In this workshop, speakers and technical experts from IBM were invited to Howest to talk about their work in quantum computing, and new developments in the quantum computing space, as well as the future of cryptography and encryption given the rise in quantum computing.
Important technical information
We were first explained key concepts in quantum computing, certain terms and definitions that were needed to understand how it all works. My explanation simply wouldn’t do it justice, if you’d like to learn more please check out this video:
The rest of this blog is meant for those who have basic knowledge and understanding of quantum computing.
Quantum advantage
Quantum advantage is the point at which quantum computers perform specific tasks faster or more efficiently than the best classical computers on the market. This concept is also called “quantum supremacy”.
To understand quantum advantage, it’s important to grasp some differences between classical and quantum computers:
Classical vs. Quantum computers
- Classical computers: Use bits as the smallest unit of information, either 0 or 1
- Quantum computers: Use quantum bits, or qubits, which can exist in a superposition of 0 and 1 simultaneously due to the principles of quantum mechanics
Key quantum concepts
- Superposition: A qubit can represent both 0 and 1 simultaneously, providing a richer computational state than classical bits
- Entanglement: Qubits can be entangled, meaning the state of one qubit is dependent on the state of another, no matter the distance between them. This can create complex correlations that classical computers cannot easily replicate.
- Quantum interference: Quantum algorithms leverage interference to amplify correct solutions and cancel out incorrect ones.
- Quantum gates: Similar to logic gates in classical computers, but they operate on qubits to create entanglement and quantum interference in the system. The dimensions in a quantum system grow exponentially with the number of qubits in the system:
- 1 qubit: 2 dimensions
- 2 qubits: 4 dimensions
- 3 qubits: 8 dimensions
- 4 qubits: 16 dimensions
- …
Quantum-safe cryptography
Another important to understand: quantum computers are designed for very specific problems that are extremely tough or impossible to solve with regular computers. With a quantum computer you would be able to do the following:
- Design practically any chemical and/or drug with any physically possible properties you like.
- Detect patterns in financial documents and transaction records to locate instances of fraud.
- Gain a deeper understanding of DNA, protein folding, and all biochemical processes.
- Design a room-temperature superconductor.
- Develop more accurate weather predictions, and possibly predict when and where natural disasters will occur with high accuracy.
- Solve most open-correlated electron problems.
If you play your cards right, and know how to operate such a machine and design working algorithms for it, you’d be the most powerful person in history.
However, a big topic in quantum computing’s capabilities is also one of its more dangerous: Quantum computers will be able to, in the near future, factorize any exceedingly large number into its primes. To crack RSA-2048 through sheer brute-force using a classical computer would take 1040 operations, roughly 19.8 quadrillion years even if you were given the full computing capabilities of Google’s data centers.
With a quantum computer however, that same task would take around 15 minutes using Shor’s algorithm. Therein lies the problem: Our entire worldwide cryptographic systems heavily rely on large numbers like these, and on the impractical amount of time it would take to factorize them and break the encryption. Quantum computers pose a significant threat to our modern security systems, and quantum-safe cryptography is all about preparing us for that future. IBM is part of this movement, they are frontrunning initiatives to develop cryptographic algorithms that cannot be easily broken by quantum computers.
This involves many tools and resources IBM has provided to the public to use and gain a better insight into the world of quantum computing. These include:
- Qiskit: An open-source quantum computing software development framework. The software lets programmers develop digital prototypes of quantum circuits, allowing them to test out new algorithms they develop.
- Quantum Learning: IBM’s Quantum Learning academy trains new quantum computing professionals, arming them with many skills needed to work with quantum computers and quantum algorithms.
- Quantum Composer: A tool that allows programmers to design, edit, and run quantum circuits on quantum hardware. Part of IBM’s Quantum Learning suite.
Post-quantum cryptography
The extension to quantum-safe cryptography, and a big point of contention among experts in the security industry as a whole, is the future of cryptography once quantum computers become a standard across the world. Many systems will have to be changed, updated, adapted, to fit into this new paradigm.
Conclusion
This workshop was quite interesting to attend, it addressed some of the misunderstandings I had about quantum computing, and explained some of the concepts I’d already known in finer detail. However, they did deliver the workshop in a way that would be confusing to those still new to the concept. I would have liked for them to spend a bit more time on the technical pieces of their talk in order to ensure everyone has a firm understanding of the other parts of their talk.
Quantum technologies are the future, and as they get better and better, people need to prepare for the new age that will come out of this tech.