Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 17 submissions in the queue.
posted by on Wednesday March 15 2017, @01:06AM   Printer-friendly
from the able-to-solve-the-travelling-salesman-problem-in-just-6-years dept.

Google, NASA, and Universities Space Research Association (USRA) run a joint research lab called the Quantum Artificial Intelligence Laboratory (QuAIL). That partnership has used a 512-qubit D-Wave Two quantum annealer, upgraded to the 1,152-qubit D-Wave 2x, and is now upgrading again to the company's latest D-Wave 2000Q system (2048 qubits):

Google, NASA, and the USRA are now buying the latest generation D-Wave quantum computer, as well, to further explore its potential. The new D-Wave 2000Q is not just up to 1,000 times faster than the previous generation, but it also has better controls, allowing QuAIL to tweak it for its algorithms. QuAIL is now looking at developing machine learning algorithms that can take advantage of D-Wave's latest quantum annealing computer.

[...] D-Wave also announced that it will help the Virginia Polytechnic Institute and State University (Virginia Tech) establish a quantum computing research center for defense and intelligence purposes. D-Wave's role will be to aid the Virginia Tech staff in developing applications and software tools for its quantum annealing computers. [...] Because D-Wave is not a universal quantum computer, like what Google and IBM plan to build over the next few years, it is not expected to be useful in cracking encryption. Virginia Tech plans to also focus on developing machine learning algorithms for the D-Wave computers.

Previously: Trees Are the New Cats: D-Wave Used for Machine Vision


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 1, Interesting) by Anonymous Coward on Wednesday March 15 2017, @06:43AM (1 child)

    by Anonymous Coward on Wednesday March 15 2017, @06:43AM (#479294)

    Because all those symmetric algorithms are protected by either the asymmetric key exchanges you note, or by obscurity (each endpoint having preshared symmetric keys or plaintext passwords used as seeds for keys.)

    While the symmetric keys are not cryptographically compromised as a result of quantum computers, their exchange mechanisms are, and could in fact be used to obtain session keys for every conversation the NSA for instance has recorded in the past 15-20 years (Assuming of course that such technology is non-existent rather than of sufficient secrecy to not have been in any of the NSA/CIA leaks of the past 5-10 years.)

    For all we know these 'major leaks' we've been seeing are just a smokescreen covering up the real capabilities of the organizations, thanks to software/hardware backdoors and true quantum computing processors. By themselves or complementing each other, those two capabilities eliminate every security feature of modern hardware and render the majority of previous techniques moot for any targets utilizing updated hardware (for the built-in exploit angle) or any pre-Quantum key exchanges in the case of true Quantum Computers by themselves.

    Starting Score:    0  points
    Moderation   +1  
       Interesting=1, Total=1
    Extra 'Interesting' Modifier   0  

    Total Score:   1  
  • (Score: 2) by sgleysti on Wednesday March 15 2017, @10:43PM

    by sgleysti (56) Subscriber Badge on Wednesday March 15 2017, @10:43PM (#479598)
    That is a good point. Without good asymmetric crypto, you're kind of left hand-delivering strong symmetric keys / one time pads or doing nothing.
     
    Fortunately, there are smart people already looking into post-quantum asymmetric algorithms.