Archive for the ‘Quantum Computing’ Category

SandboxAQ Unveils Security Suite for End-to-end Cryptographic Vulnerability Scanning and Remediation – Quantum Computing Report

By Carolyn Mathas

Large fault-tolerant quantum computers provide a substantial threat to existing public-key cryptography, rendering sensitive data and systems vulnerable to attacks. Moving to new encryption methods, however, may take a decade or longer to complete. In response, SandboxAQ just unveiled itsSandboxAQ Security Suite, an end-to-end cryptographic-agility platform providing cryptographic vulnerability scanning and remediation. SandboxAQ claims that its Security Suite is the industrys first complete solution for cryptographic inventory that includes analysis and inventory of filesystems, applications, and networks.

The SandboxAQ Security Suite architecture is based on three modules that enable discovery, management and remediation.

Enterprises and government agencies already making use of one or more modules of the SandboxAQ Security Suite include global banks, Cloudera, Informatica, the U.S. Air Force and the U.S. Department of Health & Human Services. Strategic alliances are also in place with Deloitte and EY to help enterprise customers identify and remediate encryption vulnerabilities. Small organizations also able to benefit from the suite by subscribing to a SaaS service and paying only for the modules and usage they need. In comparison, large enterprise customers typically access the solution on-premises or self-hosted in their own cloud.

According to Graham Steel, head of product in SandboxAQs Quantum Security division, Getting started right now is critical. Adversaries are not waiting for quantum computers to launch their attackstheyre already engaged in Store Now Decrypt Later attacks, acquiring sensitive encrypted data now for future decryption, Steel further explained that transitioning to quantum-safe encryption and implementing crypto-agility could take years. Many organizations with complex IT infrastructures are concerned whether this can be completed before large-scale quantum computers are available to carry out decrypt right now attacks. Our Security Suite is designed to accelerate every stage of this process, he added.

The SandboxAQ Security Suites cryptographic agility enables customers to seamlessly swap cryptographic protocols amid ever-changing regulatory requirements and cyber threats. This concept of crypto-agility will become mandatory to protect organizations against classical and quantum-based attacks, while maintaining regulatory compliance.

Additional information about the SandboxAQ Security Suite is available in a press release posted here.

April 19, 2023

The rest is here:
SandboxAQ Unveils Security Suite for End-to-end Cryptographic Vulnerability Scanning and Remediation - Quantum Computing Report

EY and IBM expand strategic alliance into quantum computing USA … – PR Newswire

LONDON, April 14, 2023 /PRNewswire/ -- The EY organization and IBM (NYSE: IBM) today announced that EY Global Services Limited will be joining the IBM Quantum Network, further enabling EY teams to explore solutions with IBM that could help resolve some of today's most complex business challenges. The EY organization will gain access to IBM's fleet of quantum computers over the cloud, and will become part of the IBM Quantum Network's community of organizations working to advance quantum computing.

Quantum computing is a rapidly emerging technology that harnesses the laws of quantum mechanics to solve problems that today's most powerful supercomputers cannot practically solve. EY teams will leverage their access to the world's largest fleet of quantum computers to explore solutions to enterprise challenges across finance, oil and gas, healthcare, and government.

The EY organization established its own Global Quantum Lab last year with a mission to harness quantum value in the domains of trust, transformation and sustainability. Using IBM quantum technology, EY teams plan to conduct leading-class practice research to uncover transformative use cases, including: the reduction of CO2 emissions from classical computing, the improvement of safety and accuracy of self-driving cars, and most critically, integrate quantum benefits into organizations' mainstream systems for data processing and enterprise decision making.

Andy Baldwin, EY Global Managing Partner Client Service, says:

"Quantum, in terms of importance to business, society and the EY organization, is akin to what AI represented years ago. This alliance puts the EY organization at the forefront of technology. As we invest in this level of quantum computing access, we accelerate our own position and depth of knowledge and capabilities in this space and deepen the rich relationship with our IBM alliance teams."

Jeff Wong, EY Global Chief Innovation Officer, says:

"As we navigate this period of technology-led change, which is accelerating at unprecedented speed, companies must have a full understanding of how to maximize breakthrough innovations in order to keep pace. Through this collaboration with IBM, the EY organization will now have the ability to take advantage of quantum computing to propel its innovation journey."

Jay Gambetta, Vice President IBM Quantum, says:

"IBM's vision is to deliver useful quantum computing to the world. We value partners like the EY organization that can introduce the emerging technology to a wide ecosystem of public and private industry. This will help EY facilitate the exploration of quantum computing's potential for use cases that matter in its industry."

Membership in the IBM Quantum Network is part of a broader effort by the EY organization to invest and develop robust capabilities in emerging technologies, which already include artificial intelligence, blockchain, and metaverse development. Beyond the increased investment of the EY-IBM Alliance, the EY organization is investing $10 billion in technology initiatives over three years, including investment in the organization's own quantum function.

More information on the EY-IBM Alliance, here.

About EY

EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets.

Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate.

Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

EY refers to the global organization, and may refer to one or more, of the member firms of Ernst & Young Global Limited, each of which is a separate legal entity. Ernst & Young Global Limited, a UK company limited by guarantee, does not provide services to clients. Information about how EY collects and uses personal data and a description of the rights individuals have under data protection legislation are available via ey.com/privacy. EY member firms do not practice law where prohibited by local laws. For more information about our organization, please visit ey.com.

This news release has been issued by EYGM Limited, a member of the global EY organization that also does not provide any services to clients.

About IBM

IBM is a leading global hybrid cloud and AI, and business services provider, helping clients in more than 175 countries capitalize on insights from their data, streamline business processes, reduce costs and gain the competitive edge in their industries. Nearly 3,800 government and corporate entities in critical infrastructure areas such as financial services, telecommunications and healthcare rely on IBM's hybrid cloud platform and Red Hat OpenShift to affect their digital transformations quickly, efficiently, and securely. IBM's breakthrough innovations in AI, quantum computing, industry-specific cloud solutions and business services deliver open and flexible options to our clients. All of this is backed by IBM's legendary commitment to trust, transparency, responsibility, inclusivity, and service. For more information, visit https://www.ibm.com/quantum

Logo - https://mma.prnewswire.com/media/1721690/EY_Logo.jpg

SOURCE EY

View post:
EY and IBM expand strategic alliance into quantum computing USA ... - PR Newswire

What is the purpose of post-quantum cryptography? – TechHQ

What is the purpose of post-quantum cryptography? The basic, white bread answer would be to keep all your secret stuff safe in the apparently imminent age of quantum computing, when standard cryptographic algorithms will be worth less than the paper on which you print them out.

Thats it in a nutshell. Quantum computing, a development thats set to massively increase the processing power and speed of computers as we know them, is, according to plenty of cryptographic experts, likely to pull on the thread of all known, pre-quantum cybersecurity, and keep pulling until all our carefully constructed cryptography is just a pile of numbers around our naked, exposed ankles.

Post-quantum cryptography is a collective term for an ever-growing group of methods that will allow quantum computing to exist while still protecting all our secrets (like bank account numbers, Netflix passwords etc, but also like access codes to nuclear or chemical laboratories, government buildings, national critical infrastructure systems and more). Without the ability to have and keep secrets, the world as weve come to know it would stop functioning in a big, big hurry.

The problem as it exists is that a lot of our pre-quantum cybersecurity is based on public-key technology. Whats public-key? Essentially, its just a large numerical value that we use to encrypt our data. Imagine, say, ten Rubik cubes, linked together through the center. Every move you make to solve one cube makes the same move on every other cube, each of which have a different initial configuration.

Its theoretically possible to solve all the puzzles together, but it a) takes quite the computational genius, and b) takes the computers we have a good deal of time, during which, a handful of cheerful alarms can be set off and security teams can come metaphorically running to intercept and throw out the potential hacker.

Thats great, so long as everyones using the same kind of computer, because it creates an unlikely but usefully level playing field.

The reason quantum computing is expected to be so fast is that it will be able to handle not only comparatively vast numbers of numbers simultaneously, but also vast numbers of computations simultaneously.

Its likely to look at the intricately constructed mega-puzzle that is pe-quantum public-key encryption, smile indulgently, say Cute, solve the whole thing in the time it takes to say Cute, and go about its Wikileaky day, leaving everything that had been protected by public-key encryption exposed to the elements, the hackers, the blackmailers and the hostile nation states.

At least, thats the theory. We dont technically know that quantum computing will be able to do that, and theres a sense of Millennium Bug planning about the whole thing. But as with Millennium Bug planning, if the nightmare scenario of quantum computing does come true and leave everything using public-key encryption open and exposed, were going to feel mighty foolish for the half-hour or so before the world dissolves into chaos, anarchy, James Bond movie plots and possibly a primitive non-computer dystopia.

Incidentally, its true of course that public-key is only half the story of pre-quantum cryptography. Theres also a private-key element, which is usually individual-specific. But its widely considered that if quantum computers can crack public-key cryptography, then private-key is likely to be little more than an hors doeuvres of decryption, the easy sudoku before it moves on to the cryptic version.

Hence the need to be prepared for the era of quantum computing by deploying post-quantum cryptography. But what really is the purpose of post-quantum cryptography? What does it really mean, and perhaps more to the point, how do we really do it? If the giant number-cruncher is coming for all our precious secrets, how in the world do we protect them?

Naturally enough, the way post-quantum cryptography works depends on understanding the purpose behind it, and the way the quantum computers are most likely to work.

Behind our folksy, easily digestible Rubik cube analogy, pre-quantum public-key cryptography tends to rely on three hard math problems: the integer factorization problem, the discrete logarithm problem, and the elliptic-curve discrete logarithm problem.

Feel free to look them up if you want to go beyond the Rubik cube analogy. Google will pretend to be your friend.

Post-quantum cryptography, perhaps perversely, will still most likely use public-key as its core approach, but will likely focus on any one or more of a handful of other techniques, given that quantum computers are expected to be able to solve the existing security problems in a handful of digital heartbeats, thanks to their ability to rapidly deploy Shors algorithm.

In brief, the front runner types of public-key algorithms that are most likely to deliver post-quantum cryptography are:

In particular, its worth keeping an eye on NTRU lattice-based cryptography, which has some significant testing behind it (with, admittedly, current computers), and has so far withstood years of attempts to crack it. Thats why NTRU lattice-based cryptography or at least something called the StehleSteinfeld variant of NTRU is being promoted for study as a potential standard of post-quantum cryptography by the Post Quantum Cryptography Study Group sponsored by the European Commission.

Less fun than they sound, hash-based cryptographic algorithms have been around since the 1970s (and as such, we might think them useless in fighting 2020s or 2030s quantum computer intrusion). Actually though, their fundamental nature as alternatives to numerical digital signatures might have some skin in the post-quantum cryptography fight. As yet, theyre less supported for investigation than the likes of lattice-based cryptography, but theres nothing fundamental that says evolutions of the likes of Lamport or Merkle signatures might not have a part to play in the post-quantum world.

Another contender favored by the European Commission, code-based cryptographic algorithms tend to rely on error-correcting codes. Ironically, one algorithm called the McEliece signature has withstood attempts to crack it for over 40 years by using random codes. Researchers that have tried to add more structure to the McEliece signature have invariably made it weaker and less stable, suggesting that useful randomness may have a part to play in post-quantum cryptography.

While it might not exactly trip off the tongue, supersingular elliptic curve isogeny cryptography might well prove useful for forward secrecy (useful for avoiding the likes of mass surveillance by unfriendly governments). Its also essentially a quantum-resistant version of an already widely-used version of public-key cryptography, the elliptic curve Diffie-Hellman key, so there are arguments in favor of it being a minimal-hassle upgrade.

Another alternative that more or less already exists is symmetric keys. Public-key cryptography is one thing, symmetric key cryptography another, but its another that already exists and is in use, and is expected to be quantum intrusion-resistant. That means there are many organizations suggesting we simply switch out public-key cryptography for symmetric key cryptography altogether.

Whether that will deliver a long-term solution remains as yet hard to judge at least until we see fully-powered quantum computers, up, running, and on their game. But its certainly a theoretical way of deferring the problem while robust long-term post-quantum cryptographic algorithms are tested and developed in the field.

One of the longer shots in the field right now, multivariate cryptography is exactly what it sounds like cryptography based on the solving of multivariate equations. In its current form, its not been particularly effective in testing, and in principle, the idea of essentially making public-key cryptography just a little more complex probably wont survive more than a couple of rounds of evolution of fully-powered quantum computers.

Still, the idea of doing more complex things with existing math appeals in the here and now, and if, for instance, the quantum cryptography apocalypse never arrives in the dramatic fashion thats being forecast, multivariate cryptography might yet have a future as a heightened evolution of pre-quantum cybersecurity.

Whichever options withstand the power of quantum computing best will undoubtedly shape the direction of corporate, government and personal cybersecurity for at least a generation. Which options those turn out to be well have to wait and see. But ultimately, what is the purpose of post-quantum cryptography? Its to make sure business continues as usual in a world of the casual supercomputer in your pocket, on your desk, and everywhere else.

Continue reading here:
What is the purpose of post-quantum cryptography? - TechHQ

How quantum computing will disrupt thematic ETFs – ETF Stream

From black holes and Schrodingers cat to machines capable of teleporting information, quantum computings road from sci-fi to investable opportunity may be early stage but its potential to affect seismic change in products such as thematic ETFs should not be underestimated.

Physicist Richard Feynman famously said if you think you understand quantum mechanics, then you do not. This rings true for the study of subatomic behaviour that defies the laws of physics but even more so when trying to understand the machines harnessing this behaviour to revolutionise computing.

Exponentially scaling the processing power of classical computers will soon be impossible, with transistors in silicon chips already a thousandth of the diameter of a red blood cell. However, these computers rely on binary digits called bits ones and zeros as their units of information, whereas quantum devices rely on qubits which can be represented as ones, zeros or through superposition the ability to be in multiple things at once they can appear as a mix of the two simultaneously.

This article first appeared in ETF Insider, ETF Stream's monthly ETF magazine for professional investors in Europe. To read the full article,click here.

Originally posted here:
How quantum computing will disrupt thematic ETFs - ETF Stream

Amazon Braket for Quantum Computing Research Advanced … – University of Central Florida

Please note: this is the second session (Advanced) of a workshop that takes place over two sessions. It is recommended that you attend both sessions. You need to register for the first (Introduction) session separately.

In this free hands-on workshop you will learn how to use Amazon Braket, a fully managed quantum computing service designed to help speed up scientific research and software development for quantum computing. You will skill up your quantum computing knowledge and have the opportunity to use quantum simulators and quantum computers to complete hands-on exercises. By popular demand this workshop will also cover analog Hamiltonian simulation with the 256-qubit processor Aquila from QuEra Computing, Inc. You will be provided with free 72 hours access to Amazon Braket to experiment with example notebooks and run programs on available quantum resources.

The workshop will be split in two 3-hour sessions. The first day of the workshop will be aimed at first-time users of Amazon Braket and introduce quantum simulators and gate-based quantum computers. The second day will be dedicated to more advanced topics on the Quantum Approximate Optimization Algorithm (QAOA) and analog Hamiltonian simulation with QuEra Aquila. The workshop is designed to be self-contained, but basic knowledge of the Python programming language and some familiarity with quantum gates and circuits is desirable. Advanced users who wish to skip introductory content can attend day 2 only.

Day 1 (Introduction): 4/17/2023 1PM-4PMDay 2 (Advanced): 4/19/2023 2PM-5PM

Presenter(s):Brajesh Gupt, Quantum Applied Scientist at Amazon Web Services (AWS)

Registration link (Day 2, Advanced ONLY):https://ucf.qualtrics.com/jfe/form/SV_cXTLDl2PLtuMd4q

Registration link (Day 1, Introduction ONLY):https://ucf.qualtrics.com/jfe/form/SV_by0lWGPqQEDxl6m

Research Computing and Data Workshops SeriesWe are pleased to bring to the UCF Research community a series of workshops on scientific computing and research data management. These workshops are being jointly presented by UCF Libraries,UCF Graduate and Research IT, andUCF Advanced Research Computing Center (ARCC)and will feature some guest speakers from the broader research community.This series also includes Software and Data Carpentries workshops (http://carpentries.org) which have been made possible through the sponsorship of Office of Research.

Upcoming WorkshopsFor the complete line-up of upcoming Research Computing and Data Workshops, please visit:https://rci.research.ucf.edu/workshops

Read more:
Amazon Braket for Quantum Computing Research Advanced ... - University of Central Florida