March 25, 2016 By Larry Loeb 2 min read

Researchers at the Massachusetts Institute of Technology (MIT) and the University of Innsbruck in Austria have developed a way to solve a scalability problem that affects current implementations of quantum computers.

The Number 15 and Quantum Computing

The experts made a proof-of-concept machine that could factor the number 15 in five qubits instead of the 15 qubits normally used by quantum computing. A qubit is the basic computational unit of a quantum computer. The fewer the number of qubits it takes to solve a problem, the faster that quantum computer will be.

In a paper titled “Realization of a Scalable Shor Algorithm,” researchers described the new process they uncovered for quantum computing.

“Here we present the realization of a scalable Shor algorithm, as proposed by Kitaev,” they wrote. “We factor the number 15 by effectively employing and controlling seven qubits and four ‘cache qubits’ and by implementing generalized arithmetic operations, known as modular multipliers.”

The number 15 is important here because 15 qubits is the lowest number of qubits for which the algorithm can be used.

Building a New Computing Environment

But what the researchers are really saying goes beyond just this particular computer. They demonstrated how a different architecture of quantum computers could be constructed to enable the scaling of Schor’s algorithm.

That algorithm is important for calculating the prime factors of a large number. With this new architecture, it can be used to get much better efficiency than what’s possible with a traditional computer. “This algorithm has been realized scalably within an ion-trap quantum computer and returns the correct factors with a confidence level exceeding 99 percent,” the researchers explained.

Isaac Chuang, professor of physics and professor of electrical engineering and computer science at MIT and one of the paper’s authors, discussed what this meant to him when speaking to PCWorld.

“We show that Shor’s algorithm, the most complex quantum algorithm known to date, is realizable in a way where, yes, all you have to do is go in the lab, apply more technology, and you should be able to make a bigger quantum computer,” he told the source.

New Technology Threatens Encryption

RSA methods of encryption are heavily dependent on the long time and intense effort it would take for someone to do the mathematical defactorialization of two prime numbers. RSA assumes in its core design that it would be very, very time-consuming to do this because of the computational complexity involved in the defactorialization. Any method that increases that speed will lessen the security of this common encryption method.

While the machines that could speed up Shor are not ready right now, this work shows that they will get there someday. Enterprises must prepare for that moment.

Two months ago, the National Security Agency (NSA) advised all U.S. government agencies to not use RSA-style encryption. It recommended other techniques since “symmetric key algorithms are believed to be secure [from quantum computer-based attacks] provided a sufficiently large key size is used.”

There’s a good chance the NSA knew that this research was on the horizon before making those recommendations. Regardless, all users should take heed of the warnings and take extra steps to protect data.

More from Data Protection

Access control is going mobile — Is this the way forward?

2 min read - Last year, the highest volume of cyberattacks (30%) started in the same way: a cyber criminal using valid credentials to gain access. Even more concerning, the X-Force Threat Intelligence Index 2024 found that this method of attack increased by 71% from 2022. Researchers also discovered a 266% increase in infostealers to obtain credentials to use in an attack. Family members of privileged users are also sometimes victims.“These shifts suggest that threat actors have revalued credentials as a reliable and preferred…

Ransomware on the rise: Healthcare industry attack trends 2024

4 min read - According to the IBM Cost of a Data Breach Report 2024, the global average cost of a data breach reached $4.88 million this year, a 10% increase over 2023.For the healthcare industry, the report offers both good and bad news. The good news is that average data breach costs fell by 10.6% this year. The bad news is that for the 14th year in a row, healthcare tops the list with the most expensive breach recoveries, coming in at $9.77…

Cost of a data breach: Cost savings with law enforcement involvement

3 min read - For those working in the information security and cybersecurity industries, the technical impacts of a data breach are generally understood. But for those outside of these technical functions, such as executives, operators and business support functions, “explaining” the real impact of a breach can be difficult. Therefore, explaining impacts in terms of quantifiable financial figures and other simple metrics creates a relatively level playing field for most stakeholders, including law enforcement.IBM’s 2024 Cost of a Data Breach (“CODB”) Report helps…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today