Page 3,237«..1020..3,2363,2373,2383,239..3,2503,260..»

From the bottom of the sea rose a piece of encrypted history. What were the Nazi Enigmas? – The Indian Express

Written by Vandana Kalra, Edited by Explained Desk | New Delhi | Updated: December 13, 2020 8:43:34 amDiver and underwater archaeologist Florian Huber touches a rare Enigma cipher machine used by the Nazi military during World War Two, in Gelting Bay near Flensburg, Germany. (Reuters)

Divers scouring the depths of the Baltic Sea, the arm of the North Atlantic Ocean between the Scandinavian peninsula and the countries of mainland northern and central Europe, have discovered an Enigma encryption machine that was used by Nazi Germany to encode secret messages during World War II.

The divers made the discovery while searching the seabed using a sonar device for abandoned fishing nets that can be harmful for sea life.

Rusty and covered with barnacle, the machine is now in the restoration workshop of the Museum of Archaeology in Gottorf Castle in Schleswig, Germany. What is this cipher machine, and what role did it play in the War? What is its value now?

Significance of Enigma

The Enigma machine was invented by the German engineer Arthur Scherbius towards the end of World War I. While several different Enigma models were produced, the German military models that had a plugboard are believed to have been the most complex.

During World War II, the military of Nazi Germany used the encryption machine to transmit messages in code. The machine allowed for billions of ways to encode a message, and the Allied militaries and intelligence services found it extremely challenging to break the code of intercepted messages.

How did the machines work?

The plugboard was similar to a telephone switchboard, with wires with two ends that could be plugged into a slot. Each letter from the plaintext would be substituted for another at regular intervals to create a ciphertext, which was decrypted by the receiver who was aware of the pairings.

Every time a letter was pressed, the movable parts of the machine would change position, so that the next time the same letter was pressed, it would be enciphered as something different.

Different parts of the machine could be set up in different ways to allow for different combinations and enciphered letters. With a plugboard, some of the army versions swapped letters twice over. Follow Express Explained on Telegram

Unless the exact settings of the machine were known, it was near impossible to decipher the messages.

How was the Enigma cipher ultimately cracked?

By 1932, Polish cryptanalysts were able to decode German ciphers that had been written with an earlier version of Enigma. The Poles shared the information with the French and British intelligence services before World War II. The Germans were subsequently able to produce more sophisticated machines, which made it difficult to crack the code.

The Poles also built electro-mechanical machines to search for solutions by simulating the workings of an Enigma machine. These calculated the numerous possibilities through different settings.

The findings of the Polish mathematicians helped the English mathematician Alan Turing to develop his bombe machine that made the use of cribs, using assumed or known parts of the message as a starting point, to break Enigma-encrypted machines.

What value does an Enigma machine have today?

Towards the end of World War II, as defeat seemed imminent, the Nazis began to destroy their Enigma machines to prevent them from falling into the hands of the victorious Allied powers. Once the war ended, then British Prime Minister Winston Churchill ordered that the surviving Enigmas should also be destroyed.

Not more than a couple of hundred Enigmas exist today. Their value is historical, and they are cherished by collectors.

In December 2019 auction house Sothebys sold an Enigma M4 for a record price of $800,000. Another was sold this year by Christies for $440,000.

The Indian Express is now on Telegram. Click here to join our channel (@indianexpress) and stay updated with the latest headlines

For all the latest Explained News, download Indian Express App.

The Indian Express (P) Ltd

Original post:
From the bottom of the sea rose a piece of encrypted history. What were the Nazi Enigmas? - The Indian Express

Read More..

Global Cloud Encryption Software Market To Witness Huge Gains Over 2020-2026 – The Courier

The globalCloud Encryption Software marketresearch report is based on the market and extends over all particulars of the market factors. The report further contains detailed specification about the Cloud Encryption Software market size in terms of sales, revenue and value. The report contains the detailed segmentation {Infrastructure-as-a-Service, Software-as-a-Service, Platform-as-a-Service}; {Banking, Financial Services, and Insurance (BFSI), Healthcare, Government and Public Utilities, Telecom and IT, Retail, Aerospace and Defense, Others (manufacturing, education, and media and entertainment)} of the Cloud Encryption Software market, gives us the information of the global market and makes the forecasting about the market status in the coming future.

Our Research Analyst implemented a Free PDF Sample Report copy as per your Research Requirement, also including impact analysisofCOVID-19 onCloud Encryption Software Market Size

Get Free Sample of this Cloud Encryption Software Report Here:https://www.marketresearchstore.com/report/global-cloud-encryption-software-market-report-2018-industry-302554#RequestSample

In order to analyze the data and to understand the competition of the Cloud Encryption Software market, the use of the Porters five forces model is made during the research. The report consists of detail segmentation of the market, factors contributing to the growth and restraining factors of the Cloud Encryption Software market.

Cloud Encryption Software Market COVID-19 Impact Analysis

The outbreak of COVID-19 was sudden and was not at all considered so dangerous when it first struck at Wuhan city of China. Although, everything in that city was closed but the coronavirus infection had wide spread in China as a wild fire. Within months it spread to the neighboring countries and then to every single country in the world. The World Health Organization announced it as a pandemic and till then it had created huge losses in several countries.

The listing supplies hints on the Upcoming pointers:

1.Business Diversification: Exhaustive Cloud Encryption Software information about new services, untapped geographies, latest advances, and also investments.

2.Strong Assessment: start to finish examination of stocks, plans, organizations, and amassing capacities of these best players.

3.Business Penetration: Comprehensive information on Cloud Encryption Software made accessible the very active players in the global sector.

4.Product Development/Innovation: Comprehensive information about technology, R&D pursuits, together with brand new product launches out of the global Cloud Encryption Software market.

5.Market Development: Comprehensive information regarding flourishing emerging markets which the report assesses the market to get Cloud Encryption Software worldwide record.

Read Detailed Index of full Research Study at:https://www.marketresearchstore.com/report/global-cloud-encryption-software-market-report-2018-industry-302554

The global Cloud Encryption Software market research report consists of the opportunities present in the market over the various end user segments. The report involves all the key players Vaultive, Google, Boxcryptor, Trend Micro, Porticor, Skycrypt, Vormetric, Perspecsys, Hitachi, Voltage Security, Safenet, HP, Symantec., Ciphercloud, Viivo, Sophos of the Cloud Encryption Software market and also all the prominent players involved in the global Cloud Encryption Software market. The global regional analysis of the Cloud Encryption Software market was conducted and is mentioned in the global Cloud Encryption Software market research report. The global Cloud Encryption Software market research report also elaborates the major dominating regions according to the segments as well as reports the emerging regions in the market. This helps in the proper understanding of the Cloud Encryption Software market, its trends, new development taking place in the market, behavior of the supply chain and the technological advancement of the market.

There are 15 Sections to show the global Cloud Encryption Software market

Sections 1, Definition, Specifications and Classification of Cloud Encryption Software , Applications of Cloud Encryption Software , Market Segment by Regions;Section 2, Gathering Cost Structure, Crude Material and Suppliers, Amassing Methodology, Industry Chain Structure;Sections 3, Technical Data and Manufacturing Plants Analysis of Cloud Encryption Software , Capacity and Commercial Production Date, Manufacturing Plants Distribution, R&D Status and Technology Source, Raw Materials Sources Analysis;Sections 4, Generally Market Examination, Limit Examination (Association Piece), Sales Examination (Association Bit), deals Esteem Examination (Association Segment);Sections 5 and 6, Regional Market Investigation that incorporates United States, China, Europe, Japan, Korea and Taiwan, Cloud Encryption Software segment Market Examination (by Sort);Sections 7 and 8, The Cloud Encryption Software Segment Market Analysis (by Application) Major Manufacturers Analysis of Cloud Encryption Software ;Sections 9, Market Trend Analysis, Regional Market Trend, Market Trend by Product Type Infrastructure-as-a-Service, Software-as-a-Service, Platform-as-a-Service Market Trend by Application Banking, Financial Services, and Insurance (BFSI), Healthcare, Government and Public Utilities, Telecom and IT, Retail, Aerospace and Defense, Others (manufacturing, education, and media and entertainment);Sections 10, Local Advancing Sort Examination, Overall Trade Type Examination, Stock system Examination;Sections 11, The Customers Examination of global Cloud Encryption Software;Sections 12, Cloud Encryption Software Research Findings and Conclusion, Appendix, system and information source;Sections 13, 14 and 15, Cloud Encryption Software deals channel, wholesalers, merchants, traders, Exploration Discoveries and End, appendix and data source.

For more information on this Cloud Encryption Software Report, Inquiry Here:https://www.marketresearchstore.com/report/global-cloud-encryption-software-market-report-2018-industry-302554#InquiryForBuying

The revenue generated through the sales from all the segments and sub-segments leads us to calculate the Cloud Encryption Software market size. To validate the data, top down approach and bottom up approach were carried during the research. All the necessary methodical tools are used to perform a deep study of the global Cloud Encryption Software market.

See the original post here:
Global Cloud Encryption Software Market To Witness Huge Gains Over 2020-2026 - The Courier

Read More..

Google Messages End-to-End Encryption Guide: How It Works on Android – Tech Times

With numerous reports of hacking and other forms of cyber attack, getting an end-to-end encryption (E2EE) feature would definitely boost the security of online engagements. Meanwhile, users have been sharing in Twitter, Reddit as well as in various media outlets screenshots of Google's new E2EE feature, which is apparently available already for Google Messages on Android for beta testing.

Back in November, the tech giant announced to add its new feature for RCS messages, but since it is already on beta testing, we can expect the feature to be officially added on the app soon.

(Photo : Google)Google Messages End-to-End Encryption

Having an E2EE feature added to any mode of communication gives an additional layer of security to conversations as well as all files and messages included in it.

While security is the main goal of this feature, it also adds integrity, confidentiality, and authentication to communication. It also aims to enhance the user experience and ensure that security of all other messages in case one has been compromised.

While encryption is no longer new in messaging apps like Facebook Messenger, WhatsApp, Apple Messages, Telegram, Signal, and other apps, having it in Google Messages is a significant upgrade.

Google Messages switched from SMS to RCS messages as standard text messaging protocol. Which one is better? Well, the RCS is much better than SMS in many ways, but when Google created "Chat," the technology was finally had a widespread adoption as the universal RCS protocol. However, unlike other RCS protocols, the Chat does not have E2EE, which was a major setback, particularly to those users and advocates of privacy. They were only left that RCS would get more secured as SMS replacement.

Read also: Apple and Cloudflare Team Up to Strengthen Online Privacy Measures with New DNS

Google Messages' E2EE is currently on beta testing, so those who want to check the new feature may try it out already on Android. All they need to do is enroll their account in the Google Messages beta program.

(Photo : Google Play)Google Messages End-to-End Encryption Now on Beta

To enroll, just click on the program link and click on the "Become a Tester" button. Testers will get an update to the Messages app if it is already installed on the Android device.

Otherwise, users may have it downloaded and installed fromGoogle Play. Although it may take a while to receive the update, it would be worth it since they may immediately try out the new encryption feature.

Once the update is done, testers may turn on the Chat feature in Messages. Just click on the three-dot button located in the upper-right of the screen and press "Settings." Then, choose "Chat features" on settings, and click on "Enable chat features."

(Photo : Google)Google Messages End-to-End Encryption Now on Beta

Once the feature is activated conversations will show a padlock icon just after the "delivered" tag to show that the most recently-sent message is encrypted. The same can be seen on the"Send"button.

In case testers want to back out of the program, they may do so at any time. They can switch to the app's public version whenever the update is available. However, they need to uninstall the testing version. They need to wait for a few hours before they can download the public version from Google Play and install it on the device.

Meanwhile, Google Message's E2EE feature will only show up when both parties within a conversation have the app's latest version and if their mobile networks supportRCS messaging. Otherwise, a link of the encryption will show up on the message.

(Photo : Google)Google Messages End-to-End Encryption Now on Beta

As of the moment, all other conversations and group chats are still unencrypted, although it is highly possible in the future.

Related article: Google Messages App Might Soon Offer More Secured RCS Texting Through End-to-End Encryption

This is owned by Tech Times

Written by CJ Robles

2018 TECHTIMES.com All rights reserved. Do not reproduce without permission.

More here:
Google Messages End-to-End Encryption Guide: How It Works on Android - Tech Times

Read More..

Facebooks encryption could prevent MI5 and police from stopping terror attacks and child abuse – Telegraph.co.uk

Facebooks end-to-end encryption could prevent MI5 and police stopping terror attacks, a top Government adviser has warned.

Jonathan Hall, QC, the independent reviewer of terrorism legislation, said he was extremely worried by Facebook and other social media firms plans to introduce encryption on messaging services that would prevent even the companies seeing communications.

He said it would not only deprive law enforcement agencies of vital leads on terror plots but also leave the social media companies with their hands tied behind their backs in the battle to counter extremists grooming potential recruits.

My view is one of extreme worry, said Mr Hall. I would like to see a sincere conversation where the costs and consequences are really spelled out.

There is an element of the [tech companies saying] we can do it and we are going to do it without fully spelling out in a clear way the costs and consequences.

Why do they need that additional layer [of encryption] now? What is wrong with the internet as it is now?What is the gain against the obvious consequences?

He identified two key consequences. First there is the ability of law enforcement to detect leads upstream. That involves communications online which give them advance indications of real world violence. Thats a really important consequence, said Mr Hall.

The second is how those who are responsible for this technology are themselves going to be able to to comply with any duty imposed on them.

For example, they could lose the ability to scan content to pick up hashed images of beheadings or hashed images of the Christchurch massacre.

If they are going to recognise their responsibilities, how are they going to meet those responsibilities if they tie their hands behind their back via encryption?

His comments follow warnings by ministers from the UK, US, Japan, Australia, Canada, New Zealand and India that Facebooks plans will prevent law enforcement agencies pursuing paedophiles who use the platform to groom and abuse children.

The seven nations which account for one in five of Facebooks 2.7 billion users are demanding that Facebook embed systems to enable the company and law enforcement agencies to continue to access illegal content and activity including child abuse as well as terrorism and serious crime.

Facebook accounts for 94 per cent of the 69 million suspect child abuse images or videos passed to investigators in the past year, a 50 per cent rise on the previous year, which law enforcement agencies warn will disappear if the tech firm goes ahead with encryption.

It is thought the Home Office is pressing for encryption to be part of the Governments planned duty of care laws to combat online harms including terrorism and child abuse.

View post:
Facebooks encryption could prevent MI5 and police from stopping terror attacks and child abuse - Telegraph.co.uk

Read More..

S’pore seizes $5.3m in illicit funds linked to Canadian network used by crime syndicates – The Straits Times

Close to US$4 million (S$5.3 million) in illicit funds linked to a group that provided encrypted telecommunication devices and network services used by transnational organised criminal syndicates has been seized in Singapore.

About US$3.97 million was seized from four bank accounts here by the Singapore Police Force's Commercial Affairs Department (CAD) and the US authorities, the United States Department of Justice (DOJ) said on Monday.

The funds belonged to Phantom Secure, an encrypted telecommunications network used by transnational organised criminal syndicates. The amount has been repatriated to the US, according to announcements from the Attorney's Office for the Southern District of California.

The seizure of the funds follows the indictment of Vincent Ramos, the chief executive of Canada-based Phantom Secure, and four of his associates, by a US federal grand jury in March 2018.

The five were accused of ope-rating a criminal enterprise that facilitated the transnational importation and distribution of narcotics through the sale and service of encrypted telecommu-nications devices and services to drug traffickers.

According to court documents, Phantom Secure had advertised that its "uncrackable" phones were impervious to decryption, wire-tapping or legal third-party records requests. It also provided a service to guarantee the destruction of evidence contained in the device if it were ever compromised by an informant, or if law enforcement acquired it.

In 2018, Ramos pleaded guilty to leading a criminal enterprise that facilitated the transnational importation and distribution of narcotics including cocaine, heroin and methamphetamine to the US through the sale of these encrypted devices.

Ramos was sentenced to 108 months in prison, and the Phantom Secure network has been shut down.

As part of his guilty plea, Ramos agreed to an US$80 million forfeiture money judgment. He also agreed to give up tens of millions of dollars in identified assets in bank accounts worldwide, as well as houses, a Lamborghini, cryptocurrency accounts and gold coins. The money repatriated from Singapore was among the assets identified by investigators to be forfeited.

The DOJ said Ramos' customers used his products to devastating and sometimes deadly effect. For instance, a 2014 Australian Broadcasting Corporation news article reported that investigations into a gangland murder in Sydney were stymied because the suspects used Phantom Secure devices to coordinate the killing.

Ramos had used this news to market his encryption services to criminals across the world, writing: "This is the best verification on what we have been saying all along - proven and effective for now over nine years. It is the highest level of authority confirming our effectiveness. It can't get better than that."

The DOJ said it had worked closely with Singapore's CAD since 2018 to identify and seize the funds linked to the sale of Phantom Secure devices. It commended the efforts of its Singapore counterparts in identifying, freezing and repatriating proceeds of Ramos' criminal enterprise.

Ms Suzanne Turner, special agent in charge at the US Federal Bureau of Investigation, said: "The repatriation of close to US$4 million by our Singapore-based partners ensures that Vincent Ramos and the leaders of Phantom Secure will pay for their crimes."

View post:
S'pore seizes $5.3m in illicit funds linked to Canadian network used by crime syndicates - The Straits Times

Read More..

As China Leads Quantum Computing Race, U.S. Spies Plan for a World with Fewer Secrets – Newsweek

Back in 1994, when quantum computers existed only as so much chalk on a blackboard, mathematician Peter Shor invented what may soon prove to be their killer app.

Shor trained his efforts on a calculation called "factoring," which ordinarily nobody but a mathematician would care about, except it just happens to be an Achilles heel of the internet. If someone were to invent a computer that could perform this operation quickly, messages that are currently hidden from hackers, terrorists, military adversaries, governments and competitors would be as easy to read as a Stephen King novel.

Shor, of course, didn't have such a computer. He was writing an algorithm, or program, for a hypothetical machine that might one day exploit the weird properties of atoms and subatomic particles, as described by the theory of quantum mechanics, to perform calculations that conventional computers could only solve in yearsmaybe hundreds of years, or millions, or more time than the universe is expected to last. Too long, at any rate, to be useful in cracking open an email. Shor's algorithm was a theoretical exercise. "The question of whether using quantum mechanics in a computer allows one to obtain more computational power," he wrote in his 1994 paper, "has not yet been satisfactorily answered."

The answers are now coming in.

Last year a team from Google achieved what it called "quantum supremacy" when its quantum computer performed a calculation faster than a conventional computer could. "Our machine performed the target computation in 200 seconds, and from measurements in our experiment we determined that it would take the world's fastest supercomputer 10,000 years to produce a similar output," wrote Google's John Martinis and Sergio Boixo in a blog post. And earlier this month, a team under the direction of Pan Jianwei at the University of Science and Technology in China (USTC), in the journal Science, said its quantum computer succeeded in performing a calculation 100 trillion times faster than a conventional computer couldsurpassing Google's achievement by a factor of 10 billion, according to the Xinhua.

Start your day with our top 5 articles

These two announcements were mere demonstrations, using prototype machines in the lab to perform calculations that are not useful in any practical sense. Nobody is ready to put Shor's algorithm into practice. But tens of billions of dollars are being invested in a broad-scale effort to make it possible. Dozens of engineering teams, from big companies like Google, IBM and Amazon to universities and startups, are racing to build a full-scale working quantum computer. China is reportedly spending $10 billion on the effort, building a center devoted to quantum computing and artificial intelligence; the U.S. government has committed $1 billion; and corporate and military budgets likely hold many millions morefor instance, Google and IBM are each thought to have spent in excess of $100 million.

These groups are in pursuit not merely of faster computers but a fundamentally different approach to computing, which would open up new vistas in technology and society. Quantum computers could be as transformational as the microchip, which ushered in the internet age and all the attendant effects on the economy and politics. For instance, the vast computational possibilities of quantum technology would turbo-charge artificial intelligence in ways that are difficult to fathom. It's no accident that China's new technology center will combine the two fields.

China's ambition in quantum technology has caused something of a Sputnik moment in the U.S., nearly as ominous as the Russian satellite in 1957 that kicked off the race to the moon. It wasn't long ago that Chinese engineers were perceived as copycats. That is no longer the case. The long-term worry is that the U.S. loses its technological edge. While China embraces ambitious technology programs, the U.S. has in recent years retreated into a reactive mode, with diminishing budgets for science. Back in the 1960s, the federal government accounted for about two-thirds of R&D spending in the U.S., the rest coming mainly from the private sector. But its role has diminished, says Paul Scharre, director of technology and national security at the Center for a New American Security (CNAS) and author of Army of None: Autonomous Weapons and the Future of War. "Basically the federal government has taken its foot off of the gas pedal in terms of innovation in the U.S.," he says. "While we're doing so, other nations like China caught up."

What tends to focus the mind are the security implications in the near term. When quantum computers go live, what will happen to all our secrets? Will we wake up one day and find that China has been reading our mail? The NSA and other intelligence agencies are already preparing for a world where all their secrets are vulnerable. Shor's algorithm, once a fanciful conjecture, is beginning to look like a threat. The question is, is the threat imminent?

The meaning of "Quantum Supremacy"

John Martinis got involved in quantum computers back in the 1980s, "before the word 'qubit' was even invented," he says.

A qubit is the fundamental unit of information in a quantum computerthe analogue to a "bit" in conventional computers, but with some important differences. A bit can be either a zero or a one; a qubit can be both numbers at once, and everything in betweena property known as superposition. A bit exists as a tiny pocket of electrical charge in a silicon chip, which classical computers shuffle around like checkers to perform mathematical operations; a qubit is a single atom or subatomic particle, which stores information in a peculiar statistical fashion according to laws of quantum mechanics that are wholly beyond our experience in the macroscopic world. A bit is a discrete unit of information; a qubit is part of a collective, "entangled" with other qubits by a phenomenon that Albert Einstein described as "spooky action at a distance."

In his early work at the University of California at Santa Barbara, Martinis began by asking basic questions about how to get information out of things as small as atoms and photons, or particles of light. But dealing with single atoms and particles pushes engineering to extreme levels of precision, as Martinis found early on. How do you protect these tiny particles but also allow them to interact with others in such a way that the computer can perform a useful calculation? In other words, how do you harness the qualities of superposition and entanglement to perform a task, such as factoring a large number for the purpose of reading an encrypted message? "You have to isolate qubits to keep them coherent," he says, "but if you isolate them super well, they can't talk to other qubits to do computation."

Martinis' spent years trying to strike this balance, experimenting with different materials and setups, then turned to the task of getting qubits to work together in a computer. Eventually he found his way to Google, where he began work on what became Sycamore, the quantum computer used in last year's demonstration. Sycamore's 54 qubits are kept in a chamber at Google's lab in Goleta, California cooled to within one degree of absolute zero, the lowest temperature possiblemore than 500 degrees F below zero. The machine is "programmed" by beaming faint microwaves into the chamber, which stimulate the qubits.

A big issue that Martinis and every other quantum engineer struggles with is how to keep the qubits intact long enough to perform a calculation. Superpositionthe ability of qubits to be both a zero and a one at the same timeis an essential part of the machine's operation. The slightest disturbance, however, can cause a qubit to collapse into a one or a zero, bringing down the whole delicate entangled constellation of qubits with it. Even cooled at extreme temperatures, the qubits have an annoying tendency to dissipate so quickly that many calculations result in errors. Making a quantum computer is difficult enough; making one that is not riddled with errors has so far proved beyond the reach of the engineers.

"You would like qubits to maintain their superposition of a zero and a one and maintain entangled states even while you're doing operations on them," says Scott Aaronson, a computer science professor at the University of Texas at Austin who collaborates with Google and other quantum engineers. "The problem is they're inherently very fragile. As soon as information leaks into the environment about whether a qubit is a zero or a one, the whole thing collapses. This 'noisiness' is the fundamental problem in building a quantum computer. This is what makes it hard."

Coming up with a way to test Google's and USTC's machines was a difficult problem in itself. To do so required overcoming a conundrum: If you ask your quantum computer to solve a problem that no conventional computer can accomplish in a reasonable amount of time, how do you check the results? The simplest way would be to use Shor's algorithm on an encrypted message; if you can read the message, you know your computer works. But Shor's algorithm was too difficult for the baby quantum computers of the day to handle.

Back in 2011, Aaronson and his graduate students came up with the idea of "boson sampling," which involves predicting how particles like photons will behave when they bounce around obstacles. It's a tough problem for classical computers because it involves lots of calculations about quantum mechanics; but since quantum computers live in that realm, the calculation should be a doddle. Aaronson not only came up with the experiment but also, crucially, with a way of checking the results statistically without having to solve the problems with a classical computerwhich, of course, by the definition of "quantum supremacy," should be impossible.

Both Google and USTC wound up adapting Aaronson's approach to their specific machines. Pan Jianwei and his colleagues at USTC, in fact, built Jiuzhang literally as a machine for boson samplingusing photons, a type of boson, as qubits. They sent photons, in the form of laser beams, pinging and ponging through a course of mirrors and other obstacles. The setup wasn't meant to be a general-purpose computer that could be programmed to perform different tasks but to do one thing only: demonstrate that a machine made of photons could perform a calculation of how photons behave when they move through an obstacle course.

The USTC experiment accomplished more than this tautological description captures, of course. It demonstrated that photons could be controlled and used to produce a computational result. Still, engineers have critiqued Jiuzhang on the grounds that it was built for such a narrow purpose. They've also tried to show that a classical computer could achieve the same result in a reasonable amount of time, a task known in vernacular as "spoofing." "The situation is evolving rapidly, from day to day, as people try to knock down the new result by showing how to spoof the outputs classically," said Aaronson in an email. "We don't know yet how well they're going to succeed. Debates about whether, and in what sense, the USTC group achieved quantum supremacy are likely to continue for quite some time."

Google's Sycamore test also made big headlines, and it also caught some flak in technical circles. IBM engineers, who are working on their own quantum computer, insisted that it's possible in theory to spoof Sycamore with a supercomputer, provided it were equipped with tremendous amounts of memory."They said, 'it only took us two seconds, but it would take a crippled supercomputer 10,000 years'," said Robert Sutor, a mathematician and vice president at IBM Research. "Why are you crippling it? Why would you remove part of its functionality and then say how wonderful you are?"

Many engineers look at the quantum supremacy demonstration more as milestones than a significant developments in their own right. Both Sycamore and Jiuzhang were impressive accomplishments; both are a long way from doing anything remotely useful, claims of "supremacy" to the contrary. "I don't think that quantum supremacy is completely a done deal," says Aaronson. "I would like to see quantum supremacy for some problem where we can actually easily recognize the answer."

To get a quantum computer capable of doing interesting things, engineers will need to figure out how to correct the errors and scale the machines up to thousands of qubits, and perhaps millions. The first practical applications are likely to be in simulating things that involve quantum mechanics, like chemistry, which could have an impact in drug development.

"Shor's algorithm, breaking cryptographic codes, is one of those things that will happen in the evolution of quantum computers," says Aaronson. "But by the time you can do that, you can pretty much do any quantum computation. It would surprise me a lot if it was in the next decade."

So why worry?

After the Sycamore demonstration in 2019, Martinis and Google had a parting of ways. "It was time for me to leave," he says. In the fall, Martinis joined Michelle Simmons, an old acquaintance who had formed Silicon Quantum Computing, a start-up in Sydney, Australia. Simmons' company is making qubits out of phosphorous and silicon, which tend to be more stable than other materials, she says, and that means they may not require so much error-correcting.

"Working at Google was great because we had the resources to solve tough problems," says Martinis. "On the other hand, what's great right now is there's an ecosystem where you have the companies, the startups and university groups where people can solve problems. I think that's better in the end."

Martinis, though, is under no illusion that a thousand quantum flowers will bloom. The field is crowded now, but that won't last forever. "All these people have a lot of optimism, but when they go to do the systems engineering, they're going to find that their ideas might not work so well." Out of the dozen or so projects underway now, he says, "it's a question whether one or two could work. Building a quantum computer is really hard, harder than you think."

The resources required to pull off a quantum computer would seem to favor the Googles and the IBMs of the worldand China. Google's Hartmut Neven, head of its quantum computing effort, told a gathering of the Center for Strategic and International Studies earlier this year that building an error correcting quantum computer would cost more than $3 billion.

Google is currently committed to seeing the project through and has the cash to do so, but a change in corporate priorities could put such a long-term effort at risk. "What would really secure American leadership," said Neven, "is if the government would use its enormous purchasing power to reward early risk takers."Regardless of whatever shortcomings Jiazhang may have, it clearly demonstrates that China is a formidable innovator. Neven issued a grim warning about the danger of the U.S. being beaten in the race to develop a quantum computer. "We are indeed most worried [about] an as of yet unknown competitor [from] China [who will] beat us to the race to an error-correcting machine, because China has the ability to steer enormous resources in a direction that's deemed strategically important."

While China's ambitions have grown, the technology aims of the U.S. seem diminished. "There is a mentality of complacency," says Elsa Kania, a china expert at CNAS. "There's a sense and an ideological commitment to the notion that the market can do it all, that there's no role for government, and a backlash against investments in science and education. Even if China was doing nothing in quantum science, we should be investing a lot in the basic research, trying to fund some of these new programs, and trying to build up the pipeline of talent."

How much the U.S. is spending on quantum computing research is difficult to say. Although the government's share of total R&D spending is lower than it used to be, "when you include U.S. private companies, we still outpace pretty much everyone in the world," says Todd Harrison, director of defense budget analysis at the Center for Strategic and International Studies.

Corporate research doesn't include much basic R&D, which is what typically yields the biggest long-term payoffs. The military, which in the past has sowed world-changing technologies like the internet, could wind up playing a crucial role in quantum computing. Funding for unclassified military R&D has in general remained steady, according to Harrison. The Pentagon is probably also funding classified quantum computer research. Documents from the Edward Snowden cache revealed that the National Security Agency was spending about $80 million on a "cryptographically useful quantum computer," the Washington Post reported, all of it classified.

Getting ready

Even though the quantum computers themselves seem far off, it's not too soon to start worrying about keeping secrets from prying eyes. The prospect of a code-breaking machine emerging sometime in the next decade is already setting off alarm bells in some quarters.

The National Security Agency and other intelligence organizations are thought to be scooping up reams of encrypted information in anticipation of a day in the not-too-distant future when they can decode them with a quantum computer. And they are also beginning to worry about the day when their adversaries can decipher their collected secrets, Wetoo. In the U.S., plans are afoot to introduce new encryption methods that cannot be broken even by a quantum computer. The NSA announced in 2015 that it intended to switch eventually to an alternative, quantum-resistant scheme, as yet undetermined. "It is now clear that the current Internet security measures and the cryptography behind them will not withstand the new computational capabilities that quantum computers will bring," an NSA spokesperson told Quanta's Natalie Wolchover.

A year later, the National Institutes of Standards and Technology announced a technical competition for standards of quantum-resistant encryption. This fall, NIST narrowed a field of 69 contenders to 15. The most popular scheme, it turns out, is "lattice-based encryption," which would require a computer to find a specific route through grids of billions of numbers an entirely different mathematical basis than that of current public-key encryption schemes, which rely on factoring large numbers.

Persuading government agencies and other organizations to migrate from the current public-key encryption schemes to new ones won't be easy. If the threat is not clear and present, complacency can set it. "People are still using web browsers with encryption that was broken in the nineties," says Aaronson. "It's sad."

Correction: 12/14/2020 5:16 pm ET: This article was modified to indicate that Silicon Quantum Computing's quantum computer does in fact require cryogenic equipment.

Read the rest here:
As China Leads Quantum Computing Race, U.S. Spies Plan for a World with Fewer Secrets - Newsweek

Read More..

Anyon Systems to Deliver a Quantum Computer to the Canadian Department of National Defense – GlobeNewswire

Anyon Systems's Quantum Computer

Anyon System's superconducting quantum processor.

MONTREAL, Dec. 15, 2020 (GLOBE NEWSWIRE) -- Anyon Systems Inc. (Anyon), a quantum computing company based in Montreal, Canada, announced today that it is to deliver Canadas first gate-based quantum computer for the Department of National Defenses Defence Research and Development Canada (DRDC). The quantum computer will feature Anyons Yukon generation superconducting quantum processor. Named after Canadas westernmost territory, the quantum computer will enable DRDC researchers to explore quantum computing to solve problems of interest to their mission.

Quantum computing is expected to be a disruptive technology and is of strategic importance to many industries and government agencies. Anyon is focused on delivering large-scale, fault-tolerant quantum computers to a wide group of early adopters including government agencies, high performance computing centers and universities in the near term, said Dr. Alireza Yazdi, founder and CEO of Anyon.

About Anyon Systems

Founded in 2014, Anyon Systems is the first Canadian company manufacturing gate-based quantum computing platform for universal quantum computation. Anyon Systems delivers turnkey gate-based quantum computers. The company is headquartered in Montreal, Quebec.

Media Contact:media@anyonsys.com

A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/7c776a6e-2ef8-4875-b33a-06c3ccf9f8df

Go here to read the rest:
Anyon Systems to Deliver a Quantum Computer to the Canadian Department of National Defense - GlobeNewswire

Read More..

Chinese quantum computer may be the most powerful ever seen – Siliconrepublic.com

This week in future tech, a Chinese quantum computer can reportedly solve a problem in 200 seconds, compared to the 2.5bn years a supercomputer needs.

A quantum computer developed at the University of Science and Technology in Hefei, China, has caught the worlds attention due to what appears to be a performance vastly exceeding others that exist today.

According to findings in published in Scienceand reported by Nature, researchers claim they demonstrated a quantum advantage, using laser beams to perform a computation that is not mathematically possible using traditional binary computers.

We have shown that we can use photons, the fundamental unit of light, to demonstrate quantum computational power well beyond the classical counterpart, said researcher Jian-Wei Pan.

Tasked with solving the so-called boson sampling problem, the researchers found solutions in as little as 200 seconds. By comparison, it could take Chinas TaihuLight supercomputer about 2.5bn years to do the same.

However, Christian Weedbrook, chief executive of quantum-computing start-up Xanadu, said that unlike Googles Sycamore quantum computer announced last year, the Chinese quantum computer is not programmable. This means that, so far, it cannot be used for solving practical problems.

Scientists from the University of Washington have unveiled a drone that smells, using the power of a moth. Writing in IOP Bioinspiration and Biomimetics, they revealed their Smellicopter design.

The autonomous drone uses a live antenna from a moth to navigate toward smells, while also having the ability to sense and avoid obstacles. A moth uses its antennae to sense chemicals in its environment and navigate toward sources of food or potential mates.

In this case, the researchers used antennae from the Manduca sexta hawkmoth for Smellicopter. The moths were placed in a fridge to anaesthetise them before removing their antennae. Once separated, the live moth antennae could stay chemically active for four hours.

By adding tiny wires into either end of the antenna, the researchers were able to connect it to an electrical circuit and measure the average signal from all of the cells in the antenna. They said Smellicopter could be used to detect things such as gas leaks, explosives and disaster survivors.

From a robotics perspective, this is genius, said Sawyer Fuller of the University of Washington. The classic approach in robotics is to add more sensors, and maybe build a fancy algorithm or use machine learning to estimate wind direction. It turns out, all you need is to add a fin.

German air taxi firm Volocopter said it plans to make regular services a reality in Singapore within the next three years. In October 2019, Volocopter completed the its first air taxi demonstration flight over the Marina Bay area of Singapore and the company is now looking to obtain the necessary regulatory approvals for regular service, including those from Civil Aviation Authority of Singapore and the European Union Aviation Safety.

The first route is expected to be a touristic route over the southern waters, offering views of the Marina Bay skyline, and future routes may include cross-border flights. The company is expected to hire over 200 full-time employees in Singapore to manage a network of routes by 2026.

The citys research institutes conducting R&D play an integral part in this, said Florian Reuter, CEO of Volocopter. Topics like route validation for autonomous operations, material science and research regarding battery technology are very important for our long-term business success.

The Global Mobile Suppliers Association (GSA) has reported that the number of announced 5G devices has surpassed 500 for the first time. By the end of November this year, there were 519 announced 5G devices, of which 303 were commercially available.

In the last three months, the number of announced 5G devices has grown by 29.4pc, while there has been a 59.5pc increase in the number of commercially available 5G devices over the same period.

This year weve seen more and more symbolically important milestones being passed over 500 announced 5G devices, more than 100 vendors, over 250 different phones, and 100 fixed wireless access CPE devices, said Joe Barrett, president of the GSA.

And it doesnt stop there; we expect more 5G devices to become commercially available, surpassing the 330 mark before the year is out. The device vendor community has stepped up and delivered in the face of unprecedented challenges. As an industry, we can be excited about the opportunities 2021 will bring.

Want stories like this and more direct to your inbox? Sign up for Tech Trends, Silicon Republics weekly digest of need-to-know tech news.

Read this article:
Chinese quantum computer may be the most powerful ever seen - Siliconrepublic.com

Read More..

Show Your Work: D-Wave Opens the Door to Performance Comparisons Between Quantum Computing Architectures – HPCwire

BURNABY, British Columbia, Dec. 9, 2020 D-Wave Systems Inc., a leader in quantum computing systems, software, and services, has launched a first-of-its-kind cross-system software tool providing interoperability between quantum annealing and gate model quantum computers. The open-source plugin allows developers to easily map quadratic optimization inputs in IBMs Qiskit format onto D-Waves quadratic unconstrained binary optimization (QUBO) format and solve the same input on any quantum system supported in Qiskit. The code is available for free as a stand-alone packagein GitHub and marks a major industry milestone: the ability to use, test, solve and compare real applications with both gate-model and annealing quantum computers. For the first time, developers and forward-thinking businesses can have a real assessment of the benefits of different systems on their applications.

Interoperability is a critical step in the maturation of transformative technologies. Until now, there hasnt been a convenient way to send the same problems to solvers on both gate and D-Wave systems, or to obtain head-to-head comparisons of results from the two different quantum computing systems. Before today,using a different quantum computing vendors hardware and software required significant investment to familiarize developers with code, solvers, and SDKs.

D-Waves industry-first open-source package removes those barriers.Qiskit users can nowsubmit Ising Hamiltoniansto the D-Wave quantum computer, in addition to any gate model system Qiskit supports.Now, cross-paradigm transparency and comparison will give quantum developers the flexibility to try different systems, while providing businesses with key insights into performance so they can identify, build, and scale quantum applications.

The company also called for users to publish their work.

In order for the quantum computing ecosystem to fully mature, the developer and business communities alike need access to diverse quantum systems and the ability to compare cross-architectural performance, said Alan Baratz, CEO, D-Wave. The next few years will bring a proliferation of quantum applications, and companies must be able to make informed decisions about their quantum computing investment and initiatives to stay competitive. Weve moved beyond measures that explore does the system work? Instead, enterprises want to benchmark which systems add the most value to their businesses. Were opening the door to this and we encourage users of the tool to share their work and publish their results.

The news is in line with D-Waves ongoing mission to provide practical quantum computing via access to the most powerful quantum hardware, software, and tools. In 2018, D-Wave brought theLeap quantum cloud service and open-source Ocean SDK to market. In February 2020, Leap expanded to include new hybrid solver services to solve real-world, business-sized problems. At the end of September, D-Wave made available the Advantage quantum system, with more than 5000 qubits, 15-way qubit connectivity, and expanded hybrid solver services that can run problems with up to one million variables. The combination of the computing power of Advantage and the scale to address real-world problems with the hybrid solver services in Leap enables businesses to run performant, real-time, hybrid quantum applications for the first time. And with the new cross-system software tool, now users can benchmark their applications across annealing and gate model systems, to further understand and benefit from performance comparisons.

To download and install the cross-paradigm integration plugin for free, clickhere.

As part of its commitment to enabling businesses to build in-production quantum applications, the company also introducedD-Wave Launch, a jump-start program for businesses who want to get started building hybrid quantum applications today but may need additional support.

About D-Wave Systems Inc.

D-Wave is a leader in the development and delivery of quantum computing systems, software and services and is the worlds first commercial supplier of quantum computers. Our mission is to unlock the power of quantum computing for the world. We do this by delivering customer value with practical quantum applications for problems as diverse as logistics, artificial intelligence, materials sciences, drug discovery, cybersecurity, fault detection, and financial modeling. D-Waves systems are being used by some of the worlds most advanced organizations, including NEC, Volkswagen, DENSO, Lockheed Martin, USC, and Los Alamos National Laboratory. With headquarters near Vancouver, Canada, D-Waves US operations are based in Palo Alto, CA and Bellevue, WA. D-Wave has a blue-chip investor base including PSP Investments, Goldman Sachs, BDC Capital, NEC Corp., and In-Q-Tel. For more information, visit: http://www.dwavesys.com.

Source: D-Wave Systems Inc.

Read more here:
Show Your Work: D-Wave Opens the Door to Performance Comparisons Between Quantum Computing Architectures - HPCwire

Read More..

Cloud-based IIoT Software, Platforms, and Edge Computing Infrastructure 2020 – 2025 – ResearchAndMarkets.com – Business Wire

DUBLIN--(BUSINESS WIRE)--The "Cloud Computing in Industrial IoT: Cloud-based IIoT Software, Platforms, and Edge Computing Infrastructure 2020 - 2025" report has been added to ResearchAndMarkets.com's offering.

This research evaluates the technologies and solutions involved in cloud computing for IIoT systems. It provides a comprehensive assessment of cloud infrastructure and deployment types including a detailed analysis of edge computing. This research analyzes emerging Mobile Edge Computing (MEC) systems and solutions, which is anticipated to be an integral part of IIoT systems as a whole, as well as the cornerstone for capturing streaming data and performing real-time data analytics. Integration of cloud-based infrastructure and service models with IIoT is evaluated. The research includes detailed forecasts for 2020 to 2025.

Enterprise and industrial focused businesses have many telecom and IT-related decisions to make about ICT infrastructure and services. Two of the most important areas are cloud computing and Internet of Things (IoT). Mobile Edge Computing (MEC) in particular is anticipated to become a major complement to enterprise computing infrastructure. While both computing and IIoT require considerable planning and often considerable investment, the payoff is quite substantial for companies that make the right decisions about integrating new technologies with existing systems and processes.

The initial return on investment continues to be largely cost reduction, but new and enhanced products and services, as well as improved customer intimacy are clearly the longer-term benefits. This latest research into the convergence of IoT and Cloud infrastructure has unveiled significant opportunities for enterprise to leverage emerging solutions involving edge computing. In fact, we see industrial IoT (IIoT) solutions involving streaming data and real-time analytics as a key value-added function for many industry verticals including healthcare, manufacturing, and transportation.

Manufacturing, industrial automation, and robotics are key sectors that will benefit substantially from MEC. For example, prior to edge computing implementation, teleoperation and telerobotics are largely relegated to fixed communications connections. MEC will enable teleoperation anywhere there is advanced LTE or 5G coverage, enabling many new consumer and industrial automation scenarios involving robotics.

Select Research Findings:

Companies Mentioned

For more information about this report visit https://www.researchandmarkets.com/r/2t01n1

About ResearchAndMarkets.com

ResearchAndMarkets.com is the world's leading source for international market research reports and market data. We provide you with the latest data on international and regional markets, key industries, the top companies, new products and the latest trends.

Original post:
Cloud-based IIoT Software, Platforms, and Edge Computing Infrastructure 2020 - 2025 - ResearchAndMarkets.com - Business Wire

Read More..