The Shorts | 8/17/21 | Cybersecurity and Cryptography in Quantum Computing

Einstein 1921 Portrait

The rate at which quantum computing is hitting the media stream is ever-increasing. This piece is a collection of articles and reports covering various aspects of quantum computing from the lens of cybersecurity and cryptography. Mea Cubitt

The Kaseya Attack: How It Could Have Been Prevented | Unless you have been hiding under a rock, you’re probably aware of the Kaseya attack. A terrifying assault on an organisation with global reach, the attack was almost unprecedented and has (understandably) caused widespread panic amongst the cybersecurity community and beyond.  Source: InfoTech News.   The Kaseya Attack: How It Could Have Been Prevented…

First quantum-secured video conference between German Federal agencies: QuNET demonstrates quantum communication | Today, two German federal authorities communicated via video for the first time in a quantum-secure manner. The QuNET project, an initiative funded by the German Federal Ministry of Education and Research (BMBF) to develop highly secure communication systems, is thus demonstrating how data sovereignty can be guaranteed in the future. This technology will not only be important for governments and public authorities but also to protect everyday data.  Source: idw.   First quantum-secured video conference between German Federal agencies: QuNET demonstrates quantum communication…

Novel ASIC Implements Post-Quantum Cryptography | An application-specific integrated circuit (ASIC) that efficiently deploys post-quantum cryptography could protect against future hacker attacks using quantum computers. The device has been designed and commissioned for production by a team of researchers at Germany’s Technical University of Munich (TUM).  Source: COMMUNICATIONS OF THE ACM.   Novel ASIC Implements Post-Quantum Cryptography…

TUM team ASIC implements post-quantum cryptography | Such chips could provide protection against future hacker attacks using quantum computers. The researchers also incorporated hardware trojans in the chip in order to study methods for detecting this type of “malware from the chip factory”.  Source: Electronics Weekly.com.   TUM team ASIC implements post-quantum cryptography…

Quantum eMotion Appoints Cyber Security and Telecommunication Expert to The Board of Directors | As the Company moves forward to finalize the development of its first product and prepares its commercial deployment, QeM continues to strengthen the composition of its Board of Directors.  Source: yahoo!finance.   Quantum eMotion Appoints Cyber Security and Telecommunication Expert to The Board of Directors…

Quantum computing threatens digital assets | A University of Surrey report co-authored by Stephen Holmes, Chief Product Officer at Arqit Limited (“Arqit”), a global leader in quantum encryption technology, and Professor Liqun Chen, Professor in Secure Systems at the University of Surrey, released this week identifies the definitive threat posed to Digital Assets unless urgent changes are made to their cryptography.  Source: GADGET.   Quantum computing threatens digital assets…

It May Be Too Early to Prepare Your Data Center for Quantum Computing | Depending on who you ask, quantum computing is expected to become somewhat commonplace between five and 10 years from now.  Source: DataCenterKnowledge.   It May Be Too Early to Prepare Your Data Center for Quantum Computing…

Share this article ...

Our Mission

At The Qubit Report, our mission is to promote knowledge and opinion of quantum computing from the casual reader to the scientifically astute.  Because Quantum is Coming.

Einstein Stroll