Coercive Associations Scramble to Get Ahead of Quantum Computing

The potential for quantum computing goes two ways, and they involve encryption and decryption.  On the decryption side, there is the potential for quantum computing to have the power to decrypt pretty much anything that isn’t done through quantum computing.

On the encryption side, there is the potential for quantum computing to create nearly unencryptable networks.  Either end of that spectrum is bad for any entity that seeks to control and manage the action of others (coercive enterprise, looking at you buddy).

With that in mind, there is no wonder that that government leaders, including elected officials, are calling on entities getting ahead of the coming quantum computing technology to assure that the outcome is not loss of control.  This article in mulls over these ‘challenges’ to these controlling agents.

The new-age Manhattan Project: How do we protect today’s secrets from tomorrow’s quantum computers?

Will Hurd believes the next global arms race is already underway.

This time around, the hardware is a bit more esoteric. The U.S., its allies and its foes are investing billions to develop a technology that could define the age: quantum computing.

The Texas Republican congressman compares the peril posed by the development of this futuristic technology with the anxieties of the atomic age. As quantum computing moves from theory to practice, he told FedScoop, it’s time for the U.S. to start taking it seriously.

“I talk about the threat of quantum more than I talk about the opportunities,” Hurd said. “One, it’s to make sure that people understand the importance of this. It’s sometimes hard to understand or recognize the need for significant financial investment in something when the payoff is several years away.”

There are two reasons why it’s difficult the communicate the urgency surrounding quantum computing, he said: explaining what it is and predicting when it’s coming. And while predictions for mainstream arrival range between 10 and 30 years, the consensus is that when usable quantum computers do arrive, the encryption methods utilized today to protect our most guarded secrets will be obsolete.

And for that reason, public and private stakeholders are not only focusing on the benefits of the impending quantum age, but also on defending against its darker side.

“My feeling is that now’s the time, while we still have some lead time before the technology is really here, where we need to start preparing the rules of the road, especially standards and practices, particularly for quantum cryptography,” said Arthur Herman, a senior fellow at the Hudson Institute.


About Paul Gordon 3006 Articles
Paul Gordon is the publisher and editor of iState.TV. He has published and edited newspapers, poetry magazines and online weekly magazines. He is the director of Social Cognito, an SEO/Web Marketing Company. You can reach Paul at