Many dismiss quantum computing as a foreign concept that won’t be available for practical use for quite some time. Unfortunately for them, they’re wrong.

IBM has made quantum computing as a cloud service available to the world for the first time. You can check ideas against a real, functional device, although the interface also lets users try ideas out on a simulator.

In many ways this is a game changer: A new method of computing is going to be easily accessible to many. Rather than using a device-constrained model of distribution, which makes the tool available only to those who can physically access it, the functionality of this machine will be available to anyone with access to the Internet; this democratizes the technology.

The Need for Speed

This is not a full-blown quantum computer, but rather the underlying basis of one. Alone, it can’t yet solve real-world problems.

The portal has five individual qubits — a structure capable of encompassing more information than the traditional 1s and 0s of computing — that can be gated together in a logical relationship, which gives an output. In many ways, it is like programming in assembly language rather than a high-level one. It directly interfaces with the hardware with a specificity that is of limited usefulness in general-purpose situations. But it will also be incredibly fast.

The number of qubits available is important because five qubits is the minimum number required to implement certain solutions. It is a workable number for testing solutions and not just fiddling around with some curiosity project. This arrangement contains enough power to solve the math and logic that supports a fully functional quantum computer.

Why Cryptographers Are Freaking Out About Quantum Computing

While the current quantum implementation is not very powerful, it does have some big implications that are justifiably scaring some people — especially cryptographers. Most current cryptography is based on factoring two large prime numbers and applying the results. This is exactly the kind of problem that a large quantum computer would excel at.

The National Institute of Science and Technology (NIST) responded to quantum computing. It issued its “Report on Post-Quantum Cryptography,” which said the time to change cryptography is now, before such machines become widely available to the public — and cybercriminals.

The NIST report recommended that organizations begin by focusing on “crypto agility,” which is the ability to rapidly switch out algorithms for newer, safer ones — in other words, for the algorithms that are or will be resistant to quantum computer decryption. Creating those safer algorithms is NIST’s long-term goal. But right now, it believes “symmetric algorithms and hash functions should be usable in a quantum era.”

What has been done with quantum computing is revolutionary, and it could not have happened without the existence of the Internet to forge the necessary connections. Add in the extra education efforts such as IBM’s new public tutorials and the fact that public users are allowed to participate in learning this new technology, and the end result is a quantum computing service that has the potential to drastically change the landscape of cybersecurity.

More from Cloud Security

How Do You Plan to Celebrate National Computer Security Day?

In October 2022, the world marked the 19th Cybersecurity Awareness Month. October might be over, but employers can still talk about awareness of digital threats. We all have another chance before then: National Computer Security Day. The History of National Computer Security Day The origins of National Computer Security Day trace back to 1988 and the Washington, D.C. chapter of the Association for Computing Machinery’s Special Interest Group on Security, Audit and Control. As noted by National Today, those in…

Why Are Cloud Misconfigurations Still a Major Issue?

Cloud misconfigurations are by far the biggest threat to cloud security, according to the National Security Agency (NSA). The 2022 IBM Security X-Force Cloud Threat Landscape Report found that cloud vulnerabilities have grown a whopping 28% since last year, with a 200% increase in cloud accounts offered on the dark web in the same timeframe. With vulnerabilities on the rise, the catastrophic impact of cloud breaches has made it clear that proper cloud security is of the utmost importance. And…

Charles Henderson’s Cybersecurity Awareness Month Content Roundup

In some parts of the world during October, we have Halloween, which conjures the specter of imagined monsters lurking in the dark. Simultaneously, October is Cybersecurity Awareness Month, which evokes the specter of threats lurking behind our screens. Bombarded with horror stories about data breaches, ransomware, and malware, everyone’s suddenly in the latest cybersecurity trends and data, and the intricacies of their organization’s incident response plan. What does all this fear and uncertainty stem from? It’s the unknowns. Who might…

How an Attacker Can Achieve Persistence in Google Cloud Platform (GCP) with Cloud Shell

IBM Security X-Force Red took a deeper look at the Google Cloud Platform (GCP) and found a potential method an attacker could use to persist in GCP via the Google Cloud Shell. Google Cloud Shell is a service that provides a web-based shell where GCP administrative activities can be performed. A web-based shell is a nice feature because it allows developers and administrators to manage GCP resources without having to install or keep any software locally on their system. From…