Latest News# Gear Up for the Application of Quantum Computing in Your Organization

Quantum computing may sound like a term relegated to science fiction, but the truth is we're closer to practical quantum computers than some might think. When it becomes mainstream, it's going to change how we approach a lot of problems – and how we think of our current computing model. While all of its uses may not be clearly defined, one thing that quantum computing is definitely going to impact is cybersecurity. Because of how quantum computing works, it could pose a threat to the encryption technologies most people are employing today. The way most computers work is with something called a "bit" – a term you've most likely heard before. Each of these bits is a collection of binary numbers, 1s, and 0s. These 1s and 0s in turn represent the state of a transistor, the basic hardware building block of all electronics. To put it simply, 1 or 0 is when an electrical charge is on or off. This form of computer is formally called "classical" computing and relies on this binary system to carry out all processes. This is what the cybersecurity world currently relies on, and is where Peter Shor steps in, a mathematician who discovered a new type of algorithm that could potentially solve all modern encryption algorithms. These quantum bits use the complex physics of quantum mechanics to have three states for each bit rather than the traditional two (binary). While the physics involved are fairly complicated, the basic idea is that qubits can be on, off, or "both on and off," thereby adding another possible state for the bit.

The way that modern encryption works are built around how difficult it is for classical (binary) computers to solve a specific mathematical equation. One example is factoring large numbers, which can easily take hundreds of years for a classical computer to solve. The distressing news for security specialists everywhere is that qubits can much more quickly compute a lot of the complex mathematics that classical computers have a problem with. In fact, the two common encryption technologies, elliptic-curve cryptography (ECC) and Rivest-Shamir-Adleman (RSA) encryption can both theoretically be solved through qubits. Thankfully, there are some solutions, but applying them can be difficult and expensive. Considering the financial and security impacts Covid-19 has had on businesses around the world, a new cyber threat is not something that any organization needs right now. There is no current guarantee that mainstream cryptographic systems are at risk, but it is still on the minds of security professionals. Organizations such as the National Institute of Standards and Technology (NIST) have already started evaluating 69 new potential methods for dealing with post-quantum cryptography (PQC).

Though mainstream quantum computing may be years away, there are still some challenges and risks to consider now, that could help to minimize fallout down the road. Applying security updates is often easier said than done, especially as users don't always keep up with security updates on their own devices and machines. This can be a problem, given the increase in the reliance on IoT, cloud computing, etc., and how common they've become in homes and businesses. One way to address this problem is by implementing security protocols before products reach their consumers. A lot of data is being stored in the cloud, from passwords to random sensor readings. This data can be hacked and saved for later when quantum computing is viable. In theory, hackers can gain the encrypted information and sit on it until they have access to quantum computers to make quick work of the encryption. Whether there is great benefit in doing so is another question, but the point is, even when prioritizing compliance and security, there's still a significant risk for businesses. Therefore, it's a good idea to plan ahead and stay crypto-agile so when the quantum revolution happens, organizations aren't caught off-guard.

Thankfully, there is some time yet to start implementing security solutions. While there have been major advances in quantum computing in the past decade or so, we're still very far off from a stable computer. The main problem is that qubits are incredibly volatile, and only last a few 100 milliseconds without incredibly complex (and expensive) cooling and wiring. Furthermore, right now the unofficial leader of quantum computers in raw numbers, China's USTC, only has 66 qubits. Similarly, the official leader, Google, has a 53-qubit computer. That may seem like a lot, but in reality, we might need thousands if not hundreds of thousands of qubits to do anything practical. That being said, those numbers are only going to rise, and that's why the mathematics of cryptography is so important in keeping up with the advance of quantum computers. IBM, for example, is hoping to release a 127-qubit quantum processor by the end of 2021, a 433-qubit processor by the end of 2022, and a 1,121-qubit processor by the end of 2023. Meanwhile, Google is aiming for a 1 million-qubit processor by the end of 2029, a staggering number.

It's also important to keep in mind, the future uses of this technology are quite positive. For example, quantum computing could help stave off the next pandemic by allowing us to do better protein folding than we can with classical computers. But either way, the countdown has begun, and it's important for companies to start thinking about how they are going to secure their current data against future risks.

**Join our WhatsApp Channel to get the latest news, exclusives and videos on WhatsApp**

* _____________*

**Disclaimer: Analytics Insight does not provide financial advice or guidance. Also note that the cryptocurrencies mentioned/listed on the website could potentially be scams, i.e. designed to induce you to invest financial resources that may be lost forever and not be recoverable once investments are made. You are responsible for conducting your own research (DYOR) before making any investments. Read more here.**

No stories found.

Analytics Insight

www.analyticsinsight.net