandboxAQ Unveils Security Suite for End-to-end Cryptographic Vulnerability Scanning and Remediation - Quantum Computing Report

EY and IBM expand strategic alliance into quantum computing USA … – PR Newswire

LONDON, April 14, 2023 /PRNewswire/ -- The EY organization and IBM (NYSE: IBM) today announced that EY Global Services Limited will be joining the IBM Quantum Network, further enabling EY teams to explore solutions with IBM that could help resolve some of today's most complex business challenges. The EY organization will gain access to IBM's fleet of quantum computers over the cloud, and will become part of the IBM Quantum Network's community of organizations working to advance quantum computing.

Quantum computing is a rapidly emerging technology that harnesses the laws of quantum mechanics to solve problems that today's most powerful supercomputers cannot practically solve. EY teams will leverage their access to the world's largest fleet of quantum computers to explore solutions to enterprise challenges across finance, oil and gas, healthcare, and government.

The EY organization established its own Global Quantum Lab last year with a mission to harness quantum value in the domains of trust, transformation and sustainability. Using IBM quantum technology, EY teams plan to conduct leading-class practice research to uncover transformative use cases, including: the reduction of CO2 emissions from classical computing, the improvement of safety and accuracy of self-driving cars, and most critically, integrate quantum benefits into organizations' mainstream systems for data processing and enterprise decision making.

Andy Baldwin, EY Global Managing Partner Client Service, says:

"Quantum, in terms of importance to business, society and the EY organization, is akin to what AI represented years ago. This alliance puts the EY organization at the forefront of technology. As we invest in this level of quantum computing access, we accelerate our own position and depth of knowledge and capabilities in this space and deepen the rich relationship with our IBM alliance teams."

Jeff Wong, EY Global Chief Innovation Officer, says:

"As we navigate this period of technology-led change, which is accelerating at unprecedented speed, companies must have a full understanding of how to maximize breakthrough innovations in order to keep pace. Through this collaboration with IBM, the EY organization will now have the ability to take advantage of quantum computing to propel its innovation journey."

Jay Gambetta, Vice President IBM Quantum, says:

"IBM's vision is to deliver useful quantum computing to the world. We value partners like the EY organization that can introduce the emerging technology to a wide ecosystem of public and private industry. This will help EY facilitate the exploration of quantum computing's potential for use cases that matter in its industry."

Membership in the IBM Quantum Network is part of a broader effort by the EY organization to invest and develop robust capabilities in emerging technologies, which already include artificial intelligence, blockchain, and metaverse development. Beyond the increased investment of the EY-IBM Alliance, the EY organization is investing $10 billion in technology initiatives over three years, including investment in the organization's own quantum function.

More information on the EY-IBM Alliance, here.

About EY

EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets.

Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate.

Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

EY refers to the global organization, and may refer to one or more, of the member firms of Ernst & Young Global Limited, each of which is a separate legal entity. Ernst & Young Global Limited, a UK company limited by guarantee, does not provide services to clients. Information about how EY collects and uses personal data and a description of the rights individuals have under data protection legislation are available via ey.com/privacy. EY member firms do not practice law where prohibited by local laws. For more information about our organization, please visit ey.com.

This news release has been issued by EYGM Limited, a member of the global EY organization that also does not provide any services to clients.

About IBM

IBM is a leading global hybrid cloud and AI, and business services provider, helping clients in more than 175 countries capitalize on insights from their data, streamline business processes, reduce costs and gain the competitive edge in their industries. Nearly 3,800 government and corporate entities in critical infrastructure areas such as financial services, telecommunications and healthcare rely on IBM's hybrid cloud platform and Red Hat OpenShift to affect their digital transformations quickly, efficiently, and securely. IBM's breakthrough innovations in AI, quantum computing, industry-specific cloud solutions and business services deliver open and flexible options to our clients. All of this is backed by IBM's legendary commitment to trust, transparency, responsibility, inclusivity, and service. For more information, visit https://www.ibm.com/quantum

Logo - https://mma.prnewswire.com/media/1721690/EY_Logo.jpg

SOURCE EY

View post:
EY and IBM expand strategic alliance into quantum computing USA ... - PR Newswire

What is the purpose of post-quantum cryptography? – TechHQ

What is the purpose of post-quantum cryptography? The basic, white bread answer would be to keep all your secret stuff safe in the apparently imminent age of quantum computing, when standard cryptographic algorithms will be worth less than the paper on which you print them out.

Thats it in a nutshell. Quantum computing, a development thats set to massively increase the processing power and speed of computers as we know them, is, according to plenty of cryptographic experts, likely to pull on the thread of all known, pre-quantum cybersecurity, and keep pulling until all our carefully constructed cryptography is just a pile of numbers around our naked, exposed ankles.

Post-quantum cryptography is a collective term for an ever-growing group of methods that will allow quantum computing to exist while still protecting all our secrets (like bank account numbers, Netflix passwords etc, but also like access codes to nuclear or chemical laboratories, government buildings, national critical infrastructure systems and more). Without the ability to have and keep secrets, the world as weve come to know it would stop functioning in a big, big hurry.

The problem as it exists is that a lot of our pre-quantum cybersecurity is based on public-key technology. Whats public-key? Essentially, its just a large numerical value that we use to encrypt our data. Imagine, say, ten Rubik cubes, linked together through the center. Every move you make to solve one cube makes the same move on every other cube, each of which have a different initial configuration.

Its theoretically possible to solve all the puzzles together, but it a) takes quite the computational genius, and b) takes the computers we have a good deal of time, during which, a handful of cheerful alarms can be set off and security teams can come metaphorically running to intercept and throw out the potential hacker.

Thats great, so long as everyones using the same kind of computer, because it creates an unlikely but usefully level playing field.

The reason quantum computing is expected to be so fast is that it will be able to handle not only comparatively vast numbers of numbers simultaneously, but also vast numbers of computations simultaneously.

Its likely to look at the intricately constructed mega-puzzle that is pe-quantum public-key encryption, smile indulgently, say Cute, solve the whole thing in the time it takes to say Cute, and go about its Wikileaky day, leaving everything that had been protected by public-key encryption exposed to the elements, the hackers, the blackmailers and the hostile nation states.

At least, thats the theory. We dont technically know that quantum computing will be able to do that, and theres a sense of Millennium Bug planning about the whole thing. But as with Millennium Bug planning, if the nightmare scenario of quantum computing does come true and leave everything using public-key encryption open and exposed, were going to feel mighty foolish for the half-hour or so before the world dissolves into chaos, anarchy, James Bond movie plots and possibly a primitive non-computer dystopia.

Incidentally, its true of course that public-key is only half the story of pre-quantum cryptography. Theres also a private-key element, which is usually individual-specific. But its widely considered that if quantum computers can crack public-key cryptography, then private-key is likely to be little more than an hors doeuvres of decryption, the easy sudoku before it moves on to the cryptic version.

Hence the need to be prepared for the era of quantum computing by deploying post-quantum cryptography. But what really is the purpose of post-quantum cryptography? What does it really mean, and perhaps more to the point, how do we really do it? If the giant number-cruncher is coming for all our precious secrets, how in the world do we protect them?

Naturally enough, the way post-quantum cryptography works depends on understanding the purpose behind it, and the way the quantum computers are most likely to work.

Behind our folksy, easily digestible Rubik cube analogy, pre-quantum public-key cryptography tends to rely on three hard math problems: the integer factorization problem, the discrete logarithm problem, and the elliptic-curve discrete logarithm problem.

Feel free to look them up if you want to go beyond the Rubik cube analogy. Google will pretend to be your friend.

Post-quantum cryptography, perhaps perversely, will still most likely use public-key as its core approach, but will likely focus on any one or more of a handful of other techniques, given that quantum computers are expected to be able to solve the existing security problems in a handful of digital heartbeats, thanks to their ability to rapidly deploy Shors algorithm.

In brief, the front runner types of public-key algorithms that are most likely to deliver post-quantum cryptography are:

In particular, its worth keeping an eye on NTRU lattice-based cryptography, which has some significant testing behind it (with, admittedly, current computers), and has so far withstood years of attempts to crack it. Thats why NTRU lattice-based cryptography or at least something called the StehleSteinfeld variant of NTRU is being promoted for study as a potential standard of post-quantum cryptography by the Post Quantum Cryptography Study Group sponsored by the European Commission.

Less fun than they sound, hash-based cryptographic algorithms have been around since the 1970s (and as such, we might think them useless in fighting 2020s or 2030s quantum computer intrusion). Actually though, their fundamental nature as alternatives to numerical digital signatures might have some skin in the post-quantum cryptography fight. As yet, theyre less supported for investigation than the likes of lattice-based cryptography, but theres nothing fundamental that says evolutions of the likes of Lamport or Merkle signatures might not have a part to play in the post-quantum world.

Another contender favored by the European Commission, code-based cryptographic algorithms tend to rely on error-correcting codes. Ironically, one algorithm called the McEliece signature has withstood attempts to crack it for over 40 years by using random codes. Researchers that have tried to add more structure to the McEliece signature have invariably made it weaker and less stable, suggesting that useful randomness may have a part to play in post-quantum cryptography.

While it might not exactly trip off the tongue, supersingular elliptic curve isogeny cryptography might well prove useful for forward secrecy (useful for avoiding the likes of mass surveillance by unfriendly governments). Its also essentially a quantum-resistant version of an already widely-used version of public-key cryptography, the elliptic curve Diffie-Hellman key, so there are arguments in favor of it being a minimal-hassle upgrade.

Another alternative that more or less already exists is symmetric keys. Public-key cryptography is one thing, symmetric key cryptography another, but its another that already exists and is in use, and is expected to be quantum intrusion-resistant. That means there are many organizations suggesting we simply switch out public-key cryptography for symmetric key cryptography altogether.

Whether that will deliver a long-term solution remains as yet hard to judge at least until we see fully-powered quantum computers, up, running, and on their game. But its certainly a theoretical way of deferring the problem while robust long-term post-quantum cryptographic algorithms are tested and developed in the field.

One of the longer shots in the field right now, multivariate cryptography is exactly what it sounds like cryptography based on the solving of multivariate equations. In its current form, its not been particularly effective in testing, and in principle, the idea of essentially making public-key cryptography just a little more complex probably wont survive more than a couple of rounds of evolution of fully-powered quantum computers.

Still, the idea of doing more complex things with existing math appeals in the here and now, and if, for instance, the quantum cryptography apocalypse never arrives in the dramatic fashion thats being forecast, multivariate cryptography might yet have a future as a heightened evolution of pre-quantum cybersecurity.

Whichever options withstand the power of quantum computing best will undoubtedly shape the direction of corporate, government and personal cybersecurity for at least a generation. Which options those turn out to be well have to wait and see. But ultimately, what is the purpose of post-quantum cryptography? Its to make sure business continues as usual in a world of the casual supercomputer in your pocket, on your desk, and everywhere else.

Continue reading here:
What is the purpose of post-quantum cryptography? - TechHQ