Researchers at the Massachusetts Institute of Technology (MIT) and the University of Innsbruck in Austria have developed a way to solve a scalability problem that affects current implementations of quantum computers.

The Number 15 and Quantum Computing

The experts made a proof-of-concept machine that could factor the number 15 in five qubits instead of the 15 qubits normally used by quantum computing. A qubit is the basic computational unit of a quantum computer. The fewer the number of qubits it takes to solve a problem, the faster that quantum computer will be.

In a paper titled “Realization of a Scalable Shor Algorithm,” researchers described the new process they uncovered for quantum computing.

“Here we present the realization of a scalable Shor algorithm, as proposed by Kitaev,” they wrote. “We factor the number 15 by effectively employing and controlling seven qubits and four ‘cache qubits’ and by implementing generalized arithmetic operations, known as modular multipliers.”

The number 15 is important here because 15 qubits is the lowest number of qubits for which the algorithm can be used.

Building a New Computing Environment

But what the researchers are really saying goes beyond just this particular computer. They demonstrated how a different architecture of quantum computers could be constructed to enable the scaling of Schor’s algorithm.

That algorithm is important for calculating the prime factors of a large number. With this new architecture, it can be used to get much better efficiency than what’s possible with a traditional computer. “This algorithm has been realized scalably within an ion-trap quantum computer and returns the correct factors with a confidence level exceeding 99 percent,” the researchers explained.

Isaac Chuang, professor of physics and professor of electrical engineering and computer science at MIT and one of the paper’s authors, discussed what this meant to him when speaking to PCWorld.

“We show that Shor’s algorithm, the most complex quantum algorithm known to date, is realizable in a way where, yes, all you have to do is go in the lab, apply more technology, and you should be able to make a bigger quantum computer,” he told the source.

New Technology Threatens Encryption

RSA methods of encryption are heavily dependent on the long time and intense effort it would take for someone to do the mathematical defactorialization of two prime numbers. RSA assumes in its core design that it would be very, very time-consuming to do this because of the computational complexity involved in the defactorialization. Any method that increases that speed will lessen the security of this common encryption method.

While the machines that could speed up Shor are not ready right now, this work shows that they will get there someday. Enterprises must prepare for that moment.

Two months ago, the National Security Agency (NSA) advised all U.S. government agencies to not use RSA-style encryption. It recommended other techniques since “symmetric key algorithms are believed to be secure [from quantum computer-based attacks] provided a sufficiently large key size is used.”

There’s a good chance the NSA knew that this research was on the horizon before making those recommendations. Regardless, all users should take heed of the warnings and take extra steps to protect data.

More from Data Protection

Data Privacy: How the Growing Field of Regulations Impacts Businesses

The proposed rules over artificial intelligence (AI) in the European Union (EU) are a harbinger of things to come. Data privacy laws are becoming more complex and growing in number and relevance. So, businesses that seek to become — and stay — compliant must find a solution that can do more than just respond to current challenges. Take a look at upcoming trends when it comes to data privacy regulations and how to follow them. Today's AI Solutions On April…

Defensive Driving: The Need for EV Cybersecurity Roadmaps

As the U.S. looks to bolster electric vehicle (EV) adoption, a new challenge is on the horizon: cybersecurity. Given the interconnected nature of these vehicles and their reliance on local power grids, they’re not just an alternative option for getting from Point A to Point B. They also offer a new path for network compromise that could put drivers, companies and infrastructure at risk. To help address this issue, the Office of the National Cyber Director (ONCD) recently hosted a…

Why Quantum Computing Capabilities Are Creating Security Vulnerabilities Today

Quantum computing capabilities are already impacting your organization. While data encryption and operational disruption have long troubled Chief Information Security Officers (CISOs), the threat posed by emerging quantum computing capabilities is far more profound and immediate. Indeed, quantum computing poses an existential risk to the classical encryption protocols that enable virtually all digital transactions. Over the next several years, widespread data encryption mechanisms, such as public-key cryptography (PKC), could become vulnerable. Any classically encrypted communication could be wiretapped and is…

How the CCPA is Shaping Other State’s Data Privacy

Privacy laws are nothing new when it comes to modern-day business. However, since the global digitization of data and the sharing economy took off, companies have struggled to keep up with an ever-changing legal landscape while still fulfilling their obligations to protect user data. The challenge is that there is no one-size-fits-all solution regarding data privacy's legal requirements. Depending on the location and jurisdiction, data privacy laws can vary significantly in terms of scope and enforcement. But while the laws…