Daily Archives: October 12, 2023

Self-correcting quantum computers within reach? Harvard Gazette – Harvard Gazette

Posted: October 12, 2023 at 2:23 am

Quantum computers promise to reach speeds and efficiencies impossible for even the fastest supercomputers of today. Yet the technology hasnt seen much scale-up and commercialization largely due to its inability to self-correct. Quantum computers, unlike classical ones, cannot correct errors by copying encoded data over and over. Scientists had to find another way.

Now, a new paper in Nature illustrates a Harvard quantum computing platforms potential to solve the longstanding problem known as quantum error correction.

Leading the Harvard team is quantum optics expert Mikhail Lukin, the Joshua and Beth Friedman University Professor in physics and co-director of the Harvard Quantum Initiative. The work reported in Nature was a collaboration among Harvard, MIT, and Boston-based QuEra Computing. Also involved was the group of Markus Greiner, the George Vasmer Leverett Professor of Physics.

An effort spanning the last several years, the Harvard platform is built on an array of very cold, laser-trapped rubidium atoms. Each atom acts as a bit or a qubit as its called in the quantum world which can perform extremely fast calculations.

Harvard physicists Mikhail Lukin (foreground) and Markus Greiner work with a quantum simulator.

File photo by Jon Chase/Harvard Staff Photographer

The teams chief innovation is configuring their neutral atom array to be able to dynamically change its layout by moving and connecting atoms this is called entangling in physics parlance mid-computation. Operations that entangle pairs of atoms, called two-qubit logic gates, are units of computing power.

Running a complicated algorithm on a quantum computer requires many gates. However, these gate operations are notoriously error-prone, and a buildup of errors renders the algorithm useless.

In the new paper, the team reports near-flawless performance of its two-qubit entangling gates with extremely low error rates. For the first time, they demonstrated the ability to entangle atoms with error rates below 0.5 percent. In terms of operation quality, this puts their technologys performance on par with other leading types of quantum computing platforms, like superconducting qubits and trapped-ion qubits.

However, Harvards approach has major advantages over these competitors due to its large system sizes, efficient qubit control, and ability to dynamically reconfigure the layout of atoms.

Weve established that this platform has low enough physical errors that you can actually envision large-scale, error-corrected devices based on neutral atoms, said first author Simon Evered, a Harvard Griffin Graduate School of Arts and Sciences student in Lukins group. Our error rates are low enough now that if we were to group atoms together into logical qubits where information is stored non-locally among the constituent atoms these quantum error-corrected logical qubits could have even lower errors than the individual atoms.

The Harvard teams advances are reported in the same issue of Nature as other innovations led by former Harvard graduate student Jeff Thompson, now at Princeton University, and former Harvard postdoctoral fellow Manuel Endres, now at California Institute of Technology. Taken together, these advances lay the groundwork for quantum error-corrected algorithms and large-scale quantum computing. All of this means quantum computing on neutral atom arrays is showing the full breadth of its promise.

These contributions open the door for very special opportunities in scalable quantum computing and a truly exciting time for this entire field ahead, Lukin said.

The research was supported by the U.S. Department of Energys Quantum Systems Accelerator Center; the Center for Ultracold Atoms; the National Science Foundation; the Army Research Office Multidisciplinary University Research Initiative; and the DARPA Optimization with Noisy Intermediate-Scale Quantum Devices program.

Sign up for daily emails to get the latest Harvardnews.

The rest is here:

Self-correcting quantum computers within reach? Harvard Gazette - Harvard Gazette

Posted in Quantum Computing | Comments Off on Self-correcting quantum computers within reach? Harvard Gazette – Harvard Gazette

Indian Army Banks on Quantum Tech; However Challenges Remain – Analytics India Magazine

Posted: at 2:23 am

In 2016, China launched the worlds first quantum-enabled satellite called Micius. A year later, China completed an over 2,000-kilometre-long optical fibre network for Quantum Key Distribution (QKD) between Beijing and Shanghai.

Not just China, but the US, Germany and a host of other nations are actively investing in quantum technology and related research. India, recognising the potential of quantum technology in modern military applications, has also allocated substantial resources to this area.

Adopting quantum technologies is not a choice any longertoday, it is a question of getting in at the earliest, according to Ajay Kumar Sood, principal scientific advisor (PSA) to the Centre. In fact, he noted that in India, QKD link between Sanchar Bhavan and NIC headquarters in Delhi has been live since earlier this year. This enables transmission of data through quantum communications networks over 150-200 kilometres currently, which can be further extended to over 2,000 kilometres in the future.

India is forging ahead with the adoption of quantum technology. But the use cases are not just limited to quantum technology. In fact, quantum computers could also play a pivotal role in modernising Indias defence sector. The National Quantum Mission aims to propel Indias quantum endeavours to rival China in the domain of not just quantum computers, but also quantum communication technology.

Earlier this year, the Indian government allocated a budget exceeding INR 6,000 crores to accelerate quantum computing research and construct intermediate quantum computers with 50-1000 qubits within the coming eight years.

Quantum computers could be used by defence planners to conduct large-scale simulations of military deployment. Quantum computing algorithms could be utilised to optimise military logistics, such as route planning, resource allocation, and supply chain management. The ability of quantum computers to handle vast amounts of data and solve complex optimisation problems could enhance military operations.

While the topic of quantum discussion is hot, there are no mature quantum computers in the world yet. All the quantum computers in the world are in an intermediate state right now. Moreover, quantum computers alone are not used as standalone computers; they are always used in conjunction with a classical computer. Additionally, quantum computers do not address all types of problems; they are specialised for specific sets of issues, Anshuman Tripathi, member of the National Security Advisory Board (NSAB), told AIM.

A fully mature quantum computer, which can be leveraged for commercial and military use is still far away. Its a matter of time. There are still some critical technologies which need to be developed and that will definitely take time, Tripathi added.

However, quantum technology, which is a subset of quantum computing, is garnering significant attention, especially from our defence agencies. Last year, the Ministry of Defence (MoD) announced that the Indian army has initiated the process of procurement of QKD systems developed by QNu Labs by issuing a commercial Request For Proposal (RFP) and its deployment.

With support from the Defence Excellence (iDEX), Defence Innovation Organisation (DIO), QNu Labs, a deeptech startup in Bengaluru, has made significant strides in overcoming distance limitations through innovative secure communication via QKD systems.

QKD ensures the creation of an unhackable quantum channel, providing an impervious layer of encryption for safeguarding critical data, voice, and video communications between these distant endpoints. It doesnt only provide secure communication channels for military operations, but is also used to detect any tampering or eavesdropping attempts during communication. QKD can also be integrated with quantum sensors and surveillance systems to enhance military intelligence gathering capabilities.

Moreover, to spearhead research and innovation in the field of quantum, the Indian Army, with support from the National Security Council Secretariat (NSCS), has also established the Quantum Lab at the Military College of Telecommunication Engineering, Mhow (MCTE).

In fact, the use of quantum technology is not just limited to the Indian army. The Indian Navy is exploring the use of the technology. The Raman Research Institute (RRI), an autonomous institute of the Department of Science and Technology (DST), inked a Memorandum of Understanding (MoU) with the Indian Navys R&D unit Weapons and Electronics Systems Engineering Establishment (WESEE) to lead the research efforts towards developing QKD techniques that the Indian Navy could leverage in the nations efforts towards securing free space communications.

However, even though nations are rushing to build their own QKD capabilities, certain questions about the reliability of the technology remain. Interestingly, the National Security Agency (NSA), a key intelligence agency within the US Department of Defense, currently does not endorse the use of QKD for safeguarding communications within national security systems. They also do not plan to certify or approve any QKD or QC security products unless specific limitations are addressed, the NSA said in a blog post.

The limitations, as cited by the NSA, include a lot of technical limitations such as the requirement of special purpose equipment, increased infrastructure costs and insider threat risks, and increased risk of denial of service.

Besides, the integration of QKD systems with existing communication infrastructure and protocols can prove to be a complex endeavour. Additionally, enhancing the cost-effectiveness of QKD technology, encompassing both hardware and maintenance, is crucial for its widespread deployment.

Hence, addressing these challenges requires ongoing research, development, and collaboration among academia, industry, and government entities. Similar to quantum computing, as advancements are made in QKD technology and its associated challenges are overcome, the wider adoption of QKD for secure communication will increase.

Read more from the original source:

Indian Army Banks on Quantum Tech; However Challenges Remain - Analytics India Magazine

Posted in Quantum Computing | Comments Off on Indian Army Banks on Quantum Tech; However Challenges Remain – Analytics India Magazine

Quantum Computing : the new AI hype? – Team-BHP

Posted: at 2:23 am

We have an excellent thread on AI, have a look here:

https://www.team-bhp.com/forum/shift...ml#post4251017 (Artificial Intelligence: How far is it?)

But let's face it, AI and ML (Machine Learning) have been around in practical applications for about a decade if not longer. Most people just never realised these days AI/ML is embedded in many products and services we use on a day-to-day basis. The latest developments in products such as ChatGP has put AI on the agenda of many folks. Including the political agenda. Which if anything shows, how much politics, policymakers and the general public are behind in terms of understanding what AI/ML is.

I have been involved in the application of AI and ML to our products and services for the last 7-8 years or so. We make extensive use of both. I used to work for Ericsson. We implement it in our products, we use it in our R&D and we also use it in our Managed Services, where we take over the day-to-day operation of (mobile) networks from our customers. We use AI/ML for a wide variety of services. E.g. for network optimisation, preventive maintenance prediction etc.

It is all pretty cool but in all honesty, it is also very much part of our daily work. Nothing special. I retired from Ericsson some time ago. During my last year, I also started looking into what Quantum Computing could mean for us and our customers.

So for me, AI/ML is old school to a large extent. Just existing technology is being explored further. Nothing new under the sun.

Last couple of years I have been fascinated by the various Quantum Technologies.

Just for a bit of context; Quantum technologies are a loose set of nascent technologies that harness the principles of quantum mechanics to enable revolutionary breakthroughs across various fields. Quantum technologies can be grouped into three main areassensing, communication, and computing.

I am interested to hear what our members think and know about Quantum Computing. I think it is fascinating. It is completely different from our current ways of building computers and its potential is huge.

I enrolled in an exciting course about Quantum Computing, Leadership and Innovation. Organised by this Dutch organisation called Comenius.

About Comenius

This course was not so much about the technology perse, but more about how to deal with the technology from a leadership perspective, from an ethical perspective, from an organisational perspex

I have had the pleasure of attending several of their courses before. The most memorable one was about Complexity and Innovation which was held at the Sante Fe Science Institute in New Mexico.

Unfortunately, due to health problems, I had to cancel my participation in the Quantum course. But I am an alumnus of Comenius and they organise regular meetings about all kinds of topics for their alumni.

They always have a wide range of different topics and very interesting lecturers. From politicians, scientists, people from the art and culture world and so on.

Earlier this week I attended one of the alumni sessions at the TNO in Delft, the Netherlands. TNO is a very well-established and respected research organisation in the Netherlands (https://www.tno.nl/en/)

They had arranged for two speakers on two very different topics. One topic was about the equipment TNO has developed to measure actual emission with very high resolution and accuracy from space, by satellite. The other topic was Quantum Computer.

I have, of course, read about Quantum Computing, but this was the very time I got to see one. TNO has built their own!!

Here you see it.

Current Quantum Computers are very small chips cooled down to almost 0 degrees Kelvin. So most of what you see is about the cooling, not the computing as such. Here is a photograph of what is inside that white tube.

What everybody, and I mean everybody, including the top experts on this topic, will tell you: Nobody and we mean NOBODY fully understands quantum computing.

I happen to be extremely well-versed in not understanding quantum computing. So for some of the below, I have borrowed heavily from the Internet. (It might be incorrect, but it would be hard to prove it of course as we will see).

The basics of quantum computing are of course covered in quantum mechanics. Those were established some 100 years ago, by the likes such as Bohr, Schrdinger, Heisenberg, Born, Dirac and a bunch of other scientists. Einstein at the time famously rejected quantum mechanics!

Quantum mechanics is a fundamental theory in physics that describes the behaviour of nature at the scale of atoms and subatomic particles. It is the foundation of all quantum physics including quantum chemistry, quantum field theory, quantum technology, and quantum information science.

Classical physics, the collection of theories that existed before the advent of quantum mechanics, describes many aspects of nature at an ordinary (macroscopic) scale but is not sufficient for describing them at small (atomic and subatomic) scales. Most theories in classical physics can be derived from quantum mechanics as an approximation valid at a large (macroscopic) scale.

So what is the difference between a classic (current) computer and a quantum computer:

A quantum computer is a device that manipulates information using the mathematics of quantum mechanics, as opposed to binary logic. For example, a quantum computer doesnt represent information as 1s and 0s. Instead, its basic unit of information, known as a qubit, corresponds to the probability of being either 1 or 0. The qubits state is like a coin flipping in the air: before landing, the coins state is neither heads nor tails, but some probability of either. In quantum lingo, the coin is in a superposition of heads and tails. Similarly, a qubit represents a superposition of 1 and 0.

Erwin Schrdinger famously illustrated the concept of a superposition in a thought experiment involving a cat in a box with a vial of poison and a radioactive substance. When the radioactive substance decays, it releases a particle that triggers the release of the poison, killing the cat. According to quantum mechanics, before anyone opens the box, the cat is technically in a superposition of being dead and alive at the same time.

By exploiting superposition and other quantum properties, such as entanglement, a quantum computer is capable of fundamentally different mathematical operations than classical computing.

So quantum computers are all about qubits. We (well, some scientists, not me or you most likely) can produce different kinds of qubits. Three common types of qubits are superconducting qubits, photonic qubits, and Rydberg atom qubits. (there are at least 7 different kinds of qubits, but these three are the most commonly used ones). Have a look here for more information: https://www.aliroquantum.com/blog/qn...0disadvantages.

It is extremely difficult to capture and observe these qubits. One of the reasons for cooling them down to near absolute zero is to try and minimize any interference and noise.

One of the big challenges with quantum mechanics is that it is completely counterintuitive. It requires many years of working with math and doing experiments to familiarize yourself with it. We discussed if the current or next generation of students would find it easier and more intuitive. There were a couple of students present. They all agreed, that it never becomes intuitive, at best it becomes familiar and you adapt.

It is a way of thinking that is, to some extent, science fiction for most of us. How can a particle tunnel through something? How do we know the status of a particle we know by observing it, that it changes its status. How does one particle influence the status of another particle very far from it (so-called entanglement)

A couple of my takeaways:

1 Quantum Computer applications: Quantum Computers are more suited for very complex types of calculations rather than handling vast amounts of data. So the notion that Quantum computers are going to enhance our weather forecasting capabilities big time is probably not realistic. Weather forecasting requires working with gigantic amounts of data. The limitation is very much related to the number of qubits you can have on a chip/computer.

Problems in cryptography, optimization, and material science can potentially be solved exponentially faster on a quantum computer.

Due to the intrinsic working of Quantum computers, the outcome is never exact. It comes with a probabilityThisch is fine for many applications, but sometimes you need an exact answer. If you ask a quantum computer what the square root of 9 is, the answer is something along the lines of: 3, with a probability of 99,99%.

2 Quantum Computer energy efficiency: Quantum computers are extremely energy efficient. The chips are cooled down to almost absolutely zero, but even that requires little power. Its energy efficiency is also

That is when you compare them on an apple-to-apple comparison. E.g. compare a classic supercomputer with a Quantum Computer with the same computing power. If anything the supercomputer will do the same calculations much more quickly,

3 China and Quantum Computing Whereas most of the Western scientific world is pretty open about their research in quantum computing, China is much less so. However, there is no doubt that China is investing BIG time in Quantum Computing. It is hard to get an accurate estimate of the total funding China is pouring into Quantum Computing, but it is likely to be in the order of magnitude of what all other countries jointly put in.

Like other emerging technologies, quantum has become a crux of China-U.S. competition. The first country to operationalize quantum technologies will possess a toolkit of capabilities that can overwhelm unprepared adversaries. Quantum-enabled countries could crack existing encryption methods, build unbreakable encrypted communications networks, and develop the worlds most precise sensors. The country leading in quantum will be able to threaten adversaries corporate, military, and government information infrastructure faster than an adversary can implement effective defences.

Quantum technologies also carry immense potential market value, with quantum computing alone expected to reach a global market value of $1 trillion by 2035. The first country to commercialize quantum will have an upper hand in establishing market dominance, developing quantum governance models, and pursuing novel quantum applications. Because quantum is an enabling technology, advancement in QIS may also catalyze a series of disruptive innovations in other profitable technology areas, such as artificial intelligence.

4 Encryption One of the BIG applications for quantum computing appears to be encryption, and certainly the breaking of existing encryptions. See item 3 as well.

However, we are able today to develop an encryption algorithm that can not be broken by even Quantum Computers. The folks from TNO we met with have just published a paper to this effect!

5 How real is it all?

You can buy a quantum computer today, or get access to one in the cloud. So that is pretty real! Even so, these are quantum computers with just a few qubits so they are quite limited in what they can do.

Some of the big tech companies, such as IBM and Google are investing big time into this new technology.

If you follow this topic you will read about break through left, right and center every few months. The reality is we are probably still quite some time away from a quantum computer that will outperform a current super computer one way or the other.

6 Ethical perspective We talked a bit about the ethical aspects of this new technology. Should we be developing such technologies? It is easy to see some advantages, but the disadvantages, or negatives are immense as well. We know that some of the scientists who worked on the invention of the A-bomb afterwards said they should have stopped working on it. All the scientists we met said the same. They would stop if it became obvious if and when the disadvantages would outweigh the advantages for us humans.

7 Technical skills and competence Quantum computing requires a very different skill and competence set from working with classic computers. Folks who would be considered top experts in writing algorithms for AI would be out of their debts in the quantum world.

Interestingly enough, some of the algorithms developed for quantum computing have also led to new insight and improvements in AI algorithms.

Anyway, again I find this a hugely interesting topic. Even though I struggle with the basic understanding of how it all works.

I would be interested to learn from other members what they know and or think about Quantum Computing,

Jeroen

Read this article:

Quantum Computing : the new AI hype? - Team-BHP

Posted in Quantum Computing | Comments Off on Quantum Computing : the new AI hype? – Team-BHP

Preparing IT security for the age of quantum computing – ComputerWeekly.com

Posted: at 2:23 am

Given that modern society is increasingly becoming digital, there is growing demand for safe, secure communications. While cryptographic standards and digital certificate systems such as public key infrastructure (PKI) offer the verification, authentication and encryption required to protect digital communications, one threat to emerge in recent times is the prospect of these secure communications systems being compromised by quantum computers.

The idea of quantum supremacy, where certain computational tasks can no longer be run on classical high-performance computing architectures, is still some way off. Yet the speed promised by quantum computing, and hybrid architectures that use quantum technology to accelerate certain functions in an algorithm running on a classical computer architecture, represents both an opportunity and a risk to society.

Researchers around the world are exploring how quantum computing algorithms can be used to solve extremely complex problems. Quantum computing promises huge societal benefits, such as helping to tackle climate change, improving efficiencies in chemical processes and drug discovery, and all manner of complex optimisations that cannot be run on classical computing systems. But as quantum computers evolve, there is also a growing concern that the technology will break existing cryptographic standards. In effect, they will become powerful enough to crack encryption keys extremely quickly.

If large-scale quantum computers are ever built, they will be able to break many of the public-key cryptosystems currently in use. This would seriously compromise the confidentiality and integrity of digital communications on the internet and elsewhere, the US National Institute of Standards and Technology (NIST) warns in a draft proposal for post-quantum cryptography (PQC).

This would have a profound impact on the security of the internet. Once large-scale, fault-tolerant quantum computers become a reality, encryption protocols that have protected sensitive information for years will become vulnerable to attacks, says John Cullen, a strategic marketing director for cyber security at Thales. As the advent of quantum computing looms closer, the future security of PKI hangs in the balance.

Cullen believes cyber criminals will eagerly exploit the weakness in PKI systems to gain unauthorised access to valuable data. It is therefore imperative for organisations to take proactive measures to protect themselves before quantum technology becomes mainstream, he warns.

This is why standards bodies such as NIST and ETSI, the European standards body for IT-enabled systems, have become involved in quantum computing.

Jonathan Lane, a cyber security expert at PA Consulting, points out that the likes of NIST and ETSI are several years into programmes to identify and select post-quantum algorithms (PQAs), and industry and academia are innovating. We are approaching some agreement on a suite of algorithms that are probably quantum-safe; both the UKs NCSC [National Cyber Security Centre] and the USs NSA [National Security Agency] endorse the approach of enhanced public key cryptography using PQA along with much larger keys, he says.

Lane says the NCSC recommends that the majority of users follow normal cyber security best practice and wait for the development of NIST standards-compliant quantum-safe cryptography (QSC) products.

One sector that is looking closely at the development of quantum computing is banking, specifically how it will impact the cryptographic standards it relies on for safe and secure payment processing.

In July, for instance, HSBC announced it was working with BT, Toshiba and Amazon Web Services (AWS) on a trial of quantum secure transmission of test data over fibre-optic cables between its global headquarters in Canary Wharf and a datacentre in Berkshire, 62km away, using quantum key distribution (QKD).

QKD uses particles of light and the fundamental properties of quantum physics to deliver secret keys between parties. These keys can be used to encrypt and decrypt sensitive data, and are safe from eavesdroppers or cyber attacks by quantum computers.

QKD is set to play a key role in protecting financial transactions, client data and proprietary information across the financial sector. HSBC processed 4.5 billion payments last year, worth an estimated 3.5tn. These electronic payments rely on encryption to protect customers and businesses from cyber attacks, which is one of the reasons the bank has established a quantum strategy. This includes trials of QKD and PQC.

BT and Toshiba have been collaborating on a trial quantum secure network since October 2021. This network offers what BT describes as a range of quantum-secured services including dedicated high-bandwidth end-to-end encrypted links. It is delivered over Openreachs private fibre networks. Toshiba provides quantum key distribution hardware and key management software.

In April 2022, BT and Toshiba, along with EY, launched a trial of a world-first commercial quantum-secured metro network based on this technology. The infrastructure connects EY customers across London, helping them to secure the transmission of data and information between multiple physical locations over standard fibre-optic links using quantum key distribution.

HSBC is the first bank on the BT/Toshiba infrastructure. HSBC hopes its investigation of quantum-secure communications will help it provide evidence around the advantages of quantum technology and drive the development of applications in financial cyber security. According to HSBC, its quantum scientists, cyber crime experts and financial specialists will be better able to analyse the potential threat posed by powerful quantum computers and devise strategies to safeguard sensitive information.

At the other end of the spectrum of application areas for cryptography are low-powered internet-connected devices. PA Consultings Lane notes that since internet of things (IoT) devices generate and exchange data, IoT applications require this data to be accurate and reliable. Since devices tend to be networked, their exploitation can open attack vectors in wider systems, which could have an extensive and global impact, he warns.

For instance, in 2016, the largest ever botnet attack was launched on domain name system service provider Dyn using Mirai malware. According to Lane, this malware looked for IoT devices running the Linux ARC operating system, attacked them with default login information and infected them. This enabled huge numbers of IoT devices to be used together in distributed denial of service (DDoS) attacks, resulting in significant parts of the internet going down.

Researchers are looking at how to improve IoT security, and post-quantum cryptography is likely to be an area that will grow in importance. But Lane warns that most of the enhanced QSC standards appear to require considerable computing power to deal with complex algorithms and long keys.

Many IoT sensors may not be capable of running these, he says. Until NIST delivers its QSC standards, we wont know whether they will work within IoT constraints. If they dont, then there is a gap in the formal development of IoT QSC solutions.

Lane believes asymmetric cryptography may offer a way to implement a viable low-resource PQC algorithm. Symmetric cryptography is currently favoured by the IoT industry as a low-power mechanism, but the problem of secretly distributing the same keys to each party remains, and quantum enhancements may push up power requirements, he says.

Then there are symmetric key establishment mechanisms where innovation may help, as alternative approaches are being considered.

These include quantum key distribution, where the properties of quantum mechanics are used to establish a key agreement, rather than using difficult mathematical problems that quantum computers will solve quickly. However, Lane says QKD requires specialist hardware and does not provide a way of easily enabling authentication, and the NCSC doesnot endorse QKD for any government or military applications.

Secure key agreement (SKA) is another alternative approach. Lane says some companies are experimenting with computationally safe ways of digitally creating symmetric keys across trusted endpoints. This type of low-power, software-based capability offers an interesting alternative for the IoT, he adds. Although independent verification of this type of capability is happening, Lane says the approach is neither on NISTs nor ETSIs radar.

Overall, IT security needs to evolve to combat the imminent threat of all-powerful quantum computers rendering existing cryptography obsolete. Thales Cullen warns that the future of a secure and connected world hinges on the ability to defend against PKI attacks and safeguard the trust placed in these security measures.

The industry must explore new ways to bolster policies, procedures and technology, he says. As the advent of quantum computing looms closer, the future security of PKI hangs in the balance.

The risk of quantum attacks on existing encryption protocols demands proactive action from organisations and governments alike.

Read more here:

Preparing IT security for the age of quantum computing - ComputerWeekly.com

Posted in Quantum Computing | Comments Off on Preparing IT security for the age of quantum computing – ComputerWeekly.com

New kind of quantum computer made using high-resolution … – Nature.com

Posted: at 2:23 am

Physicists have performed the first quantum calculations to be carried out using individual atoms sitting on a surface.

The technique, described on 5 October in Science1, controls titanium atoms by beaming microwave signals from the tip of a scanning tunnelling microscope (STM). It is unlikely to compete any time soon with the leading approaches to quantum computing, including those adopted by Google and IBM, as well as by many start-up companies. But the tactic could be used to study quantum properties in a variety of other chemical elements or even molecules, say the researchers who developed it.

At some level, everything in nature is quantum and can, in principle, perform quantum computations. The hard part is to isolate quantum states called qubits the quantum equivalent of the memory bits in a classical computer from environmental disturbances, and to control them finely enough for such calculations to be achieved.

Andreas Heinrich at the Institute for Basic Science in Seoul and his collaborators worked with natures original qubit the spin of the electron. Electrons act like tiny compass needles, and measuring the direction of their spin can yield only two possible values, up or down, which correspond to the 0 and 1 of a classical bit. But before it is measured, electron spin can exist in a continuum of possible intermediate states, called superpositions. This is the key to performing quantum computations.

Three titanium atoms are arranged inside a scanning tunnelling microscope (STM), close enough to sense each other's quantum spins. Iron atoms stuck to the tip of the STM (top) 'talk' with one of the qubits (blue), using it to read and write information on the other two (red) and to get them to perform a rudimentary quantum computation.Credit: Center for Quantum Nanoscience

The researchers started by scattering titanium atoms on a perfectly flat surface made of magnesium oxide. They then mapped the atoms positions using the STM, which has atomic resolution. They used the tip of the STM probe to move the titanium atoms around, arranging three of them into a triangle.

Using microwave signals emitted from the STM tip, the researchers were able to control the spin of a single electron in one of the titanium atoms. By tuning the frequencies of the microwaves appropriately, they could also make its spin interact with the spins in the other two titanium atoms, similarly to how multiple compass needles can influence each other through their magnetic fields. By doing this, the team was able to set up a simple two-qubit quantum operation, and also to read out its results. The operation took just nanoseconds faster than is possible with most other types of qubit.

Heinrich says that it will be fairly straightforward to extend the technique to perhaps 100 qubits, possibly by manipulating spins in a combination of individual atoms and molecules. It might be difficult to push it much beyond that, however and the leading qubit technologies are already being scaled up to hundreds of qubits. We are more on the basic-science side, Heinrich says, although he adds that multiple STM quantum computers could one day be linked to form a bigger one.

See original here:

New kind of quantum computer made using high-resolution ... - Nature.com

Posted in Quantum Computing | Comments Off on New kind of quantum computer made using high-resolution … – Nature.com

Eviden Supports Post-Quantum Algorithms with Its Network Security … – HPCwire

Posted: at 2:23 am

PARIS, Oct. 11, 2023 Eviden today announced its Trustway IP Protect IPSec network security solution will soon support post-quantum algorithms, and expands strategic partnership with CryptoNext Security, a leader in next-generation post-quantum cryptography.

As quantum computers are a soon-to-become reality, Eviden anticipates its arrival along with its associated security risks by upgrading its Trustway portfolio to be post-quantum ready. Trustway IP Protect will enable customers to migrate progressively towards hybrid encryption solutions, thanks to the integration of post-quantum cryptographic algorithms from CryptoNext Security.

With the latest upgrade of Trustway IP Protect, which will be available in Q1 2024, Eviden has effectively implemented the ANSSI recommendations that advocate a gradual, step-by-step transition towards post-quantum solutions. The primary objective is to progressively increase trust in post-quantum algorithms and their uses, while safeguarding the integrity of traditional (pre-quantum) security measures to prevent any setbacks.

Trustway IP Protect is designed to protect customers from the risks of economic espionage and intrusion into IT infrastructures. Based on a crypto module developed in France Trustway IP Protect range offers the most advanced security features to protect communications up to sensitive environments. It is currently going through the ANSSI Standard Qualification (ANSSI QS) and Common Certified EAL4 certification processes, to ensure the highest level of confidentiality to network communications protection.

We strive to deliver innovative, high-security systems which are future-ready. Through our continued and sustainable partnership with CryptoNext teamed with our own cryptographic systems expertise, we are supporting our partners and customers with our future-proof solutions in order to be prepared for the post-quantum era, said Philippe Duluc, CTO for Big Data and Security activities at Eviden, Atos Group.

Jean-Charles Faugre, founder and CTO of CryptoNext Security added: This is a high recognition from an undisputed global and European leader for CryptoNext Security leadership in PQC systems and solutions migration. Scaling up after our involvement in the Proteccio PQC announcement, we are proud to contribute to such excellence and sovereign solutions, leveraging Evidens reputation for long-term innovation and market accuracy. Such an announcement also demonstrates the value of our long-term partnership.

Post-quantum cryptography is at the core of Evidens work, with the launch of the first post-quantum ready Hardware Security Module and digital identity solutions earlier this year. In addition, the Atos Group, through its Eviden business line, is a pioneer in quantum computing. The Group launched the first quantum emulator on the market in 2016 and now offers the most powerful quantum computing application development platform, coupled with a consultancy offering that accelerates real quantum applications through all-in-one capabilities and a best-in-class development environment.

About Eviden

Eviden is a next-gen technology leader in data-driven, trusted and sustainable digital transformation with a strong portfolio of patented technologies. With worldwide leading positions in advanced computing, security, AI, cloud and digital platforms, it provides deep expertise for all industries in more than 47 countries. Bringing together 55,000 world-class talents, Eviden expands the possibilities of data and technology across the digital continuum, now and for generations to come. Eviden is an Atos Group company with an annual revenue of c. 5 billion.

About Atos

Atos is a global leader in digital transformation with 107,000 employees and annual revenue of c. 11 billion. European number one in cybersecurity, cloud and high-performance computing, the Group provides tailored end-to-end solutions for all industries in 69 countries. A pioneer in decarbonization services and products, Atos is committed to a secure and decarbonized digital for its clients. Atos is a SE (Societas Europaea), and listed on Euronext Paris.

Source: Atos

Excerpt from:

Eviden Supports Post-Quantum Algorithms with Its Network Security ... - HPCwire

Posted in Quantum Computing | Comments Off on Eviden Supports Post-Quantum Algorithms with Its Network Security … – HPCwire

Second Amendment Roundup: Fusillade of Amicus Briefs Filed in Rahimi – Reason

Posted: at 2:21 am

A fusillade of amicus briefs has now been filed in support of affirmance of the Fifth Circuit's decision invalidating the federal ban on possession of a firearm while under a domestic violence restraining order (DVRO). While no one countenances the alleged behavior of respondent Zackey Rahimi, the various amici persuasively argue that the federal law 18 U.S.C. 922(g)(8) facially violates the Second Amendment.

In this post, I'd like to identify some of the briefs that I thought to be extraordinary. All of the briefs are easily accessible in the docket on the Supreme Court's website.

But first I'd like to mention the Brief of Respondent, filed on behalf of Mr. Rahimi. Lead counsel is Matthew Wright, Office of the Federal Public Defender, N.D. Tex. The brief covers all of the bases of text and history, as mandated by the Court in NY State Rifle & Pistol Ass'n v. Bruen, and in particular does a thorough job of recording how the founding generation responded to interpersonal and domestic violence. That generation responded in numerous ways, but never by banning possession of arms. Contrary to myth, numerous men were jailed for spousal abuse in the new nation.

Public defenders are underappreciated, but they do God's work by providing counsel to indigents. Kudos to Mr. Wright's team for their professionalism.

Disclosure: I filed a brief on behalf of the National African American Gun Association. It focuses on the purported historical analogues relied on by the United States, such as bans on arms possession by "Greasers," "tramps," and "vagrants," which were traps for involuntary servitude. The government also cites the confiscation of arms by oppressive British monarchs, seizure of the arms of Loyalists by our own patriots in the Revolution (there was a war going on after all), and wholly irrelevant laws against gun sales to children and intoxicated persons.

The government also argues that the development of repeating arms after the Founding justifies 922(g)(8) as warranted by "novel modern conditions." However, technological innovation in arms did not increase domestic violence, given the prevalent use of knives, blunt instruments, and bare hands by abusers.

Now on to the high points in some of the other briefs, in no special order.

In states like California and New York, DVROs are handed out like beads thrown from floats at Mardi Gras. Judges routinely sign on the dotted lines with little pretense to due process. These practices are detailed in the briefs of the Alameda County Public Defenders et al. and The Bronx Defenders Union and National Association of Criminal Defense Lawyers.

Is domestic violence something new that was unknown to the Founders, necessitating novel firearm restrictions? The brief of historian Angus Kirk McClellan has the obvious answer: No. "Domestic violence was a serious social problem at the founding and throughout the nineteenth century." Did English and early American law tolerate cruelty by abusive husbands to wives? The answer is also no, as McClellan demonstrates. For instance in 1687, in the colony of Pennsylvania, wife Hannah Overton brought evidence of husband Thomas Tunneclif's abuse toward her and their children. The court ordered him to give a good behavior surety which could be levied against his property. Had he not done so, he would have been jailed. McClellan also details the Founding-era surety system, which was the historical, common-law way of addressing threats of interpersonal violence. It did not involve disarmament.

On 922(g)(8)'s failure to provide due process protections, check out the gold-star brief by Dan Peterson on behalf of Law Enforcement and Firearms Rights Groups. The federal law provides no standard of proof for issuance of a DVRO under state law, such as the "clear and convincing evidence" standard, in order to trigger 922(g)(8)'s possession ban. Nor does it require the right to counsel or to a live hearing, where evidence can be proffered, witnesses can be cross-examined, and other procedures necessary to fundamental fairness can be followed.

A return to a "reasonableness" test to determine the validity of restrictions on the Second Amendment is advocated not just by amici for the United States, but also by some supporters of the right. But, as Cooper & Kirk's brief on behalf of the Center for Human Liberty demonstrates,

that is "obviously an invitation to the very type of untethered judicial policymaking rejected in Heller and Bruen." This brief also systematically rebuts the government's case, showing that 922(g)(8) cannot be reconciled with the history of firearm regulation in this country, particularly because it disarms individuals who have not been found to present an imminent threat of violent criminal conduct.

As to the arguments by amici for the United States to "convert long-rejected invidious discrimination into modern constitutional precedent," David Kopel's brief on behalf of Professors of Second Amendment Law demonstrates how they "overlook the arms-related constitutional enactments repudiating the invidious laws. The right to arms is governed by constitutional enactments, and not by abuses the enactments were designed to stop."

Rahimi preserved the argument that, aside from the Second Amendment, Congress has no power under Article I, 8, of the Constitution to restrict mere possession of arms. The brief of the Firearms Policy Coalition explains how no such power exists under either the Militia Organizing Clause or the Commerce Clause to prohibit possession of firearms. The Justices could avoid the Second Amendment arguments altogether by holding that the Framers of our Constitution plainly gave Congress no authority to regulate non-economic, intrastate matters like the relationship between intimate partners and the mere possession of a firearm in the home.

These are some of the highlights, and there are other fine briefs. David Kopel will also be blogging about the various briefs.

Meanwhile, the United States has filed a cert. petition in Garland v. Range. In that case, the Third Circuit held en banc that the federal ban on possession of a firearm by a felon is invalid as applied to a person who was not convicted of a violent felony and is not dangerous. The government suggests that the Supreme Court hold the petition until Rahimi is decided, and then dispose of the petition as appropriate. I will provide an update on the case when Mr. Range has filed his response

Here is the original post:
Second Amendment Roundup: Fusillade of Amicus Briefs Filed in Rahimi - Reason

Posted in Second Amendment | Comments Off on Second Amendment Roundup: Fusillade of Amicus Briefs Filed in Rahimi – Reason

12 Defensive Gun Uses Bare Absurdity of Attacking Gun Rights – Daily Signal

Posted: at 2:21 am

In a legal battle that made national headlines, the governor of New Mexico last month sought to unilaterally suspend the right of residents to bear arms in public.

This insanely unconstitutional measurewhich courts fortunately brought to a quick haltwould be troubling on its own, given the Supreme Courts clear defining of the right to keep and bear arms in the 2022 case New York State Rifle & Pistol Association v. Bruen.

However, the move by New Mexico Gov. Michelle Lujan Grisham, a Democrat, is merely the most recent in a long parade of attacks by gun control activist politicians seeking to thumb their noses at the Supreme Court and undermine the Second Amendment.

California Gov. Gavin Newsom, a Democrat, just signed into law 23 new gun control measures, despite the fact that his state already faces myriad legal challenges to its existing restrictions.

Earlier this summer, Newsom proposed a 28th Amendment to enshrine gun control in the U.S. Constitution.

Since the Supreme Courts Bruen ruling, Maryland has gone to such great lengths to impose restrictions on concealed carry permit holders that even an Obama-appointed judge was willing to find that the state crossed constitutional lines.

Massachusetts, meanwhile, is trying to ban the sale or future possession of millions of commonly owned semiautomatic firearms.

Its important to understand what these laws all have in common. Rather than protecting Americans by addressing very real problems such as rogue prosecutors and lack of accountability for repeat violent offenders, these politicians are focused on depriving as many peaceable Americans as possible of their natural right of self-defense.

And thats a problem.

Almost every major study has found that Americans use their firearms in self-defense between500,000 and 3 milliontimesannually, as the Centers for Disease Control and Prevention has acknowledged. In 2021, the most comprehensive study ever conducted on the issue concluded thatroughly 1.6 million defensive gun usesoccur in the United States every year.

For this reason,The Daily Signalpublishes a monthly article highlighting some of the previous months many news stories on defensive gun use that you may have missedor that might not have made it to the national spotlight in the first place. (Read other accountsherefrom past months and years. You also may follow@DailyDGUon Twitter for daily highlights of defensive gun uses.)

The examples below represent only a small portion of the news stories on defensive gun use that we found in September. You may explore more using The Heritage Foundations interactiveDefensive Gun Use Database.(The Daily Signal is Heritages news organization.)

As these examples make clear, peaceable Americans routinely rely on their Second Amendment rights to protect themselves and others from criminals.

With crime rates spiraling out of control, law-abiding Americans deserve better than desperate attempts by gun control activists to blame and jeopardize their right to keep and bear arms. This constitutional right remains an important last line of defense against anyone who would threaten life, liberty, or property.

The correct response to criminal violence is to crack down on violent criminals, not to threaten potential victims who merely want to defend themselves when the government cant or wont protect thema scenario that, unfortunately, is becoming increasingly common.

Have an opinion about this article? To sound off, please emailletters@DailySignal.comand well consider publishing your edited remarks in our regular We Hear You feature. Remember to include the url or headline of the article plus your name and town and/or state.

View post:
12 Defensive Gun Uses Bare Absurdity of Attacking Gun Rights - Daily Signal

Posted in Second Amendment | Comments Off on 12 Defensive Gun Uses Bare Absurdity of Attacking Gun Rights – Daily Signal

Horrific Attack In Israel Shows Critical Importance Of Second Amendment In America | David Hookstead – Outkick

Posted: at 2:21 am

The killing of innocent Israeli civilians is a brutal and bloody reminder of the importance of the Second Amendment in America.

Hamas fighters carried out a devastating sneak attack in Israel several days ago that resulted in the evil slaughter of hundreds of innocent men, women and children. Dozens more were captured as hostages and taken to Gaza. Their fate is in the balance.

The chilling videos show Hamas terrorists roaming the streets gunning down and killing people on sight. They also went into neighborhoods that look similar to the suburbs in America, going door-to-door looking for Jewish families to murder. At least 260 innocent people mostly on the younger side were slaughtered at a music festival as the attack began.

All of this horror is an important reminder of why civilians have fought to keep their right to bear arms in the USA.

What happened in Israel would be significantly harder to pull off in America for one simple reason:

Our country is flooded with private gun ownership, and people have access to weapons similar to what the military and police have.

While gun ownership isnt banned in Israel, it is heavily restricted compared to America and there is no individual right to gun ownership.

One of the first things Israel did after the horrifying terror attack was to loosen its gun laws to get as many weapons into civilian hands as possible. Its the same thing Ukraine did as the Russian invasion unfolded. The Ukrainian government handed out rifles to anyone in Kiev who could get their hands on one.

The logic is simple. Armed people are harder to kill than unarmed people. Bullets flying in both directions giving bad guys something to consider before attacking.

However, here in America, there is a long track record of armed people killing bad guys, including in religiously targeted attacks. If none come to mind for you, thats because the media in general doesnt like to spotlight anything that validates how important civilian gun ownership is.

But to cite just a couple:

Stephen Willeford used an AR-15 to engage a gunman who was carrying out a massacre at a church in Sutherland Springs, Texas. The first line of defense wasnt a police officer. It was Willeford an armed civilian firing rounds on the murderer to put an end to the carnage. If he had not intervened and engaged the shooter, the killing spree would have continued much longer.

Sutherland Springs wasnt the only shooting in Texas an armed civilian put an end to. A man entered the West Freeway Church of Christ in 2019 and killed two people. Jack Smith, another armed civilian, unholstered his weapon and killed the shooter. How many more people would have died if Smith hadnt been there? Its hard to say for sure, but it definitely would have been more than two.

Its not a surprise that my assessment of the critical role the Second Amendment plays is backed up by the NRA and Gun Owners of America. NRA spokesman Billy McLaughlin told me, Crime can happen anywhere and at any time. That is why the NRA believes it is prudent for law-abiding people who choose to have an effective means of defending themselves and their loved ones to be able to do so. As we are reminded daily, being an instant responder to atrocity is ones best chance of survival.

GOA senior vice president Erich Pratt, The conflict in Israel demonstrates the truth found in the Second Amendmentthat the right to keep and bear arms is necessary to the security of a free state. Ironically, gun control advocates in this country were calling for gun restrictions here, at the same time Israel began slashing its. This underscores the perennial problem with gun control: firearms restrictions never stop criminals from possessing guns, and they put good people at the mercy of heinous terroristsboth foreign and domestic.

A lot of people who pay attention to history certainly agree with the NRA and GOA on the issue.

While the IDF and Israeli police did the best they could to beat back and kill the Hamas terrorists during the heinous surprise attack last Saturday, the simple fact of the matter is the more guns in the hands of good, law-abiding people, the safer we all are.

While some states like New York and California have restrictive gun laws and bans on many popular semi-automatic firearms, there are still civilian gun owners in those states.

In states like Florida or Montana, people are locked and loaded across the board. My brain cant even comprehend 100 terrorists roaming through a Florida community and not being chewed to pieces by armed civilians.

Its believed there are more than 24 million AR-15s in private hands in America, its estimated roughly one million Glock handguns are sold annually in the USA, and theres a total of 76 million rifles and 64 million shotguns in private circulation. In addition, its believed more than 22 million Americans carry weapons on their body outside of the home. That figure doesnt include states where no permit is needed for concealed carry.

It would be Red Dawn in the streets if a terrorist organization or foreign army ever showed up looking to kill innocent people, and the Second Amendment is the reason why.

The fact is also that bad people dont want to shoot up places where theyre likely to meet armed resistance. They choose schools, music festivals and other soft targets where few, if any, guns are likely to be found. Do people attempt mass shootings at gun stores or gun shows? No, because they wouldnt get far at all.

The Nashville mass shooter even scoped out a different school, but opted to not target it because of its security measures.

Bad guys dont want bullets coming their way. They want defenseless and easy targets.

While I wont get into specifics, it wouldnt take long to arm a lot of people very quickly in the event of an emergency.

I know many people who could hand out guns in a matter of minutes if not seconds if they looked out their window and saw terrorists roaming the street killing people.

The Hamas terrorists in Israel went door-to-door executing innocent civilians and taking hostages. Breaking into a house in America is a great way to end up dead.

As the famous saying goes, God made man. Samuel Colt made them equal.

Look at the areas where the riots in 2020 did the most damage in America. It was mostly in areas with strict gun laws like Washington D.C., New York, Portland and other liberally controlled areas. A violent mob tried to burn Kenosha, WI to the ground and Kyle Rittenhouse shot three people.

Another great example is the 1992 riots in Los Angeles. Koreans took to the streets and rooftops armed with weapons and beat back the rioters. Without those weapons, who knows how many might have died.

The bad guys tested their resolve, the Koreans opened fire and stood their ground. Again, bad guys dont like being shot at.

Some people seem to hate the Second Amendment and the fact that millions of Americans are armed, but their attitude will quickly change if they need help. If anyone ever tries what happened in Israel here in America, theyre going to immediately learn why the Second Amendment exists. Thats something Im very grateful for.

See more here:
Horrific Attack In Israel Shows Critical Importance Of Second Amendment In America | David Hookstead - Outkick

Posted in Second Amendment | Comments Off on Horrific Attack In Israel Shows Critical Importance Of Second Amendment In America | David Hookstead – Outkick

OPINION: Second Amendment rights deserve protection – The … – Stanly News & Press

Posted: at 2:21 am

Published 5:08 pm Wednesday, October 11, 2023

By Rep. Wayne Sasser

Rep. Wayne Sasser

Constitutional rights are not conditional. They are not applied differently to Americans depending on their race, gender, religious beliefs and especially not based on their state of residence. For example, while different states may have different rules and regulations in place that govern their elections, the Nineteenth Amendment protects womens right to vote in every corner of the nation.

The Second Amendment is no different. The fundamental right to keep and bear arms must be protected for all Americans, wherever they live. Unfortunately, threats to the Second Amendment are on the rise. New Mexico Gov. Michelle Lujan Grisham launched one of the latest assaults on Americans freedoms by declaring through executive fiat a public health emergency in her state due to gun violence. This declaration empowers the New Mexico Department of Health to temporarily prohibit the open or concealed carry of firearms in Albuquerque and Bernalillo County.

This sets a dangerous precedent if you dont like something, simply declare it a public health emergency, and suddenly, you have a free pass to ignore the Constitution. There are reasonable ways that states can and do go about implementing guardrails in the system to keep dangerous criminals away from firearms while ensuring that law-abiding citizens rights are not trampled. But these solutions must be kept within the scope of the law and not bend the rules to fit an end goal.

Instead, what were seeing in New Mexico is a government overreach that twists the law to implement an agenda.

While a federal judge has already blocked portions of Grishams order temporarily, lawmakers cannot sit idly by while threats to the Constitution persist. Sen. Thom Tillis (R-NC) recently stood up against this abuse in sending a letter, along with other Republican senators, to the Department of Justice urging them to intervene to protect the rights of the citizens of New Mexico. He also co-sponsored legislation that would prevent the president and other government officials from using such arbitrary public health orders as a means to implement gun control measures.

The developments out of New Mexico reflect a broader effort in parts of our country to tamper with our Second Amendment rights. In fact, other states have already made similar pushes to crack down on basic freedoms through public health declarations.

For example, recent legislative sessions in Connecticut have seen efforts to declare gun violence a public health emergency. At a federal level, some lawmakers are even calling for a national public health emergency declaration on gun violence through the Department of Health and Human Services.

At all levels, we are seeing more and more attempts to abuse emergency declarations to fast-track a crackdown on our right to bear arms. If the decision by New Mexicos governor is left unchecked, countless other government officials would feel empowered to follow suit and a threat on the other side of the country would soon be felt closer to home in North Carolina. This is especially pressing if action is taken at the federal level.

Tillis is right to call on other lawmakers and the DOJ to make it clear that these kinds of actions wont stand. This isnt only a defense of the Second Amendment. If we pick and choose when and where we stand up for basic rights, the foundations of our democracy will crumble. Our nations leaders must rise above politics and see Grishams abuse of power for what it is.

The freedoms of all Americans are at stake.

Wayne Sasser represents the 67th District in the North Carolina House of Representatives.

See the rest here:
OPINION: Second Amendment rights deserve protection - The ... - Stanly News & Press

Posted in Second Amendment | Comments Off on OPINION: Second Amendment rights deserve protection – The … – Stanly News & Press