The U.S. National Institute of Standards and Technology (NIST) will release post-quantum cryptographic (PQC) algorithms in the upcoming weeks, according to White House cyber advisor Anne Neuberger. This development marks a significant step towards protecting…
Researchers have made a significant breakthrough in quantum computing by demonstrating a controllable interaction between a new type of qubits inside a standard silicon transistor. And this is potentially huge. Researchers worldwide are engaged in…
In a pioneering achievement, researchers from Imperial College London, in collaboration with the Universities of Southampton, Stuttgart, and Wurzburg, have established a crucial connection necessary for the quantum internet, allowing for the first time the…
A recent bill introduced by United States’ Republican lawmakers aims to accelerate the Defense Department’s development and integration of quantum technologies, enhancing capabilities in areas like navigation, sensing, and artificial intelligence. The Defense Quantum Acceleration…
In another sign of Q-Day concerns and preparations heating up recently, the European Commission has published a key recommendation urging EU member states to adopt a harmonized approach to post-quantum cryptography. This guidance, “Recommendation on…
In a recent announcement, Microsoft and Quantinuum highlighted a significant achievement in quantum computing, demonstrating the most reliable logical qubits on record. They achieved an error rate 800 times better than previous physical qubits. Microsoft’s…
While CRQCs capable of breaking current public key encryption algorithms have not yet materialized, technological advancements are pushing us towards what is ominously dubbed 'Q-Day'—the day a CRQC becomes operational. Many experts believe that Q-Day, or Y2Q as it's sometimes…
Read More »Fidelity in quantum computing measures the accuracy of quantum operations, including how effectively a quantum computer can perform calculations without errors. In quantum systems, noise and decoherence can degrade the coherence of quantum states, leading to errors and reduced computational…
Read More »"Harvest Now, Decrypt Later" (HNDL), also known as "Store Now, Decrypt Later" (SNDL), is a concerning risk where adversaries collect encrypted data with the intent to decrypt it once quantum computing becomes capable of breaking current encryption methods. This is…
Read More »The transition to post-quantum cryptography is a complex, multi-faceted process that requires careful planning, significant investment, and a proactive, adaptable approach. By addressing these challenges head-on and preparing for the dynamic cryptographic landscape of the future, organizations can achieve crypto-agility…
Read More »In my work with various clients, I frequently encounter a significant misunderstanding about the scope of preparations required to become quantum ready. Many assume that the transition to a post-quantum world will be straightforward, involving only minor patches to a…
Read More »As we edge closer to the Q-Day—the anticipated moment when quantum computers will be capable of breaking traditional cryptographic systems—the need for crypto-agility becomes increasingly critical. Crypto-agility is the capability of an organization to swiftly and efficiently transition between different…
Read More »Relying on asset owners, developers or IT personnel to identify and report in interviews or survey responses every instance of cryptographic usage is not just impractical; it simply does not work...
Read More »As quantum technologies garner global attention, its economic and national security implications are positioning these set of technologies alongside AI and 5G as pivotal emerging technologies for the future. Governments worldwide are recognizing the strategic importance of quantum technologies, which…
Read More »The journey towards quantum resistance is not merely about staying ahead of a theoretical threat but about evolving our cybersecurity practices in line with technological advancements. Starting preparations now ensures that organizations are not caught off guard when the landscape…
Read More »As the quantum era approaches, organizations face the daunting task of protecting their sensitive data from the looming threat of quantum computers. These powerful machines have the potential to render traditional cryptographic methods obsolete, making it imperative to explore innovative…
Read More »Since the early 2000s, the field of quantum computing has seen significant advancements, both in technological development and in commercialization efforts. The experimental demonstration of Shor's algorithm in 2001 proved to be one of the key catalyzing events, spurring increased…
Read More »Adiabatic Quantum Computing (AQC), and its variant Quantum Annealing, are another model for quantum computation. It's a specialized subset of quantum computing focused on solving optimization problems by finding the minimum (or maximum) of a given function over a set…
Read More »Since the early 2000s, the field of quantum computing has seen significant advancements, both in technological development and in commercialization efforts. The experimental demonstration of Shor's algorithm in 2001 proved to be one of the key catalyzing events, spurring increased…
Read More »Quantum Key Distribution (QKD) represents a radical advancement in secure communication, utilizing principles from quantum mechanics to distribute cryptographic keys with guaranteed security.Unlike classical encryption, whose security often relies on the computational difficulty of certain mathematical problems, QKD's security is…
Read More »The secret sauce of quantum computing, which even Einstein called "spooky," is the ability to generate and manipulate quantum bits of data or qubits. Certain computational tasks can be executed exponentially faster on a quantum processor using qubits, than on…
Read More »Quantum computing holds the potential to revolutionize fields where classical computers struggle, particularly in areas involving complex quantum systems, large-scale optimization, and cryptography. The power of quantum computing lies in its ability to leverage the principles of quantum mechanics—superposition and…
Read More »Cryptographic systems rely on the unpredictability and randomness of numbers to secure data. In cryptography, the strength of encryption keys depends on their unpredictability. Unpredictable and truly random numbers—those that remain secure even against extensive computational resources and are completely…
Read More »Quantum Artificial Intelligence (QAI) represents an emerging frontier where quantum computing meets artificial intelligence. This interdisciplinary field explores how quantum algorithms can enhance, accelerate, and expand the capabilities of conventional AI systems. Quantum computing's potential to process complex datasets exponentially…
Read More »The intricate giant chandelier of copper tubes, wires, and shielding often leaves people puzzled and curious. This image of a quantum computer is quite striking and unlike any classical computer we've seen before. This unique appearance is not just for…
Read More »In the early 1900s, when theoretical physicist Max Planck first introduced the idea of quantized energy levels, he probably didn’t foresee his work eventually leading to machines that could solve problems faster than a caffeine-fueled mathematician on a deadline. Legend…
Read More »For over three decades, I have committed my professional life to protecting individuals, critical infrastructure, businesses, and the environment from the physical harm caused by cyber-kinetic threats. My work involves a comprehensive integration of cybersecurity, cyber-physical systems security, operational resilience, and functional safety strategies to address these risks effectively. From that perspective I’ve been recently interested in quantum computing and its implications to cybersecurity. More about me.