Assessing the Benefits and Risks of Quantum Computers
- URL: http://arxiv.org/abs/2401.16317v2
- Date: Tue, 13 Feb 2024 18:47:44 GMT
- Title: Assessing the Benefits and Risks of Quantum Computers
- Authors: Travis L. Scholten, Carl J. Williams, Dustin Moody, Michele Mosca,
William Hurley ("whurley"), William J. Zeng, Matthias Troyer and Jay M.
Gambetta
- Abstract summary: We review what is currently known on the potential uses and risks of quantum computers.
We identify 2 large-scale trends -- new approximate methods and the commercial exploration of business-relevant quantum applications.
We conclude there is a credible expectation that quantum computers will be capable of performing computations which are economically-impactful.
- Score: 0.7224497621488283
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Quantum computing is an emerging technology with potentially far-reaching
implications for national prosperity and security. Understanding the timeframes
over which economic benefits and national security risks may manifest
themselves is vital for ensuring the prudent development of this technology. To
inform security experts and policy decision makers on this matter, we review
what is currently known on the potential uses and risks of quantum computers,
leveraging current research literature.
The maturity of currently-available quantum computers is not yet at a level
such that they can be used in production for large-scale, industrially-relevant
problems, and they are not believed to currently pose security risks. We
identify 2 large-scale trends -- new approximate methods (variational
algorithms, error mitigation, and circuit knitting) and the commercial
exploration of business-relevant quantum applications -- which, together, may
enable useful and practical quantum computing in the near future.
Crucially, these methods do not appear likely to change the required
resources for cryptanalysis on currently-used cryptosystems. From an analysis
we perform of the current and known algorithms for cryptanalysis, we find they
require circuits of a size exceeding those that can be run by current and
near-future quantum computers (and which will require error correction), though
we acknowledge improvements in quantum algorithms for these problems are taking
place in the literature. In addition, the risk to cybersecurity can be
well-managed by the migration to new, quantum-safe cryptographic protocols,
which we survey and discuss.
Given the above, we conclude there is a credible expectation that quantum
computers will be capable of performing computations which are
economically-impactful before they will be capable of performing ones which are
cryptographically-relevant.
Related papers
- Strategic Roadmap for Quantum- Resistant Security: A Framework for Preparing Industries for the Quantum Threat [0.0]
This paper outlines a strategic roadmap for industries to anticipate and mitigate the risks posed by quantum attacks.
By presenting a structured timeline and actionable recommendations, this roadmap with proposed framework prepares industries with the essential strategy to safeguard their potential security threats in the quantum computing era.
arXiv Detail & Related papers (2024-11-15T06:59:41Z) - A Security Assessment tool for Quantum Threat Analysis [34.94301200620856]
The rapid advancement of quantum computing poses a significant threat to many current security algorithms used for secure communication, digital authentication, and information encryption.
A sufficiently powerful quantum computer could potentially exploit vulnerabilities in these algorithms, rendering data in insecure transit.
This work developed a quantum assessment tool for organizations, providing tailored recommendations for transitioning their security protocols into a post-quantum world.
arXiv Detail & Related papers (2024-07-18T13:58:34Z) - Evaluation Framework for Quantum Security Risk Assessment: A Comprehensive Strategy for Quantum-Safe Transition [0.03749861135832072]
The rise of large-scale quantum computing poses a significant threat to traditional cryptographic security measures.
Quantum attacks undermine current asymmetric cryptographic algorithms, rendering them ineffective.
This study explores the challenges of migrating to quantum-safe cryptographic states.
arXiv Detail & Related papers (2024-04-12T04:18:58Z) - Towards Quantum-Native Communication Systems: New Developments, Trends,
and Challenges [63.67245855948243]
The survey examines technologies such as quantum-domain (QD) multi-input multi-output (MIMO), QD non-orthogonal multiple access (NOMA), quantum secure direct communication (QSDC)
The current status of quantum sensing, quantum radar, and quantum timing is briefly reviewed in support of future applications.
arXiv Detail & Related papers (2023-11-09T09:45:52Z) - Simulating Noisy Quantum Circuits for Cryptographic Algorithms [0.0]
Key algorithms used in cybersecurity are vulnerable to quantum computers.
Many different quantum algorithms have been developed, which have potentially broad applications.
Software co-design refers to the concurrent design of software and hardware.
arXiv Detail & Related papers (2023-06-03T13:37:45Z) - When Quantum Information Technologies Meet Blockchain in Web 3.0 [86.91054991998273]
We introduce a quantum blockchain-driven Web 3.0 framework that provides information-theoretic security for decentralized data transferring and payment transactions.
We discuss the potential applications and challenges of implementing quantum blockchain in Web 3.0.
arXiv Detail & Related papers (2022-11-29T05:38:42Z) - A perspective on the current state-of-the-art of quantum computing for
drug discovery applications [43.55994393060723]
Quantum computing promises to shift the computational capabilities in many areas of chemical research by bringing into reach currently impossible calculations.
We briefly summarize and compare the scaling properties of state-of-the-art quantum algorithms.
We provide novel estimates of the quantum computational cost of simulating progressively larger embedding regions of a pharmaceutically relevant covalent protein-drug complex.
arXiv Detail & Related papers (2022-06-01T15:05:04Z) - Quantum computers as an amplifier for existential risk [0.0]
We discuss the potential consequences on existential risk for humanity.
Even with the timeline for large-scale fault-tolerant quantum computing still unclear, it is highly likely that quantum computers will eventually realize an exponential speedup for certain practical applications.
arXiv Detail & Related papers (2022-04-10T00:19:29Z) - Dos and Don'ts of Machine Learning in Computer Security [74.1816306998445]
Despite great potential, machine learning in security is prone to subtle pitfalls that undermine its performance.
We identify common pitfalls in the design, implementation, and evaluation of learning-based security systems.
We propose actionable recommendations to support researchers in avoiding or mitigating the pitfalls where possible.
arXiv Detail & Related papers (2020-10-19T13:09:31Z) - An Application of Quantum Annealing Computing to Seismic Inversion [55.41644538483948]
We apply a quantum algorithm to a D-Wave quantum annealer to solve a small scale seismic inversions problem.
The accuracy achieved by the quantum computer is at least as good as that of the classical computer.
arXiv Detail & Related papers (2020-05-06T14:18:44Z) - Chapter: Vulnerability of Quantum Information Systems to Collective Manipulation [41.94295877935867]
We present and discuss a new form of vulnerability in such systems.
Groups of adversaries can maximally disrupt these systems' global quantum state.
It will be almost impossible to detect these attacks since they do not change the Hamiltonian.
A countermeasure could be to embed future quantum technologies within redundant classical networks.
arXiv Detail & Related papers (2019-01-25T13:51:05Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.