/How Quantum Race Tech Data Putting the World at Risk – Herald Journalism (via Qpute.com)

How Quantum Race Tech Data Putting the World at Risk – Herald Journalism (via Qpute.com)

Technological one-upmanship between the United States and China are quickly becoming a new space race. There has been much talk in the press about the competition to achieve the 5G, but a bit outside the traction of the technology community about something more important: the danger of computing in the post-quantum.

The latest news on Google about the ability of the quantum is interesting. However, the prospect of a supercomputer at this level raises some concerns about the integrity of the data and the overall security threat.

What Is Quantum Race Tech?
Nearly 40 years ago, Scientific American published an article that stated it would take 40 quadrillion years to solve the state-of-the-industry security protocols RSA-129 later. achievement within 20 years from the date of the article, which was published in 1977.

Recently two years ago, Phys.org published a piece warning that quantum computing security proposed to destroy the Internet as we know it. a statement which may seem a little hyperbolic, but not far from the situation we face.

The race quantum technologies is the virtual contest for Internet supremacy is being waged primarily between China and the United States. This technology is based on the same principles and mathematical equations that drive quantum physics research. It is expected to transition from theoretical, experimental realm to be fully formed, a game-changing technology in 2025.

It was only during the five years from now, that can seem like an eternity in terms of technological advances. Consider where we were just five years ago.

Post-Quantum Danger Zone
Computers that employ quantum technology has the ability to perform complex calculations and run equally complex models that destroy current encryption standards for this technology strength alone. These prospects led Sar National Initiative (NSI) to issue the following statement:

“This measure (call for encryption algorithm is quantum-safe) has been fueled in part by a statement by the NSA in 2015 that shocked the entire community:” for their partners and vendors that have not yet made the transition to the Suite B elliptic curve algorithms, should not create significant spending to do so at this time but to prepare quantum algorithm resistant transition will come. ‘ ”
Both American technology researchers and their Chinese counterparts have stated that the future will come sooner than we think.
There are some politicians, researchers, and members of the military who believe that China has gained a competitive advantage. However, in October 2019, Google claimed that they had jumped in front of China.

Last December, Congress passed the National Quantum Initiative Act, which is expected to break up US $ 1.275 billion for quantum research over the next four years.

Those statements may or may not be accurate, but the fact is that our encryption technology is not currently suitable for quantum supercomputers powered. Based quantum supercomputer’s first commercially available are expected to be in the market in 2022.

Left behind in the quantum-based cybersecurity Endanger not only financial and personal information stored on the hard drive and in the cloud but also put US national security at risk.

“Quantum computers have the potential to disrupt the current security protocols that the global financial markets to protect, create many encryption systems of today’s advanced inoperable, and upend the secret intelligence of government,” wrote Erica Orange and Jared Weiner, and Eshanthi Ranasinghe, in an article posted The Medium.

The US and China are not the only players in this game. They are just the greatest – and those who pose a potentially serious threat to the others. The EU has released $ 1.4 billion in funding quantum technologies, and even e-commerce mega-platform Alibaba has built its own quantum computing research laboratory.(Source)


This is a syndicated post. Read the original post at Source link .