A Look at Quantum Resistant Encryption & Why It’s Critical to Future Cybersecurity – Hashed Out by The SSL Store
Quantum resistant cryptography will be a key part of cybersecurity in the future. Heres what to know about how to protect your data when hackers are armed with quantum computers
Quantum computing is a contentious topic that people tend to either love or hate depending on where theyre seated. On one hand, it represents an incredible opportunity in terms of data processing speeds and capabilities. On the other, its a means through which to destroy the cryptographic algorithms we now rely on to keep sensitive data secure online. This is where something known as quantum resistant encryption comes into play.
But what is quantum resistant encryption? This article explores the history of quantum computing in cryptography, why its a threat to modern online security, and what organizations can do to prepare to implement quantum safe cryptography within their IT environments.
Lets hash it out.
In a nutshell, quantum resistant encryption refers to a set of algorithms that are anticipated to remain secure once quantum computing moves out of the lab and into the real world. (They will replace the public key cryptography algorithms currently used by billions of people around the world every day.)
By the way, when people use any of the following terms, theyre typically talking about the same thing (in most cases):
All of the public key encryption algorithms we currently rely on today are expected to be broken once researchers succeed in building large enough quantum computer. Once that happens, quantum resistant encryption will need to be used everywhere (both by normal [i.e., classical] and quantum computers) so that attackers with quantum computers cant break the encryption to steal data.
Quantum computers are fundamentally different from the computers we use today. These devices use specialized hardware components that bring quantum physics into the equation and allows them to perform certain calculations exponentially faster than even the fastest supercomputer we currently have. (Well speak to that more later in the article.)
Current public key cryptographic algorithms rely on complex mathematics (for example, the RSA encryption algorithm relies on factoring prime numbers while Diffie-Hellman and elliptic curve cryptography, or ECC, rely on the discrete logarithm problem) to securely transmit data. This means that every time you buy an item on Amazon, your browser communicates with Amazons web server via a mathematically derived secure communication channel based on one of these mathematical approaches.
The problem is that some quantum computers will be able to solve these mathematical problems so quickly that hackers would be able to break modern public key encryption within minutes. (Basically, rendering the encryption public key algorithms provide useless.)
According to the National Security Agency (NSA), quantum resistant cryptography should be resistant to cryptanalytic attacks from both classical and quantum computers. With this in mind, these algorithms would be something that can be used both before and after quantum computers are put to use in real-world applications. Theyre designed with quantum computing threats in mind, but theyre not limited to being used only after a cryptographically relevant quantum computer (CRQC) is created.
Currently, encryption over insecure channels (e.g., the internet) relies on something known as public key cryptography. The idea behind traditional public key algorithms is that two parties (i.e., your websites server and the customer who wants to connect to it) can communicate securely using two separate but related keys: a public key that encrypts data and a private key that decrypts it. They use these keys to exchange secret information that they can use to create a secure, symmetrically encrypted communication channel. (Why symmetric encryption? Because its faster and less resource-intensive than public key encryption.)
Unlike modern algorithms, quantum resistant encryption algorithms will replace existing public key specifications with ones that are thought to be quantum resistant. Again, this is because the modern digital signature and key establishment algorithms we rely on in public key encryption now will no longer be secure when CRQCs become a thing.
NIST says that quantum resistant algorithms typically fall in one of three main camps:
There is a fourth category that some reference stateful hashed-based signatures. But according to NISTs PQC FAQs page:
It is expected that NIST will only approve a stateful hash-based signature standard for use in a limited range of signature applications, such as code signing, where most implementations will be able to securely deal with the requirement to keep state.
We cant give you a specific answer here because, well, nothing has really been decided yet. The National Institute of Standards and Technology (NIST) has been engaged in a large-scale cryptographic competition of sorts for the past several years. The competition is an opportunity for mathematicians, researchers, cryptographers, educators and scientists to submit algorithms for consideration as future federal standards.
The standards body announced their selection of seven candidates and eight alternate algorithm candidates from the third round of submissions. However, no final decisions have been made regarding which algorithm(s) will be standardized:
To better understand quantum resistant encryption and why its needed, you first need to understand quantum computers and their anticipated impact on cyber security. The idea behind quantum computing is that these devices use quantum mechanics to approach problem solving the general goal of all modern computers in a whole new way and at exponentially faster speeds.
According to research from Mavroeidis, Vishi, Zych, and Jsang at the University of Oslo, Norway, there are two types of quantum computers:
At a basic level, the computers we use today (classical computers) communicate data using specific combinations of 1s and 0s (binary numbers called bits). All modern computers play by these same rules. For example, if I type the word Howdy! the computer uses this combination of bits to communicate the precise combination of keys I press: 01001000 01101111 01110111 01100100 01111001 00100001.
Quantum computers, on the other hand, operate on a new playing field using a different set of rules. Instead of these traditional bits (1s or 0s), it relies on quantum bits, or qubits for short. In a nutshell, instead of looking at either 1s or 0s, quantum computers view data as existing in multiple states, meaning that it can be both 1s and 0s simultaneously (this is known as a superposition). It also uses two other quantum properties entanglement and interference to connect separate data elements and eliminate irrelevant guesses to solve problems more quickly.
Of course, not all qubits are the same. Microsoft recently announced that their Azure Quantum program has unlocked the first step to developing a new type of qubit called a topological qubit. The goal is to resolve the scaling-related issues that other quantum computers face and to eventually help lead to the creation of a quantum computer capable of employing one million or more qubits. (Check out the linked article for more information on Microsofts demonstration.)
Were not going to get into all of the technical aspects of the other quantum properties we mentioned here, either. If you want to learn more about superposition, entanglement and interference, check out this video that explains these concepts in a few different ways:
The takeaway we want you to have is that, on one hand, some quantum computers are poised to solve problems beyond what modern supercomputers can do but faster and more efficiently. They also have the potential for other unimaginable capabilities to do things we havent even thought of yet. On the other hand, some quantum computers are anticipated to be no better than classical computers for some types of tasks. But trying to predict the future in terms of the full impact of quantum computers in the future is easier said than done.
Our understanding of quantum computing is largely theoretical so far, quantum computers can only be used in laboratories due to the machines massive resource and cooling requirements. Quantum chips have to be kept super cold (at -273 degrees Celsius, or what amounts to nearly absolute zero) to operate, and they can only operate for very short bursts. But the concern that cybersecurity and industry leaders have is that as quantum computers eventually become more mainstream, theyll make existing public key encryption algorithms namely, RSA (Rivest Shamir Adleman) essentially useless.
This concern is due to a concept known as Shors Algorithm. The basic overview of the concern about this algorithm, which was first demonstrated in 1994 by the guy who created it (mathematician Peter Shor), is that a powerful enough quantum computer would be able to crack modern public key algorithms pretty much instantly. How would it do this? By having the ability to calculate the factors of enormous numbers i.e., the math that operates at the very heart of modern public key encryption at faster rates than any modern devices could manage.
When you try to crack asymmetric encryption (say, RSA) using a classical computer, youre essentially trying to guess the factors of those mega-sized integers. As you can imagine, this will take a really long time using a regular computer. But with quantum properties like superposition, entanglement and interference coming into play, it can reduce the time required to make those guesses (or eliminate the need to guess some of the numbers entirely) to basically nothing. For example, while it would take upwards of millions of years for traditional computers to figure out the prime factors of 2,000+ bit numbers, a quantum computer could complete the same task within minutes.
While this enhanced speed will be great for creating positive solutions to problems such as coming up with revolutionary new treatments or cures for medical conditions it also poses a problem if these devices fall into the wrong hands.
Now, were not telling you all of this to scare you. The truth is that the threats that quantum computing represents arent new concepts, nor do they represent threats to your business and customers right now. The concept of quantum computing and all of its benefits and dangers has been around for decades and isnt expected to come to fruition yet.
Heres an overview of the history of quantum computing and how the development of quantum resistant cryptography plays a key role in it:
Here are links relating to some of the points on the timeline above:
So, how long is all of this expected to take? The answer depends on who you ask and in what context:
As youve probably seen, change tends to be relatively slow in the cryptographic world. Lets think about it another way. When TLS 1.2 was developed, TLS versions 1.1 and 1.0 were outmoded, but theyre still in use on the web and havent gone away completely. (Were at 14 years and counting at this point since TLS 1.2 was initially released and we now have TLS 1.3, which came out in 2018!)
As we touched on earlier, NIST is working on finalizing the selection of the final algorithms that will become standardized. Once final PQC algorithms are selected, then the next move will be to publish PQC standards as Federal Information Processing Standards (FIPS) and move on to implementations and deployments. Once this occurs, the Cryptographic Algorithm Validation Program (CAPV) will provide certifications for approved implementations of these approved PQC algorithms.
We bring this all up now because were drawing closer to a future when quantum computers are anticipated to become mainstream. It wont happen today, tomorrow, or likely even five years from now. But when it does, organizations will need to be able to support and use the quantum resistant encryption algorithms necessary to help keep data secure in this super-powered computer processing world to come. And things are changing now to prepare for that inevitable future.
On Jan. 19, 2022, the White House released a memorandum specifying that agencies have 180 days to identify any instances of encryption not in compliance with NSA-approved Quantum-Resistant Algorithms or CNSA [] and must report the following to the National Manager:
What does all of this mean at the level of your organization or company? In reality, not much right now for everyday businesses. But lets be realistic here its virtually impossible to be compliant with rules that havent yet been implemented. Its kind of like playing a new sport say, soccer when you dont yet know the rules or how to play it. Sure, you can go through the motions and move the ball down the field. But if you dont know how youre supposed to do it or which goal to aim for specifically, no telling if youre doing it right or if youre moving in the right direction.
The National Institute of Standards and Technology (NIST) was anticipating the release of its PQC Round 3 Report by the end of March or early April 2022. (Theres also been talk about announcing a fourth round of study as well.) Now, in all fairness, weve just started the month of April a week ago. But considering that agencies are expected to be compliant with quantum-resistant algorithms by basically July 2022, and the algorithms themselves havent officially been decided upon well, that sure makes things a lot more difficult for organizations that have to be compliant.
However, once NIST decides which algorithm(s) will become the standard, then its up to businesses and organizations to ensure that theyre not using or relying upon any algorithms that may have been deprecated. The standards body is expected to have draft PQC standards available for public comment before the end of 2023 and aims to have a finalized standard ready the following year.
Youll find that many experts typically sit in one of two camps when it comes to the topic of quantum computing and quantum resistant cryptography. On one end of the spectrum, the first camp aptly named Panicville in the illustration above essentially operates under the assumption that the end of near! Cybersecurity as we know it is about to come crashing down around us at any moment! BEWARE!
The second camp, which weve named Chillville in the above graphic, tends to take very different approach. The perspective here is typically that quantum computing is still a long way off, that its too impractical for real-world applications, or that its something we likely wont have to deal with for years to come, so theres no point in worrying about it now.
Needless to say, neither of these approaches is particularly healthy or beneficial to the security of your organization and its data. Thankfully, though, other experts tend to fall somewhere in the middle lets call it Preparationville. The purveying mindset of experts who sit within this space between the two main camps is that:
Here at Hashed Out, we definitely fall more in the middle of the spectrum; were not panicking about the changes to come but are strongly encouraging customers to start preparing now to the best of their abilities. The NSA shares on its Post-Quantum Cybersecurity Resources site that while it doesnt know when or even if a system capable of cracking public key encryption will make its debut. However, it does make it clear that preparing for an eventual transition to post-quantum cryptographic standards is a must for data security in the future.
Better to be safe than sorry, right?
Great. So, youre being told to prepare, but its hard to prepare for something when you dont really know what tools youll have at your disposal to work with. Its like trying to prepare for a disaster as a homeowner you might not know when something bad will happen, but youre going to take steps to mitigate potential impacts as much as possible.
The same concept here applies with preparing for quantum cryptography. While you may not know which algorithms specifically will be standardized, or specifically when quantum resistant cryptography will need to be implemented, you know its likely going to happen and that you should take steps now to prepare for it.
We get it theres definitely a strong case of you dont know what you dont know going on here. However, you can take steps to stay ahead of the curve as much as possible by taking the time to research and plan your strategy now. Part of this planning should include:
We cant overstate the importance of this task as its something you should already be doing anyhow. Auditing your organizations cryptographic systems, IT infrastructure and applications is crucial for a multitude of reasons. Furthermore, it can aid you as well with the development of your PQC planning and deciding what gets upgraded and when.
If your organization is running on older servers and other related infrastructure, youre likely to need to upgrade before quantum cryptography makes its debut. Something to consider includes having servers with redundant distributed databases that use PQC digital signature algorithms that are connected via quantum key distributed (QKD) connections. (QKD is a concept thats been around since the 80s and involves using quantum mechanics to distribute keys between communicating parties in traditional symmetric algorithm-protected connections.) The idea here is that this may help to protect against quantum attacks and aid in recovery from successful attacks.
What about hardware security modules? Is your organization using one in-house? Is it relying on a third party system? Ensure that whatever HSM youre using has a roadmap to support quantum safe encryption.
We understand your hesitation and dread updating your existing infrastructure is a massive undertaking. It involves major investments in money, time, and personnel-related resources. But this is why its crucial to start planning for and begin implementing these upgrades now. If you roll out the upgrade to your systems over time, it means you wont have to blow all of your capital budget in a single year or two, or risk rushing implementation (which can lead to mistakes) because you decided to wait until crap hits the fan.
Essentially, youre carefully preparing for the impending storm ahead of time (as much as you can). This way, your organization will be less likely to get caught in the downpour others will get swept away in.
The NSA also offers the Commercial National Security Algorithm Suite (CNSA Suite), which is a set of algorithms that the Committee on National Security Systems Policy 15 (CNSSP-15) has identified for protecting classified information (listed in alphabetical order):
Broken cryptosystems are the ugly companion of all the advancements that quantum computing has to offer. This is why major certificate authorities like DigiCert and Sectigo are working now to help prepare for a PQC world on their ends by creating PQC certificate authorities (CAs) and certificates.
DigiCert, which plays a key role in multiple PQC projects, offers a PQC Toolkit to Secure Site Pro customers. This toolkit offers hybrid RSA/PQC certificates, which pair PQC algorithms with classical ones. The goal here is for these certificates to work on both legacy systems (to offer backwards compatibility) and quantum systems once quantum computers finally roll out.
DigiCert estimates that it would take a traditional computer a few quadrillion years to break modern 2048-bit encryption. But considering that we dont know exactly when quantum devices are going to come charging onto the scene, its a good idea to start preparing now for when it does happen. This is why the CA also has created a resource that breaks down the Post Quantum Cryptography Maturity Model. You can use this to figure out how well prepared your organization is (or isnt) for whats the come.
Sectigos Senior Vice President of Product Management Lindsay Kent spoke during one of the companys Identity-First Summit 2022 presentations on certificate lifecycle management. Kent said that the certificate authority expects to have quantum safe security in place by 2026. The plan includes providing customers with a Quantum Safe Toolkit as well that aims to help companies:
The goal here for both CAs is to help companies use these certificates to facilitate quantum safe application-based authentication (instead of network-based authentication) and secure communications via TLS sessions. Its also to ensure that organizations can have certificates in place that support both PQC algorithms and the traditional algorithms that we have in place now.
Wait, doesnt offering backwards compatibility mean that users on classical devices will still be connecting via protocols relying on insecure algorithms once quantum computers become mainstream? Yes. But if you want to continue providing services to customers using legacy systems, thats going to continue until they eventually make the change.
An important part of the planning we talked about earlier is taking the time to review and make changes to your organizations existing internal security procedures and related documentation. Some of the things youll want to consider is what quantum resistant secure access controls and authentication measures youll need to implement. As youve probably guessed, your existing controls wont cut it in a PQC world, so everything will need to be updated to be quantum resistant once NIST publishes its standards.
As we talked about earlier, the widespread use of quantum computing and, therefore, the deployment of quantum resistant cryptography is still on the horizon but is likely at least a good decade or so away. But thats why now is the time to prepare for PQC to help your business stay ahead of the curve. You dont want to be one of the organizations caught unprepared when quantum computers make their mainstream debut.
Read more from the original source:
A Look at Quantum Resistant Encryption & Why It's Critical to Future Cybersecurity - Hashed Out by The SSL Store
- D-Wave and Davidson Technologies Near Completion of Quantum Computer - insideHPC - April 27th, 2025 [April 27th, 2025]
- Why startups and tech giants are racing to build a practical quantum computer - CNBC Africa - April 27th, 2025 [April 27th, 2025]
- D-Wave and Davidson Technologies Near Installation Completion of Alabamas First On-Site Annealing Quantum Computer - Yahoo Finance - April 25th, 2025 [April 25th, 2025]
- IQM to install Polands first superconducting quantum computer - The Next Web - April 25th, 2025 [April 25th, 2025]
- IQM to Deploy Polands First Superconducting Quantum Computer - Business Wire - April 25th, 2025 [April 25th, 2025]
- Poland installs its first superconducting quantum computer - Tech.eu - April 25th, 2025 [April 25th, 2025]
- A quantum internet is much closer to reality thanks to the world's first operating system for quantum computers - Live Science - April 23rd, 2025 [April 23rd, 2025]
- Where Will Rigetti Computing Be in 10 Years? - Yahoo Finance - April 23rd, 2025 [April 23rd, 2025]
- D-Wave and Davidson Near Installation Completion of Alabamas First On-Site Annealing Quantum Computer - HPCwire - April 23rd, 2025 [April 23rd, 2025]
- Quantum Computer Breakthrough: Fujitsu and RIKEN Lead the Way - JAPAN Forward - April 23rd, 2025 [April 23rd, 2025]
- Fujitsu and RIKEN develop world-leading 256-qubit superconducting quantum computer - Capacity Media - April 23rd, 2025 [April 23rd, 2025]
- 3 Reasons to Buy This Artificial Intelligence (AI) Quantum Computing Stock on the Dip - Yahoo Finance - April 23rd, 2025 [April 23rd, 2025]
- New Mexico Wants to Be the Heart of Quantum Computing - WSJ - April 23rd, 2025 [April 23rd, 2025]
- IonQ and Toyota Tsusho Align to Distibute Quantum Computing Solutions Across Japanese Industries - The Quantum Insider - April 23rd, 2025 [April 23rd, 2025]
- Where Will Rigetti Computing Be in 10 Years? - The Motley Fool - April 23rd, 2025 [April 23rd, 2025]
- EeroQ Named The 2025 MSU Startup Of The Year - Yahoo Finance - April 23rd, 2025 [April 23rd, 2025]
- New QPU benchmark will show when quantum computers surpass existing computing capabilities, scientists say - Live Science - April 23rd, 2025 [April 23rd, 2025]
- "We've Reached the Future": Xanadu Unleashes the First Scalable Photonic Quantum Computer, Redefining Tech Boundaries in a $100 Billion Race... - April 23rd, 2025 [April 23rd, 2025]
- Fujitsu and Riken develop world-leading quantum computer - The Japan Times - April 23rd, 2025 [April 23rd, 2025]
- No Killer App Yet? Why Quantum Needs Theorists More Than Ever - The Quantum Insider - April 23rd, 2025 [April 23rd, 2025]
- Rigetti, Riverlane, and NQCC Awarded 3.5M ($4.7M USD) Innovate UK Grant to Advance Real-Time Quantum Error Correction - Quantum Computing Report - April 23rd, 2025 [April 23rd, 2025]
- The key to 'cat qubits' 160-times more reliable lies in 'squeezing' them, scientists discover - Live Science - April 23rd, 2025 [April 23rd, 2025]
- The mind-bending innovations that built quantum computing - C&EN - April 23rd, 2025 [April 23rd, 2025]
- Mysterious phenomenon first predicted 50 years ago finally observed, and could give quantum computing a major boost - Live Science - April 23rd, 2025 [April 23rd, 2025]
- Big Tech has officially entered its quantum era here's what it means for the industry - Business Insider - April 23rd, 2025 [April 23rd, 2025]
- This Is My Top Quantum Computing Stock for 2025, and It's Not IonQ or Rigetti Computing - The Motley Fool - April 23rd, 2025 [April 23rd, 2025]
- How Urgent Is The Quantum Computing Risk Facing Bitcoin? One Team Is Putting 1 BTC Up For Grabs To Find Out - Benzinga - April 23rd, 2025 [April 23rd, 2025]
- Classiq and Wolfram Join CERNs Open Quantum Institute to Advance Hybrid Quantum Optimization for Smart Grids - Quantum Computing Report - April 23rd, 2025 [April 23rd, 2025]
- New quantum breakthrough could transform computing and communication - The Brighter Side of News - April 23rd, 2025 [April 23rd, 2025]
- Benchmarking the performance of quantum computing software for quantum circuit creation, manipulation and compilation - Nature - April 23rd, 2025 [April 23rd, 2025]
- A new hybrid platform for quantum simulation of magnetism - Google Research - April 23rd, 2025 [April 23rd, 2025]
- Why CoreWeave, Quantum Computing, and Digital Turbine Plunged Today - The Motley Fool - April 23rd, 2025 [April 23rd, 2025]
- The race is on for supremacy in quantum computing - The Times - April 23rd, 2025 [April 23rd, 2025]
- Project 11 challenges everyone to crack the Bitcoin key using a quantum computer. The reward is 1 BTC - Crypto News - April 23rd, 2025 [April 23rd, 2025]
- 7 Reasons You Should Care About World Quantum Day - Maryland Today - April 16th, 2025 [April 16th, 2025]
- Want to Invest in Quantum Computing? 3 Stocks That Are Great Buys Right Now. - Nasdaq - April 16th, 2025 [April 16th, 2025]
- Quantum utility is at most 10 years away, industry experts believe - The Next Web - April 16th, 2025 [April 16th, 2025]
- We stepped inside IQMs quantum lab to witness a new frontier in computing - The Next Web - April 16th, 2025 [April 16th, 2025]
- Quantum Shift: Rewiring the Tech Landscape - infoq.com - April 16th, 2025 [April 16th, 2025]
- Roadmap for commercial adoption of quantum computing gains clarity - Computer Weekly - April 16th, 2025 [April 16th, 2025]
- Want to Invest in Quantum Computing? 3 Stocks That Are Great Buys Right Now. - The Motley Fool - April 16th, 2025 [April 16th, 2025]
- Quantum walks: What they are and how they can change the world - The Brighter Side of News - April 16th, 2025 [April 16th, 2025]
- A timeline of the most important events in quantum mechanics - New Scientist - April 16th, 2025 [April 16th, 2025]
- Crafting the Quantum Narrative: A How-To for Press Releases - Quantum Computing Report - April 16th, 2025 [April 16th, 2025]
- IonQ signs MOU with Japans G-QuAT to expand access to quantum computing and strengthen APAC collaboration - The Quantum Insider - April 16th, 2025 [April 16th, 2025]
- Preparing for quantum advantage while addressing its unique threat to cybersecurity - SDxCentral - April 16th, 2025 [April 16th, 2025]
- IONQ of the U.S., a leading company in quantum computing, will develop quantum network technology in.. - - April 16th, 2025 [April 16th, 2025]
- Impact of tariffs on tech prices, the promise of quantum computing, and new state historic places - WPR - April 16th, 2025 [April 16th, 2025]
- 1 No-Brainer Quantum Computing Stock Down 60% to Buy on the Dip in 2025 - 24/7 Wall St. - April 16th, 2025 [April 16th, 2025]
- Physicists put Schrdinger's cat in a microwave and the quantum experiment actually worked - Yahoo - April 12th, 2025 [April 12th, 2025]
- A week at Yale devoted to quantum, quantum, and more quantum - Yale News - April 12th, 2025 [April 12th, 2025]
- US military launches initiative to find the best quantum computer - New Scientist - April 12th, 2025 [April 12th, 2025]
- Proving quantum computers have the edge - Phys.org - April 12th, 2025 [April 12th, 2025]
- 3 Quantum Computing Stocks Poised for Explosive Growth - The Motley Fool - April 12th, 2025 [April 12th, 2025]
- DARPA begins scaling a quantum computer with 15 companies - Nextgov - April 12th, 2025 [April 12th, 2025]
- New DARPA Initiative Challenges the Creation of Operational Quantum Computers - AFCEA International - April 12th, 2025 [April 12th, 2025]
- Qolab Spearheads Hardware Development for DARPA's Quantum Benchmarking Initiative - Business Wire - April 12th, 2025 [April 12th, 2025]
- Want to Invest in Quantum Computing? 3 Stocks That Are Great Buys Right Now - The Globe and Mail - April 12th, 2025 [April 12th, 2025]
- A Useful Quantum Computer Within 10 Years? DARPA, 2 Australian Startups & More Are Working On It - TechRepublic - April 12th, 2025 [April 12th, 2025]
- Where Schrdingers cat came from and why its getting fatter - New Scientist - April 12th, 2025 [April 12th, 2025]
- Rigetti and IonQ Selected for U.S. Quantum Initiative. Moving From Hype to Prototype. - Barron's - April 12th, 2025 [April 12th, 2025]
- A Tangled Benchmark: Using the Jones Polynomial to Test Quantum Hardware at Scale - The Quantum Insider - April 12th, 2025 [April 12th, 2025]
- The dream of quantum computing is closer than ever | The Excerpt - USA Today - April 12th, 2025 [April 12th, 2025]
- Analysts Still Have a Near-Perfect Rating on This Strong Buy Quantum Computing Stock - The Globe and Mail - April 12th, 2025 [April 12th, 2025]
- Building Indias First Quantum Computer, a Foreign-Returned Physicist Battles the Bureaucracy - outlookbusiness.com - April 12th, 2025 [April 12th, 2025]
- Quantum computing drives innovation in AI and cloud tech - SiliconANGLE - April 12th, 2025 [April 12th, 2025]
- Delfts Quantware paves the way to the million-qubit quantum computer - Bits&Chips - April 8th, 2025 [April 8th, 2025]
- What's Going On With IonQ Stock Today? - Benzinga - April 1st, 2025 [April 1st, 2025]
- Quantum computer solves optimization problem at Ford's assembly line - Interesting Engineering - April 1st, 2025 [April 1st, 2025]
- Finnish Quantum Startup IQM in Talks to Raise Over 200 Million - Bloomberg.com - April 1st, 2025 [April 1st, 2025]
- Quantum Computing Approach Generates First Ever Truly Random Number - Discover Magazine - April 1st, 2025 [April 1st, 2025]
- National Quantum Computing Centre Launches Insights Paper Exploring Quantum Computings Transformative Potential in Healthcare and Pharmaceuticals -... - April 1st, 2025 [April 1st, 2025]
- JPMorganChase, Quantinuum, Argonne National Laboratory, Oak Ridge National Laboratory and University of Texas at Austin advance the application of... - April 1st, 2025 [April 1st, 2025]
- Certified randomness using a trapped-ion quantum processor - Nature - April 1st, 2025 [April 1st, 2025]
- What's Going On With Quantum Computing Stock Today? - Benzinga - April 1st, 2025 [April 1st, 2025]
- D-Wave Pushes Back At Critics, Shows Off Aggressive Quantum Roadmap - The Next Platform - April 1st, 2025 [April 1st, 2025]
- Quantum Computing Inc. Secures Quantum Photonic Vibrometer Order with Delft University of Technology - Yahoo Finance - April 1st, 2025 [April 1st, 2025]
- How quantum cybersecurity changes the way you protect data - TechTarget - April 1st, 2025 [April 1st, 2025]
- Pasqal Selected for 140-Qubit Quantum Computer to Be Hosted at CINECA - insideHPC - April 1st, 2025 [April 1st, 2025]
- D-Wave and Japan Tobacco use quantum to build a better AI model for drug discovery - SiliconANGLE - April 1st, 2025 [April 1st, 2025]