Google, Bitcoin and quantum attack
Digest more
Building a utility-scale quantum computer that can crack one of the most vital cryptosystems—elliptic curves—doesn’t require nearly the resources anticipated just a year or two ago, two independently written whitepapers have concluded.
Traditional encryption methods have long been vulnerable to quantum computers, but two new analyses suggest a capable enough machine may be built much sooner than previously thought
With around 26,000 qubits, the encryption could be broken in a day, the researchers report in a paper submitted March 30 to arXiv.org. Another prevalent form of encryption, RSA–2048, would require 100,000 qubits and 10 days to break, according to the researchers, from Caltech and quantum computing company Oratomic in Pasadena, Calif.
Silicon is ubiquitous in modern electronics, and now it is becoming increasingly useful in quantum computing. In particular, silicon's compatibility with existing chip technology and its long coherence times in silicon-based spin qubits make it a promising material for scalable quantum computing.
Elon Musk jests about quantum computing impact, as new research warns it could unlock lost Bitcoin, urging cryptographic upgrades.
The research shows quantum computers may break bitcoin and ether wallet encryption with far fewer qubits than previously thought, accelerating the push toward post-quantum security.
The StarPhoenix on MSN
'Monumental achievement': Groundbreaking computer positions U of S as key player in quantum research
A groundbreaking quantum computer that will be owned and operated by the University of Saskatchewan will position the school as “a unique hub” for quantum innovation across not just Canada but the world,
6don MSN
Quantum computer accurately simulates real magnetic materials, reproducing national laboratory data
Studying and designing novel materials is a central application of quantum mechanics. Chemists, materials scientists, and physicists focus on subtle interactions in quantum materials and to uncover them they rely on sophisticated computational and experimental techniques.