Algorithms

Authenticated Key Exchange: Ripe for Quantum Hacking

NIST’s post-quantum cryptographic efforts only go so far; while producing secure post-quantum computing algorithms, some cryptographic applications are left hanging. One concern is “…for software that relies on a sealing API to operate securely, there is no immediate post-quantum secure alternative to migrate to.”

Read More »

Programming, Reprogramming Quantum Computers

University of Bristol researchers efforts push quantum computer programming forward. This work helps overcome the challenge of precision-entanglement beyond the current single-qubit systems. Using CMOS-compatible photonic components and metal-oxide semi-conductors, their device has proven two-qubit operations with 93% (+/- 4.5%) efficiency. “Photonics is a promising platform for implementing universal quantum information processing. Its main challenges include precise control of massive circuits of linear optical components and effective implementation of entangling operations on photons.” 

Read More »

Finland Approves PQC-ready Device

Finland’s National Cyber Security Authority has approved a firewall and virtual private network appliance which claims compatibility for post-quantum cryptographic algorithms. The approval and considerations for cryptographic resilience in a quantum computer world lend strength to the growing international concern over quantum supremacy’s arrival. It’s just a matter of when…because quantum is coming. 

Read More »

Testing “Hello World”

“Hello World” is perhaps the most basic of messages sent via classical computers. But what is the maximum “hardness” of a task a classical system might tackle that is also the simplest a quantum system may solve?

Read More »