Bringing useful quantum computing to the world requires also making the world quantum-safe. And it’s even more important that we reverberate that mission when it comes to our own infrastructure. That’s why we’re pursuing a comprehensive, long-term plan to integrate quantum-safe security protocols across all IBM hardware, software, and services. It all starts with ensuring that the IBM Quantum Platform, which provides cloud access to our fleet of utility-scale quantum systems, is fully quantum safe—using a host of tools that we’ve already made available for enterprises looking to begin their quantum safe journeys as well. This transformation will be conducted in stages, the first of which is already taking place now. Today, we are working to implement post-quantum encryption to enable quantum-safe Transport Layer Security (TLS). This legacy encryption works with the IBM Quantum Platform and extends through the firewall that protects the IBM Cloud, and soon it will be protected by quantum-safe encryption. Our goal is for researchers and developers that use our quantum services to trust that when they submit a quantum computational task to IBM Quantum Platform, it will be quantum safe from the client down into the cloud services layer. From there we can continue this initiative into Qiskit Runtime, and later across all IBM hardware and software. Head to the IBM Quantum blog for more details: https://ibm.co/4ctUu0E
IBM Quantum’s Post
More Relevant Posts
-
BBVA successfully completed a pilot test using Qiskit software on AWS to distribute quantum algorithm execution across multiple servers, scaling up to 38 qubits for advanced financial simulations. This breakthrough, one of the first in the financial sector, enhances cybersecurity and paves the way for noise-free, scalable quantum computing applications. #QuantumComputing #Cybersecurity #FinancialInnovation #BBVA #AWS #Qiskit
BBVA runs successful trial of distributed quantum simulation in the cloud
bbva.com
To view or add a comment, sign in
-
CEO at Zortrex - Leading Data Security Innovator | Championing Advanced Tokenisation Solutions at Zortrex Protecting Cloud Data with Cutting-Edge AI Technology
This threat will have severe consequences with all mathematical technology. Today resilience is non mathematical linked technology like Zortrex non mathematical randomised encryption tokenisation. The financial TokenVault tokenised api to transmit card payments with the full card being tokenised from start date - expiry date, pan no, cvv name on card any data on the card is secured in 1 process before transmission. The tokenised database again non mathematical linked and randomised speaks volumes. For any applications to grow in this cyber landscape security must be approached and implemented during development, Zortrex had this in mind at the beginning of development and included privacy by design. Today make that leap because although they say 4 to 5 years, I use to say not if but when. Today anything is possible.
EIC Engineering | Advanced Automation | Information Systems & Analytics | Ports & Terminals | Transportation | Infrastructure | Mining | Technology | Humanist
A national security expert predicts practical quantum computing tools are just three to five years away from integration into the workforce, NextGov is reporting. Neal Ziring, the Technical Director of the National Security Agency’s (NSA) Cybersecurity Directorate, made the forecast during a recent public sector cybersecurity event hosted by Palo Alto Networks in Palo Alto. As reported by NextGov, Ziring expects the devices to be accessible predominantly through cloud-based platforms. Ziring added that the impracticality and cost-prohibitive nature of would put on-premise installations for quantum computing systems out of reach for most organizations, including government agencies. “Even if a government agency would be willing to have one quantum computer on-prem … I don’t think they’re going to be willing to have multiple,” Ziring said, as reported by NextGov. The cloud approach would address the scalability and efficiency concerns, but Ziring also mentions that it could facilitate the development of hybrid computing models. Hybrid models blend the capabilities of quantum and classical computing, offering an optimized solution for complex problem-solving without unnecessary complexity. The transition to cloud-based quantum computing reflects a broader strategy to overcome the current limitations of theoretical quantum systems, according to Ziring. By harnessing the cloud, users could tap into quantum computing with their existing digital infrastructures quickly (relatively) paving the way for advancements in cybersecurity, logistics, and data processing across both the civilian and defense sectors. The implications of practical quantum computing are far-reaching, Ziring said. The NSA, along with the wider intelligence community, anticipates significant enhancements in their operational capabilities, from bolstering network defenses against sophisticated cyber threats to advancing logistical operations. The move towards quantum computing is also a proactive measure against potential vulnerabilities in public-key cryptography systems, which could be exploited with the advent of sufficiently advanced quantum computers. To support this transition, further research into quantum circuits is essential, as highlighted by Ziring. This research will focus on optimizing the pathways that quantum particles follow during computation, a crucial step towards the practical application of quantum computing. #quantum #computing #practical #application #workforce #cybersecurity https://lnkd.in/dRWP9cZj
NSA Expert: Quantum Computing to Enter Workforce in 3 to 5 Years
https://thequantuminsider.com
To view or add a comment, sign in
-
I highly recommend this read. It's insightful and offers valuable perspectives. #quantum #quantumsafe
Part of our mission is to help making IBM quantum safe. Please check out our blog post in which we explain how we are bringing quantum-safe security to our our own IBM Quantum platform: https://lnkd.in/exqewPgW
Bringing quantum-safe security to IBM Quantum Platform | IBM Quantum Computing Blog
ibm.com
To view or add a comment, sign in
-
The document "Quantum Computing and the DNS" (OCTO-031v2, April 2024) from the ICANN Office of the Chief Technology Officer discusses the impact of quantum computing on internet security, focusing particularly on the Domain Name System (DNS). The document highlights that quantum computers pose a potential threat to current cryptographic algorithms such as RSA and Diffie-Hellman schemes. While no quantum computers today can break these algorithms, the development of cryptographically relevant quantum computers (CRQCs) in the future might compromise them. It discusses the shift to post-quantum cryptography, which is designed to be secure against quantum computing threats. Various efforts and studies are underway to estimate when CRQCs might become a reality, guiding when the transition to PQC should occur. Building large-scale quantum computers is described as extremely challenging, with significant technological and engineering barriers that suggest CRQCs are unlikely to be developed soon, at least not within the next decade. The document advises that the DNSSEC community does not need to switch to PQC immediately because a CRQC capable of breaking current cryptographic standards is not anticipated soon. However, preparations for a future transition to PQC should be in place as technology progresses. For DNS protocols utilizing TLS or QUIC, it is recommended that they align with the broader web protocols' transition to PQC to maintain security and interoperability. ICANN has not formed a consensus on quantum computing's implications for DNS but supports efforts to keep the DNS secure and stable. The organization emphasizes following the web community's lead in transitioning to PQC for DNS parts that use encryption. This document is a strategic assessment and guideline aiming to prepare for future advancements in quantum computing and their potential impact on internet security, specifically within the context of DNS.
To view or add a comment, sign in
-
EIC Engineering | Advanced Automation | Information Systems & Analytics | Ports & Terminals | Transportation | Infrastructure | Mining | Technology | Humanist
A national security expert predicts practical quantum computing tools are just three to five years away from integration into the workforce, NextGov is reporting. Neal Ziring, the Technical Director of the National Security Agency’s (NSA) Cybersecurity Directorate, made the forecast during a recent public sector cybersecurity event hosted by Palo Alto Networks in Palo Alto. As reported by NextGov, Ziring expects the devices to be accessible predominantly through cloud-based platforms. Ziring added that the impracticality and cost-prohibitive nature of would put on-premise installations for quantum computing systems out of reach for most organizations, including government agencies. “Even if a government agency would be willing to have one quantum computer on-prem … I don’t think they’re going to be willing to have multiple,” Ziring said, as reported by NextGov. The cloud approach would address the scalability and efficiency concerns, but Ziring also mentions that it could facilitate the development of hybrid computing models. Hybrid models blend the capabilities of quantum and classical computing, offering an optimized solution for complex problem-solving without unnecessary complexity. The transition to cloud-based quantum computing reflects a broader strategy to overcome the current limitations of theoretical quantum systems, according to Ziring. By harnessing the cloud, users could tap into quantum computing with their existing digital infrastructures quickly (relatively) paving the way for advancements in cybersecurity, logistics, and data processing across both the civilian and defense sectors. The implications of practical quantum computing are far-reaching, Ziring said. The NSA, along with the wider intelligence community, anticipates significant enhancements in their operational capabilities, from bolstering network defenses against sophisticated cyber threats to advancing logistical operations. The move towards quantum computing is also a proactive measure against potential vulnerabilities in public-key cryptography systems, which could be exploited with the advent of sufficiently advanced quantum computers. To support this transition, further research into quantum circuits is essential, as highlighted by Ziring. This research will focus on optimizing the pathways that quantum particles follow during computation, a crucial step towards the practical application of quantum computing. #quantum #computing #practical #application #workforce #cybersecurity https://lnkd.in/dRWP9cZj
NSA Expert: Quantum Computing to Enter Workforce in 3 to 5 Years
https://thequantuminsider.com
To view or add a comment, sign in
-
the future is present
Navigating the Challenges of Post-Quantum Encryption and Crypto-Agility | Venafi
venafi.com
To view or add a comment, sign in
-
Over the last 10 years, while migrating Data from on-prem datacenters to the public cloud for UK Government or Enterprise Organisations, I have consistently engaged in conversations with security, which always ended up mentioning the Patriot Act. Given that the big three cloud providers all have their headquarters in the US, they are subject to a law called the 'Patriot Act.' This law can be applied to US-based organisations, compelling them to hand over any data they hold for their customers without judicial approval. While we can use TLS/IPsec and other encryption methods to secure data in transit and implement storage encryption for data at rest, remaining vulnerability arises when applications access unencrypted data in memory during runtime. In theory, any workload in the Cloud can be compromised through access to raw memory via the supervisor. All of it has changed in the last few years when “confidential computing” became widely available as part of AMD and Intel CPUs. “Confidential computing” is a technology helping to close the last part of securing the Data lifecycle - “data in use”. Continues ... #data #security #cloudmigration #confidentialcomputing
Confidential Computing: A Second Chance for Safeguarded Dataset Migration - MetaOps
metaops.solutions
To view or add a comment, sign in
-
According to a national security expert, practical #quantum computing tools could be integrated into the workforce within three to five years. These tools are expected to be primarily accessible through #cloudbased platforms due to the impracticality and high cost of on-premise installations. Cloud-based quantum computing would address scalability and efficiency concerns while also enabling the development of hybrid computing models, combining quantum and classical computing capabilities. This #transition to cloud-based quantum computing is seen as a strategy to overcome current limitations and pave the way for advancements in #cybersecurity, logistics, and data processing across various sectors. The implications of practical quantum computing are significant, with expected enhancements in network defenses, logistical operations, and proactive measures against potential vulnerabilities in #cryptographic systems. The U.S. government is actively investing in quantum research and innovation, positioning itself for a future where quantum computing plays a crucial role in technology and security. Collaboration between government, industry, and academia is highlighted as essential for maximizing the benefits of quantum computing.
NSA Expert: Quantum Computing to Enter Workforce in 3 to 5 Years
https://thequantuminsider.com
To view or add a comment, sign in
-
Transforming Business with Expertise in Data Engineering, Cloud Architecture, and DevOps |Ex: HSBC|Sky|GOV|Yahoo|Deloitte
Have you ever worked on a project where you couldn't migrate some of your data from the data center to the cloud due to security concerns? Almost in every cloud migration, we had to leave things behind—the 'crown jewels' of the organizations. Is this about to change? Not sure, but there is definitely an opportunity to restart the discussion. #confidentialcomputing #data #security #cloudmigrations
Over the last 10 years, while migrating Data from on-prem datacenters to the public cloud for UK Government or Enterprise Organisations, I have consistently engaged in conversations with security, which always ended up mentioning the Patriot Act. Given that the big three cloud providers all have their headquarters in the US, they are subject to a law called the 'Patriot Act.' This law can be applied to US-based organisations, compelling them to hand over any data they hold for their customers without judicial approval. While we can use TLS/IPsec and other encryption methods to secure data in transit and implement storage encryption for data at rest, remaining vulnerability arises when applications access unencrypted data in memory during runtime. In theory, any workload in the Cloud can be compromised through access to raw memory via the supervisor. All of it has changed in the last few years when “confidential computing” became widely available as part of AMD and Intel CPUs. “Confidential computing” is a technology helping to close the last part of securing the Data lifecycle - “data in use”. Continues ... #data #security #cloudmigration #confidentialcomputing
Confidential Computing: A Second Chance for Safeguarded Dataset Migration - MetaOps
metaops.solutions
To view or add a comment, sign in
-
Innovative Transformational Leader | Multi-Industry Experience | AI & SaaS Expert | Generative AI | DevOps, AIOps, SRE & Cloud Technologies | Experienced Writer | Essayist | Digital Content Creator | Author
Tech Companies Answering NIST's Quantum Encryption Standards with Innovative Solutions by Baystreet.ca - Stocks to Watch via Baystreet RSS Master Feed ([Global] Quantum Computing) URL: https://ift.tt/Ta5rjZi Issued on behalf of Scope AI Corp. VANCOUVER – USA News Group – How we protect our data is set to change. Cyber security experts are warning that enterprises must assess their computing vulnerabilities now, with the rise of quantum computing on the horizon, ending encryption as we know it. In response to this impending threat, the U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) released its principal set of encryption algorithms designed to withstand cyberattacks from a quantum computer. According to analysts at Markets and Markets the Quantum Computing Market is set to explode at a CAGR of 32.7% through to a US$5.3 billion market by 2029, while Grand View Research predicts the Quantum Cryptography Market to grow even faster with a 38.3% CAGR to hit US4.6 billion by 2030. Several tech developers have embarked on a transition journey into what’s known as post-quantum cryptography (PQC), including developments from Scope AI Corp. (CSE: SCPE) (OTCQB: SCPCF), Alphabet Inc. (NASDAQ: GOOG, GOOGL), Apple Inc. (NASDAQ: AAPL), NVIDIA Corporation (NASDAQ: NVDA), and Zoom Video Communications, Inc. (NASDAQ: ZM). Quantum computing is advancing quickly and may become a reality sooner than anticipated. At the recent Tech.eu Summit in London, experts explored the intersection of quantum computing with cybersecurity and AI, highlighting the profound implications of this emerging technology. According to PQShield CEO, Al El Kaafarani, 20% of the dominant players in each industry are expected to begin migrating to PQC this year. In response to the demand for quantum-capable cybersecurity, Scope AI Corp. (CSE: SCPE) (OTCQB: SCPCF) has upgraded its advanced flagship platform, GEM (General Enterprise Machine Learning). Most recently, Scope announced the successful global deployment of its latest core module that incorporates its Quantum Resilient Entropy (QSE Technology), the QSE Quantum Gateway. The pivotal rollout delivers a significant milestone in Scope’s mission to position businesses worldwide with cutting-edge quantum resilient entropy that drives security, scalability, and growth. Scope states that the QSE Quantum Gateway is designed to bridge the privacy and latency gap between institutional clients and their cloud infrastructure, no matter where their data centers are located. Already, QSE Quantum Gateway has been deployed across multiple countries in various industries, proving its versatility and robustness in diverse business environments and complex architectures. “This global deployment marks a new chapter in our journey to redefine the Entropy as a Service landscape,” said Sean Prescott, Founder and CTO of Scope AI Corp. “When we first envisioned t...
Tech Companies Answering NIST's Quantum Encryption Standards with Innovative Solutions by Baystreet.ca - Stocks to Watch via Baystreet RSS Master Feed ([Global] Quantum Computing) URL: https://ift.tt/Ta5rjZi Issued on behalf of Scope AI Corp. VANCOUVER – USA News Group – How we protect our data is set to change. Cyber security experts are warning that enterprises must assess their computi...
baystreet.ca
To view or add a comment, sign in
55,780 followers
Executive IT Consultant for Financial Services chez Travailleur indépendant - Self employed professional
1moTrès utile ! J'ai supporté les unités de cryptographie IBM 475x puis 476x depuis 1978 pendant près de 40 ans