- iSDaily Thursday – February 15th, 2018 – Episode 030
Article Follows after show promotion [...]The post iSDaily Thursday – February 15th, 2018 – Episode 030 appeared first on iState. […]
The potential for quantum computing goes two ways, and they involve encryption and decryption. On the decryption side, there is the potential for quantum computing to have the power to decrypt pretty much anything that isn’t done through quantum computing.
On the encryption side, there is the potential for quantum computing to create nearly unencryptable networks. Either end of that spectrum is bad for any entity that seeks to control and manage the action of others (coercive enterprise, looking at you buddy).
With that in mind, there is no wonder that that government leaders, including elected officials, are calling on entities getting ahead of the coming quantum computing technology to assure that the outcome is not loss of control. This article in fedscoop.com mulls over these ‘challenges’ to these controlling agents.
|The new-age Manhattan Project: How do we protect today’s secrets from tomorrow’s quantum computers?|
Will Hurd believes the next global arms race is already underway.
This time around, the hardware is a bit more esoteric. The U.S., its allies and its foes are investing billions to develop a technology that could define the age: quantum computing.
The Texas Republican congressman compares the peril posed by the development of this futuristic technology with the anxieties of the atomic age. As quantum computing moves from theory to practice, he told FedScoop, it’s time for the U.S. to start taking it seriously.
“I talk about the threat of quantum more than I talk about the opportunities,” Hurd said. “One, it’s to make sure that people understand the importance of this. It’s sometimes hard to understand or recognize the need for significant financial investment in something when the payoff is several years away.”
There are two reasons why it’s difficult the communicate the urgency surrounding quantum computing, he said: explaining what it is and predicting when it’s coming. And while predictions for mainstream arrival range between 10 and 30 years, the consensus is that when usable quantum computers do arrive, the encryption methods utilized today to protect our most guarded secrets will be obsolete.
And for that reason, public and private stakeholders are not only focusing on the benefits of the impending quantum age, but also on defending against its darker side.
“My feeling is that now’s the time, while we still have some lead time before the technology is really here, where we need to start preparing the rules of the road, especially standards and practices, particularly for quantum cryptography,” said Arthur Herman, a senior fellow at the Hudson Institute.
|Read More at fedscoop.com|