IBM Quantum Safe Technology: Protects Data From Encryption-Busting Attacks By Next-Generation Quantum Computers – Forbes
IBM
Quantum computing represents a loomingand inevitablethreat to almost every aspect of our digital world that is protected by current forms of encryption. Either within this decade or the next, quantum computers will become powerful enough to easily overwhelm todays state-of-the-art cryptography. Our most popular encryption algorithms are based on mathematics impossible for supercomputers to solve but pose no meaningful challenge for the advanced technology of future quantum computers.
Even though we dont know exactly when it will be possible for quantum computing to crack classical encryption, the fact that it will happen is beyond doubt. Quantum machines of the future will have the potential to break encryption algorithms that protect online transactions, financial data, and even national security and government communications.
There is only one way to avoid these potential financial disruptions every existing security algorithm must be remediated with quantum-resistant encryption.
IBM has been working on Quantum Safe technology to solve this problem for several years. Before we examine IBM's solution, we need to understand how we got here.
The current states of quantum computing and traditional cryptography
From a development standpoint, today's quantum computers are late-stage prototypes equipped with 30 to 1,000 qubits that use various hardware technologies for qubits such as supercomputing, trapped ions, neutral atoms and even particles of light.
Fault-tolerant quantum computers of the future equipped with millions of qubits are expected to improve our lives by solving problems such as assist with climate change, simulation of large molecules and the creation of new materials and drugs. However, that class of quantum computers also represents a significant threat to cryptography and the financial underpinnings of companies, society and government.
In 1994, Bell Labs mathematician Peter Shor ignited a storm of interest in quantum computing when he developed an algorithm that could theoretically factor large prime numbers. When he published his paper on whats now called Shor's algorithm, there were no quantum computers to run it. Fast forward to today, there are quantum computers, but none yet powerful enough to run Peter Shors algorithm at least, not yet.
RSA encryption is one of the most common forms of asymmetric cryptography. It is susceptible to being hacked using the Shor algorithm because it uses two large prime numbers that are multiplied together to create a public key and a private key. The public key is used to encrypt data, while the private key is used to decrypt it. The public key can be shared with everyone, while the private key is kept secret.
How much quantum computing power is needed to break encryption?
It is generally accepted by scientists that a classical supercomputer would require millions of years to crack a 2,048-bit RSA key. A long time, yes, but the number of possible combinations of prime numbers that could be used to create such a key is so vast that it would be impossible to test them in less than a few million years.
However, the same feat will be possible with an advanced quantum computer within a few hours to a few days and therein lies the problem. While classical supercomputers pose no risk to current cryptography and encryption, quantum computers will have no problem penetrating existing cryptography schemes.
One study theorized that someone would need a 20-million-qubit fault-tolerant quantum computer to break RSA-2,048 encryption in 8 hours.
RSA could also be broken with fewer qubits, but it would take longer. Fujitsu researchers estimated that a fault-tolerant quantum computer equipped with 10,000 logical qubits (a logical qubit contains multiple physical qubits) and 2.23 trillion quantum gates could also crack RSA. It wouldn't be a fast processit would take 104 daysbut it would be feasible.
Lets put those millions of qubits in perspective.
This year, IBM's quantum roadmap calls for the release of its largest gate-based quantum computer processors to date, one that uses 1,100 qubits.
Despite the limited size of our present-day quantum computers, most experts have little doubt that the technology will eventually develop the power needed to break RSA encryption within an actionable amount of time.
When will it be possible to break encryption?
But how long is eventually? There is no way to say precisely when quantum computers will be able to break current cryptographic algorithms. That said, whenever it does happen, it won't be a surprise. The capability will evolve along a sequential timeline of well-defined improvements in quantum computing power.
Besides the scale and fault-tolerance mentioned above, the cryptography-defeating quantum machine of the future will also likely employ a quantum-centric supercomputer architecture.
There have been predictions about when encryption-hacking might occur by a few expert sources:
These estimates were made several years ago. Even though a great deal of progress in quantum computing has been made since then, fault tolerance remains a significant technical challenge that may require another five or more years before it is achieved. Error mitigation will provide a partial solution, but not enough to scale quantum machines to the level needed to run a robust version of Shor's algorithm that can break RSA encryption and reveal its public and private keys.
Which types of systems are at risk?
IBM
We live in a world where almost every digital asset is protected by some type of encryption, ranging from private email accounts to subscription services to online bank and stock trading accounts to critical infrastructure systems such as the national electrical grid and municipal water systems.
It is a simple equivalence. Todays traditional encryption cannot coexist within an environment of advanced quantum computing because none of the protected systems will be secure.
Here are a few ways in which bad actors that could ranging from large state-sponsored groups to rogue criminal organizations, could damage or even cause a complete collapse of our entire financial system:
These are only a few examples of how quantum computing could be used to cause financial havoc within individual lives, companies, society, the government, or the world as a whole. The actual impact of quantum computing on economic systems is hard to predict, but such actions would clearly have a significant effect.
Many disruptions, such as those involving systems like power grids or airline traffic routing, would not remain isolated; these events would likely have significant ripple effects throughout the world economy and for an extended period. It has been estimated that losses caused by encryption intrusions could reach as much as several trillion dollars each.
The World Economic Forum recently estimated that more than 20 billion digital devices will need to be either upgraded or replaced in the next 1020 years to include new forms of quantum-safe encrypted communication.
IBM Quantum Safe Technology work has already begun
In November 2022, the U.S. Office of Management and Budget issued a memorandum ordering all federal agencies to start preparing to implement post-quantum cryptography to secure Federal data and information systems. This memo is a follow-up to a White House National Security Memorandum issued in May 2022 that made federal resources available to assist in migrating all U.S. digital systems to quantum-resilient cybersecurity standards by 2035.
Previously, NIST initiated a Post-Quantum Cryptography Standardization Process in 2016 to identify new algorithms that can resist threats posed by quantum computers. After three rounds of evaluation, NIST has identified new quantum-safe algorithms; it plans to have new quantum-safe standards in place by 2024.
The four algorithm finalists from NIST
IBM
In NISTs final round of consideration, IBM researchers were involved in developing three quantum-safe cryptographic algorithms based on lattice cryptography: CRYSTALS-Kyber, CRYSTALS-Dilithium and Falcon.
Industries have already begun to prepare for the quantum future as well. Last year the telecommunications industry organization GSMA formed a Post-Quantum Telco Network Taskforce. IBM and Vodafone were among the founding members of the taskforce to help define policy, regulation and operator business processes to protect telcos from the quantum threat.
What must be done to protect cryptography from quantum threats
As mentioned at the beginning of this article, there is only one way to protect the billions of encrypted products and services from damage that future quantum computers could cause. According to the best estimates, quantum computer threats to existing encrypted services and products will begin to happen around 2030. That means we only have six to seven years for every organization and every government agency to replace its existing public-key cryptography applications with new NIST quantum-safe algorithms.
As announced at IBMs Think 2023 conference, IBM researchers and the companys partners have been actively developing quantum-safe remediation techniques and algorithms for that exact purpose. The objective is to allow an unhampered flow-through of future quantum computing power and benefits while simultaneously providing a shield again quantums disruptive encryption-breaking power.
IBM Quantum Safe
IBMs Quantum Safe is an end-to-end solution that will assist enterprises and government agencies in identifying and replacing existing cryptography algorithms with new algorithms. Quantum Safe includes a comprehensive set of tools and capabilities to assist in transforming to an environment that can resist quantum threats.
What IBM Quantum Safe is
IBM
Quantum Safe technology brings three critical capabilities: IBM Quantum Safe Explorer, IBM Quantum Safe Advisor and IBM Quantum Safe Remediator. Each of these technology capabilities perform transformational step in the transition process, to discover, observe and transform cryptography. .
Explorer can scan source and object codes, while Advisor provides a dynamic or operational view of system-wide cryptography usage. The combined views of Explorer and Advisor offer a comprehensive view of enterprise-wide cryptography usage, both from a dynamic and static standpoint. Combined information from Explorer and Advisor can also be used to monitor and manage cryptography and any associated vulnerabilities that may arise. It can also be an input to create a transformation roadmap detailing the issues to be addressed first or determine which actions will provide the most significant benefits.
The roadmap can then be used in the transformation process, where Remediator captures best practices and automates actions when possible.
Quantum Safe architecture
IBM
Even though Explorer, Advisor and Remediator are discrete capabilities within the Quantum Safe architecture, they are integrated by sharing the same common informational model.
The Quantum Safe system creates information as a Cryptography Bill of Materials (CBOM) fashioned after the Software Bill of Materials (SBOM). The CBOM is an essential tool for migrating to quantum-safe cryptography. It identifies and inventories cryptographic assets and the dependencies, helps plan for the migration to quantum-safe algorithms with single source of truth.
It is important to highlight crucial design consideration in the Quantum Safe system. IBM made a point not to require the installation of any additional agents within the enterprise framework. The objective was to integrate with what people already had. That's why there is integration with external systems and systems of record that already exist, particularly in the continuous integration and continuous deployment (CICD) pipeline, the network monitoring systems and the configuration management database. The CICD pipeline is the set of tools and processes that automate the development, testing and deployment of software.
IBM
The example above shows one of the many possible views of data that can be captured and viewed by having Explorer scan source and object code. This view of a portfolio of applications shows where cryptography exists, along with the remediation status of each instance. This example illustrates results obtained by selecting a specific endpoint in the repository containing Java code for an application. In this instance, Explorer has scanned all of the Java files and identified particular cryptography usage within the scanned files.
The labels are self-explanatory except for the far-left purple ring. In this case, it shows that 14 algorithms are not quantum safe. If any of the algorithms were quantum safe, a portion of the purple ring would be shown as green. Explorer calls out the specific algorithms being used, such as RSA, Diffie-Hellman, AES etc.
IBM
This dynamic view of Advisor shows network data and its corresponding usage of cryptography. Also displayed are the number of TLS services in use and quantum ciphers. Double-clicking on an item will show where it is being used, along with other contextual information. Combining this view with the previous screens can provide even more information about cryptography usage.
It will be vital to use Quantum Safe TLS because a future quantum computer capable of running the Shor algorithm could easily break current TLS communications algorithms. In addition, TLS data-in-transit that has been snooped and stored could be breached at a later time when large fault-tolerant quantum computers become available.
IBM currently provides API for integrating with network security scanning tools that clients already use and ingest that network scan logs to analyze.
IBM
Quantum Safe Remediator can do automated remediation; A this stage of development, there will likely be significant amounts of code that can't be automatically remediated. In those cases, architects and developers should adopt best practices for fixing the code.
Suppose it is necessary to implement a QSE-enabled VPN, or a quantum safe proxy implementation. To address that case, IBM has codified patterns that clients can instantiate in their environment so they can understand how it works and immediately begin using it.
Note that there are only a handful of remediation patterns available. IBM has explained that it will not be creating hundreds of patterns. Instead, the company believes that right now best practice dictates the creation of engagement-driven, high-value codified patterns to provide maximum benefit for clients. It should also be noted that IBM has a library of known patterns. Based on ongoing discovery with Explorer and Advisor, IBM will be able to codify new patterns and make them available to clients.
The Quantum Safe roadmap tracks milestones and timelines
IBM
IBM's Quantum Safe roadmap is designed to identify and reinforce digital transformation initiatives based on emerging technologies. The roadmap will also support remediation efforts to make existing data assets and services quantum-safe. The roadmap also lists dates for significant industry milestones that are driven by standardization, federal government requirements or CNSA guidelines.
Roadmap data should be helpful for federal or civilian agencies or healthcare companies that must follow strict regulations about tracking requirements and dates. Suppliers can also use this information to stay abreast of quantum certification requirements.
The bottom channel on the roadmap consists of IBM infrastructure hardware and software products that on the journey to quantum-safe.
Wrapping up
We cannot predict when the first encryption-protected service or product might be breached by a quantum machine. It could be within this decade or even the next decade. Yet the crucial point remains the same: today's cryptography cannot stop future quantum computers from hacking it.
All data is at risk. Even before quantum computers can crack encryption on the fly, data that uses current encryption methods can be captured and stored by a hacker until quantum computers become powerful enough to defeat the stored data's encryption. And again, any computer system that needs to operate securely for long periods without major modification must be remediated with quantum-safe encryption. Given that almost every digital service and product in use today relies on some form of encryption for protection, it is important for every organization to begin a program to identify and swap out the old encryption for new quantum-safe algorithms as soon as possible. Remediating the old encryption won't be simple and it won't be fast. But it will be worth all the effort.
IBM Quantum Safe greatly simplifies the process of remediating old algorithms, but similar to IBMs existing quantum roadmap, Quantum Safe is an agile product that follows and improves upon the roadmap along the way. IBM will continue to add features to Quantum Safe while experimenting and working with clients to validate and improve its capabilities.
Paul Smith-Goodson is the Vice President and Principal Analyst for Quantum Computing and Artificial Intelligence at Moor Insights & Strategy. You can follow him on Twitter for current information and insights about Quantum, AI, Electromagnetics, and Space.
Moor Insights & Strategy provides or has provided paid services to technology companies like all research and tech industry analyst firms. These services include research, analysis, advising, consulting, benchmarking, acquisition matchmaking, and video and speaking sponsorships. The company has had or currently has paid business relationships with 88, Accenture, A10 Networks, Advanced Micro Devices, Amazon, Amazon Web Services, Ambient Scientific, Ampere Computing, Anuta Networks, Applied Brain Research, Applied Micro, Apstra, Arm, Aruba Networks (now HPE), Atom Computing, AT&T, Aura, Automation Anywhere, AWS, A-10 Strategies, Bitfusion, Blaize, Box, Broadcom, C3.AI, Calix, Cadence Systems, Campfire, Cisco Systems, Clear Software, Cloudera, Clumio, Cohesity, Cognitive Systems, CompuCom, Cradlepoint, CyberArk, Dell, Dell EMC, Dell Technologies, Diablo Technologies, Dialogue Group, Digital Optics, Dreamium Labs, D-Wave, Echelon, Ericsson, Extreme Networks, Five9, Flex, Foundries.io, Foxconn, Frame (now VMware), Fujitsu, Gen Z Consortium, Glue Networks, GlobalFoundries, Revolve (now Google), Google Cloud, Graphcore, Groq, Hiregenics, Hotwire Global, HP Inc., Hewlett Packard Enterprise, Honeywell, Huawei Technologies, HYCU, IBM, Infinidat, Infoblox, Infosys, Inseego, IonQ, IonVR, Inseego, Infosys, Infiot, Intel, Interdigital, Jabil Circuit, Juniper Networks, Keysight, Konica Minolta, Lattice Semiconductor, Lenovo, Linux Foundation, Lightbits Labs, LogicMonitor, LoRa Alliance, Luminar, MapBox, Marvell Technology, Mavenir, Marseille Inc, Mayfair Equity, Meraki (Cisco), Merck KGaA, Mesophere, Micron Technology, Microsoft, MiTEL, Mojo Networks, MongoDB, Multefire Alliance, National Instruments, Neat, NetApp, Nightwatch, NOKIA, Nortek, Novumind, NVIDIA, Nutanix, Nuvia (now Qualcomm), NXP, onsemi, ONUG, OpenStack Foundation, Oracle, Palo Alto Networks, Panasas, Peraso, Pexip, Pixelworks, Plume Design, PlusAI, Poly (formerly Plantronics), Portworx, Pure Storage, Qualcomm, Quantinuum, Rackspace, Rambus, Rayvolt E-Bikes, Red Hat, Renesas, Residio, Samsung Electronics, Samsung Semi, SAP, SAS, Scale Computing, Schneider Electric, SiFive, Silver Peak (now Aruba-HPE), SkyWorks, SONY Optical Storage, Splunk, Springpath (now Cisco), Spirent, Splunk, Sprint (now T-Mobile), Stratus Technologies, Symantec, Synaptics, Syniverse, Synopsys, Tanium, Telesign,TE Connectivity, TensTorrent, Tobii Technology, Teradata,T-Mobile, Treasure Data, Twitter, Unity Technologies, UiPath, Verizon Communications, VAST Data, Ventana Micro Systems, Vidyo, VMware, Wave Computing, Wellsmith, Xilinx, Zayo, Zebra, Zededa, Zendesk, Zoho, Zoom, and Zscaler.
Moor Insights & Strategy founder, CEO, and Chief Analyst Patrick Moorhead is an investor in dMY Technology Group Inc. VI, Fivestone Partners, Frore Systems, Groq, MemryX, Movandi, and Ventana Micro.
See the original post here:
IBM Quantum Safe Technology: Protects Data From Encryption-Busting Attacks By Next-Generation Quantum Computers - Forbes
- Next-Gen Quantum Computing: The Fusion of Atoms and Photonic Innovation - SciTechDaily - November 30th, 2024 [November 30th, 2024]
- The Intersection of AI and Quantum Computing: A New Era of Innovation - HPCwire - November 30th, 2024 [November 30th, 2024]
- How Quantum Computing is Driving the Future of Mobility - EE Times - November 30th, 2024 [November 30th, 2024]
- How Quantum Computing is Driving the Future of Mobility - OODA Loop - November 30th, 2024 [November 30th, 2024]
- Telefonica Germany and AWS Partner to Explore Quantum Technologies for Mobile Networks and 6G Development - Quantum Computing Report - November 30th, 2024 [November 30th, 2024]
- 2 Cheap Quantum Computing Stocks to Buy Instead of Chasing IonQ - Investing.com - November 30th, 2024 [November 30th, 2024]
- Most Read: Robotic Dog With Wheels Climbs Steps, Speeds Down Mountains; Quantum Computing Studies to Manage Drones, Self-Driving Cars - IoT World... - November 30th, 2024 [November 30th, 2024]
- 1 Quantum Computing Stock To Grab While It's Still Under $10 - Barchart - November 28th, 2024 [November 28th, 2024]
- 3 Quantum Computing CEOs On The State Of Quantum Today - Forbes - November 28th, 2024 [November 28th, 2024]
- Whats Behind the Move in Quantum Computing Stocks? - Cabot Wealth Network - November 28th, 2024 [November 28th, 2024]
- S. Korea to promote industrial use of quantum computing - The Korea Herald - November 28th, 2024 [November 28th, 2024]
- Quantum Industry Stocks Soar: What's Behind the D-Wave, Quantum Computing and IonQ Gains? - Benzinga - November 28th, 2024 [November 28th, 2024]
- 2 Cheap Quantum Computing Stocks to Buy Instead of Chasing IonQ - MarketBeat - November 28th, 2024 [November 28th, 2024]
- Research Team Achieves First-Ever Topological Qubit, A Step Along The Path Toward Fault-Tolerant Quantum Computing - The Quantum Insider - November 28th, 2024 [November 28th, 2024]
- Novel high-fidelity quantum computing gate with 99.92% fidelity - Inceptive Mind - November 28th, 2024 [November 28th, 2024]
- Turkey Launches First 5-Qubit Quantum Computer, Called QuanT, Marking National Technology Breakthrough for the Country - Quantum Computing Report - November 23rd, 2024 [November 23rd, 2024]
- Toshiba and RIKEN Achieve 99.90% Fidelity with Double-Transmon Coupler for Superconducting Quantum Computers - Quantum Computing Report - November 23rd, 2024 [November 23rd, 2024]
- IBM and Pasqal to Advance Quantum-Centric Supercomputing with a Unified Framework - Quantum Computing Report - November 23rd, 2024 [November 23rd, 2024]
- Up 43% Today, This Quantum Computing Stock Has More Than Tripled In November - Barchart - November 21st, 2024 [November 21st, 2024]
- Quantum computing making leap from theoretical to practical - Hamburg Invest - November 21st, 2024 [November 21st, 2024]
- Google Unveils AlphaQubit: AI-Driven Breakthrough in Quantum Error Correction - Quantum Computing Report - November 21st, 2024 [November 21st, 2024]
- Lightsynq Comes Out of Stealth with $18 Million in Series A Funding to Scale Quantum Computing - The Quantum Insider - November 21st, 2024 [November 21st, 2024]
- How Clean Does a Quantum Computing Test Facility Need to Be? - HPCwire - November 21st, 2024 [November 21st, 2024]
- Alice & Bob Launch Dynamiqs: A GPU-Accelerated Library for High-Speed Quantum Simulations - Quantum Computing Report - November 21st, 2024 [November 21st, 2024]
- Microsoft and Atom Computing Are Taking Orders for a Fault Tolerant Quantum Computer with 1K (Physical) / 50 (Logical) Qubits for Delivery Next Year -... - November 21st, 2024 [November 21st, 2024]
- Nurturing The Emerging Ecosystem Of Industry-Academia Collaboration In Quantum Computing - NDTV Profit - November 21st, 2024 [November 21st, 2024]
- Microsoft and Atom Computing leap ahead on the quantum frontier with logical qubits - GeekWire - November 21st, 2024 [November 21st, 2024]
- Quantum Computing and the Evolving Cyber Threat Landscape - The Soufan Center - November 16th, 2024 [November 16th, 2024]
- What is quantum computing and how might it impact financial services? - Lloyds Banking Group - November 16th, 2024 [November 16th, 2024]
- Quantum Computing to sell 16M shares at $2.50 in registered direct offering - TipRanks - November 16th, 2024 [November 16th, 2024]
- How 'clean' does a quantum computing test facility need to be? - Phys.org - November 14th, 2024 [November 14th, 2024]
- Quantum Computing Shares Are Up By More Than 70%: Here's What You Need To Know - Benzinga - November 14th, 2024 [November 14th, 2024]
- In step forward for quantum computing hardware, IU physicist uncovers novel behavior in quantum-driven superconductors - IU Newsroom - November 14th, 2024 [November 14th, 2024]
- Closing in on quantum computing with error mitigation - ComputerWeekly.com - November 14th, 2024 [November 14th, 2024]
- IQM unveils roadmap focused on fault-tolerant quantum computing by 2030 - Scientific Computing World - November 14th, 2024 [November 14th, 2024]
- Quantum Computing is Coming - Is the Insurance Industry Ready? - - Insurance Edge - November 14th, 2024 [November 14th, 2024]
- Could Diamonds Unlock Improved Qubits for Quantum Computing? - Securities.io - November 14th, 2024 [November 14th, 2024]
- Enterprise Quantum Computing Market on Track for 29.7% CAGR | Key Growth Drivers and Future Opportunities - openPR - November 14th, 2024 [November 14th, 2024]
- Equal1s Quantum Computing Breakthough with Arm Technology - Arm Newsroom - November 14th, 2024 [November 14th, 2024]
- Quantum Algorithms Institute Partners with AbaQus and InvestDEFY to Enhance Financial Forecasting with Quantum Computing - Quantum Computing Report - November 14th, 2024 [November 14th, 2024]
- SemiQon and SDT Partner to Scale Quantum Computing with Silicon-Based QPUs - Quantum Computing Report - November 14th, 2024 [November 14th, 2024]
- The CIO's quantum leap into the cloud: Integrating quantum computing into cloud infrastructure - ITPro - November 14th, 2024 [November 14th, 2024]
- Massachusetts Invests $5 Million in New Quantum Computing Facility in Holyoke - This Week In Worcester - November 14th, 2024 [November 14th, 2024]
- Hamad Bin Khalifa University and Quantinuum Partner to Advance Quantum Computing in Qatar - The Quantum Insider - November 14th, 2024 [November 14th, 2024]
- Hamad Bin Khalifa University Partners with Quantinuum to Boost Quantum Computing Research in Qatar - Quantum Computing Report - November 14th, 2024 [November 14th, 2024]
- Singtel Expands Quantum-Safe Network with Palo Alto Networks and Fortinet Integration - Quantum Computing Report - November 14th, 2024 [November 14th, 2024]
- Quantum Computing Company to Part With General Counsel - Law.com - November 12th, 2024 [November 12th, 2024]
- Researchers from the University of Sydney demonstrate more effieicnt quantum error correction - Scientific Computing World - November 12th, 2024 [November 12th, 2024]
- Quantum computing will be the next big tech trend to have a major impact on marketing, says Citi CMO Alex Craddock - Business Insider - November 10th, 2024 [November 10th, 2024]
- A Look At The Official Opening of UKs National Quantum Computing Centre - The Quantum Insider - November 10th, 2024 [November 10th, 2024]
- IonQ Partners with imec to Advance Quantum Computing with Photonic Integrated Circuits and Chip-Scale Ion Traps - Quantum Computing Report - November 10th, 2024 [November 10th, 2024]
- BTQ Technologies and Macquarie University Partner to Drive Quantum Computing and Secure Communications - Quantum Computing Report - November 10th, 2024 [November 10th, 2024]
- IonQ to Acquire the Assets of Qubitekk to Strengthen Its Position in Quantum Networking Technology - Quantum Computing Report - November 10th, 2024 [November 10th, 2024]
- From nuclear to quantum computing, how Big Tech intends to power AI's insatiable thirst for energy - CNBC - November 10th, 2024 [November 10th, 2024]
- Quantum Computing and Critical Infrastructure - The Quantum Insider - October 16th, 2024 [October 16th, 2024]
- A Superconducting Waltz: Elia Strambini on the Quantum Future of Computing - The Quantum Insider - October 16th, 2024 [October 16th, 2024]
- Quantum computing and photonics discovery potentially shrinks critical parts by 1,000 times - Phys.org - October 16th, 2024 [October 16th, 2024]
- Nu Quantum Announces the Qubit-Photon Interface for Modular and Scalable Distributed Quantum Computing - The Quantum Insider - October 16th, 2024 [October 16th, 2024]
- How to Invest in Quantum Computing Companies (Updated 2024) - Investing News Network - October 16th, 2024 [October 16th, 2024]
- IBM pitches camp in Germany to prepare Quantum Computing for the real world - diginomica - October 16th, 2024 [October 16th, 2024]
- Purifications, Fidelity & the Future of Computing - The Quantum Insider - October 16th, 2024 [October 16th, 2024]
- Making quantum computing more accessible and applicable to real-world challenges - Scientific Computing World - October 16th, 2024 [October 16th, 2024]
- The future of quantum computing and cybersecurity in telecommunications - Telefnica - October 16th, 2024 [October 16th, 2024]
- Chinese Quantum Computing Threat Highlights Urgency for Quantum eMotion's Quantum Security Solutions - Newsfile - October 16th, 2024 [October 16th, 2024]
- Qunova Computing Achieves Chemical Accuracy in Quantum Chemistry Simulations with Innovative Hardware-Agnostic Algorithm on NISQ Devices - Quantum... - October 16th, 2024 [October 16th, 2024]
- Quantum Computing Transformed by Breakthrough Photonic Technology - SciTechDaily - October 12th, 2024 [October 12th, 2024]
- How Is Quantum Computing Being Used in Healthcare? - HealthTech Magazine - October 12th, 2024 [October 12th, 2024]
- IBM Quantum Roadmap Guide -- Scaling And Expanding The Usefulness of Quantum Computing - The Quantum Insider - October 12th, 2024 [October 12th, 2024]
- Toyota and Xanadu Partner to Bring Quantum Computing to Advanced Materials Science and Sensing Applications - The Quantum Insider - October 12th, 2024 [October 12th, 2024]
- 'Invisibility' and quantum computing tipped for physics Nobel - Yahoo! Voices - October 12th, 2024 [October 12th, 2024]
- Airbus Selects Multiverse Computing to Build Quantum-inspired Gesture Recognition Software For Fighter Pilots - The Quantum Insider - October 12th, 2024 [October 12th, 2024]
- From Legacy to Innovation: Banks' Path to Cloud, AI, and Quantum Computing - Finextra - October 12th, 2024 [October 12th, 2024]
- IBM Executive Stories: Bringing Useful Quantum Computing to the World - IBM - October 7th, 2024 [October 7th, 2024]
- Quantum Computing Market to Soar to $7.1B by 2031 with 30.7% CAGR - openPR - October 7th, 2024 [October 7th, 2024]
- Quantum Computing Market Is Going to Boom | Major Giants IBM, Google, Rigetti, Microsoft, Intel - openPR - October 7th, 2024 [October 7th, 2024]
- Will IBM's Focus on Quantum Computing Propel the Stock? - Yahoo Finance - October 7th, 2024 [October 7th, 2024]
- Nu Quantums Platform For Networking Quantum Computers Hosted at The UK's National Quantum Computing Centre - The Quantum Insider - October 7th, 2024 [October 7th, 2024]
- Quantum Computing for Real-world Applications with Professor Naoki Yamamoto of Keio University - The Quantum Insider - October 7th, 2024 [October 7th, 2024]
- University of Queensland (UQ) is Receiving $29 million AUD ($19.7M USD) in Funding for Quantum Research and Scholarships - Quantum Computing Report - October 7th, 2024 [October 7th, 2024]
- History of quantum computing: 12 key moments that shaped the future of computers - Livescience.com - October 3rd, 2024 [October 3rd, 2024]