this post was submitted on 03 Jul 2024
2 points (100.0% liked)

Quantencomputer

47 readers
2 users here now

Community für Austausch zum Thema Quantencomputer.

Wikipedia: "Ein Quantenprozessor bzw. Quantencomputer ist ein Prozessor, der die Gesetze der Quantenmechanik nutzt. Im Unterschied zum klassischen Computer arbeitet er nicht auf der Basis makroskopischer Zustände elektronischer Schaltkreise, sondern quantenmechanischer Zustände geeigneter Systeme. Damit ist es möglich, im Laufe der Rechnung Superpositionszustände und Quantenverschränkung zu erzeugen, die beide für die Informationsverarbeitung in Quantencomputern entscheidend sind."

Verwandte Communities:

IT Communities:

Netiquette wird vorausgesetzt. Gepflegt wird ein respektvoller Umgang - ohne Hass, Hetze, Diskriminierung.

Bitte beachtet die Regeln von Feddit.org.

Attribution

  • Das Banner zeigt "IBM Cryostat (CES 2020) - Interior of an IBM quantum computing system.". Image Credit: IBM unter der Lizenz CC BY-ND 2.0.
  • Das Icon zeigt "die generelle Definition von einem Qubit (Quantenbit) als den Quantenstatus von einem Zwei-Niveau-Quantensystem". Image Credit: Clemens Adolphs unter der Lizenz CC BY-SA 3.0 Deed. Transparenz entfernt und Ausschnitt angepasst.

founded 2 months ago
MODERATORS
 

Unfortunately the results are a bit disillusioning and the text on the slides is very tiny and hard to read. Nevertheless a very good talk about "Estimating the costs of algorithms for attacks and defense applications".


Talk by Alessandro Luongo from 28.12.2023.
Description taken from the 37C3-Page:

In in this talk we explore the potential ramifications of quantum computing in the field of cybersecurity We'll delve into two critical aspects: the application of quantum machine learning algorithms for defence and the impact of quantum attacks on cryptography and post-quantum cryptography for offence. We'll present insights on the theoretical advantages of quantum algorithms, improvements in factoring large numbers, and the impacts of post-quantum crypto attacks. While the hype around quantum technologies is growing, the estimates in the resources needed to run a quantum algorithm and the current number of qubits pose caution in the enthusiasm. The limitations in terms of available qubits, error rates, and scalability are critical factors that need to be considered when assessing the real-world applicability of quantum computing.

Introduction

We will start with a fundamental introduction to quantum computing to ensure that the audience has a solid grasp of this model of computation, but without discussing the technicalities of quantum physics. Taking a "software development" perspective, we introduce the problem of estimating the resources needed to perform a quantum computation. Then, we will shift our focus to the two facets of our investigation: applications for offence and defence.

Quantum machine learning for defence

We will explore the application of quantum machine learning algorithms in network intrusion detection. Quantum machine learning holds the potential for improving cybersecurity defences by leveraging quantum algorithms - exponentially faster than classical algorithm on their asymptotic complexity. We will introduce a framework for estimating the advantages of quantum algorithms in terms of query complexity, and report the findings of our experiments. Our findings will be based on practical experiments using benchmark datasets in cybersecurity, offering insights into the potential effectiveness of quantum approaches in this domain.

Quantum attacks on cryptography for offence

Shifting our attention to the offensive side, we will investigate the potential impact of quantum attacks on cryptography. We will report some advancements in the number of qubits required to break RSA2048 cryptography and attacks on ECC256. Furthermore, we will delve into the complexities of post-quantum cryptography attacks. Our ongoing research at CQT (Centre for Quantum Technologies of Singapore) involves measuring the depth and size of quantum circuits, including the number of Toffoli gates and Toffoli-depth. We will also account for the qubit number and size of the QRAM query (quantum random access memory), providing a comprehensive assessment of the quantum attack landscape.

Conclusion

Ultimately, we will draw conclusions based on our research and analysis. While there is limited evidence suggesting that quantum computing will have a drastic impact on cybersecurity through machine learning or attacks on post-quantum cryptography, there are substantial reasons to believe that quantum computers, once they reach sufficient scale and capacity, will pose a significant threat to RSA2048 and ECC256. Join us for an insightful exploration of the evolving intersection of quantum computing and cybersecurity.

Video: 1080p | 576p - Duration: 38 min

no comments (yet)
sorted by: hot top controversial new old
there doesn't seem to be anything here