Electronic Design
  • Resources
  • Directory
  • Webinars
  • CAD Models
  • Video
  • Blogs
  • More Publications
  • Advertise
    • Search
  • Top Stories
  • Tech Topics
  • Analog
  • Power
  • Embedded
  • Test
  • AI / ML
  • Automotive
  • Data Sheets
  • Topics
    - TechXchange Topics --- Markets --AutomotiveAutomation-- Technologies --AnalogPowerTest & MeasurementEmbedded
    Resources
    Electronic Design ResourcesTop Stories of the WeekNew ProductsKit Close-UpElectronic Design LibrarySearch Data SheetsCompany DirectoryBlogsContribute
    Members
    ContentBenefitsSubscribeDigital editions
    Advertise
    https://www.facebook.com/ElectronicDesign
    https://www.linkedin.com/groups/4210549/
    https://twitter.com/ElectronicDesgn
    https://www.youtube.com/channel/UCXKEiQ9dob20rIqTA7ONfJg
    1. Technologies
    2. Embedded
    3. Quantum Computing

    What’s So Special About Quantum Computing?

    Oct. 27, 2023
    Quantum computers are in the process of significantly expanding computing power, which creates opportunities for improving cybersecurity.
    Alix Paultre
    Related To: Electronic Design

    This video is part of the TechXchanges: Cybersecurity and Quantum Computing and Security.

    Quantum computing is a branch of applied science that harnesses quantum phenomena to process information in a completely different process than that used with binary computing systems. Quantum computers are in the process of significantly expanding computing power, which creates opportunities for improving cybersecurity. Properly deployed quantum-era cybersecurity can detect and deflect cyberattacks.

    However, quantum computing may also create new exposures, so businesses and other organizations should start preparing today. In this second part of a three-part series, we talk to Skip Sanzeri, Co-Founder, Board Chair, and COO of QuSecure, about how quantum computing is making cybersecurity more complex than ever in today's cloud-based data-oriented world. Companies like QuSecure provide post-quantum cybersecurity, security resilient against quantum-computing attacks.

    A quantum computer is different from compute platforms we're using for applications from servers to satellites that employ CMOS technology and math based on zeros and ones. Quantum computers are based on subatomic properties such as superposition and entanglement.

    Several years ago, organizations and companies began building computers based on these subatomic properties. Superposition means that instead of being in the state of zero and one, a quantum computer can be in any and all states at the same time, leveraging Wave-Particle Duality. Therefore, when something is in a wave function, it can be anything in anywhere.

    When you take subatomic particles and leave them in superposition, you're able to also use entanglement,. That means all of the particles are behaving together. So, when you run a transaction or a process, you get an exponential effect. 

    For example, if you had 50 servers in a server room and you added one or two more, you'd have 51, then you'd have 52 servers. But with subatomic particles, if you have 50 subatomic particles running a process, and add one or two more, you have two to the 51st, then you have two to the 52nd. It's exponential, which is why quantum computers have so much promise.

    Currently, quantum computers are roughly in the 100-qubit era, and that's two to the 100th power. A 300-qubit computer would have more capability of processing units than there are atoms in the entire universe. The security issue is that quantum computers are very good at hacking because our entire internet is based on a single transaction, which is solving for a fact, two numbers that factor into a larger one. The danger now is that quantum computers could break all of our encryption, forcing the largest upgrade cycle of computer history. 

    Part 1: Cybersecurity from the Developer's Seat

    Part 2: What's So Special Special About Quantum Computing? (video above)

    Part 3: Why Quantum Cybersecurity is Imperative

    Related links:

    • QuSecure
    • TechXchange: Cybersecurity
    • TechXchange: Quantum Computing and Security

    Continue Reading

    Securing Data in the Quantum Era

    VPX Boards Raise the Bar for Rugged Embedded Computing

    Sponsored Recommendations

    Designing automotive-grade camera-based mirror systems

    Dec. 2, 2023

    Design security cameras and other low-power smart cameras with AI vision processors

    Dec. 2, 2023

    Automotive 1 TOPS vision SoC with RGB-IR ISP for 1-2 cameras, driver monitoring, dashcams

    Dec. 2, 2023

    AM62A starter kit for edge AI, vision, analytics and general purpose processors

    Dec. 2, 2023

    Comments

    To join the conversation, and become an exclusive member of Electronic Design, create an account today!

    I already have an account

    New

    Bob Pease on Analog Vol. 3

    Environmental Sensors Target Air Quality

    Whitepaper: IoT Connectivity Considerations and Wi-Fi 6E

    Most Read

    Celebrating Field Engineers: The Unsung Heroes of Innovation

    More Bob Pease on Analog

    2023 Nobel Prizes for Physics and Chemistry Have Direct EE Relevance


    Sponsored

    How thermal efficiency is helping data centers run more sustainably

    How to build an low-power embedded-vision application with 1-2 cameras

    Design automotive occupancy detection systems with new Arm-based processors

    Electronic Design
    https://www.facebook.com/ElectronicDesign
    https://www.linkedin.com/groups/4210549/
    https://twitter.com/ElectronicDesgn
    https://www.youtube.com/channel/UCXKEiQ9dob20rIqTA7ONfJg
    • About Us
    • Contact Us
    • Advertise
    • Do Not Sell or Share
    • Privacy & Cookie Policy
    • Terms of Service
    © 2023 Endeavor Business Media, LLC. All rights reserved.
    Endeavor Business Media Logo