Scientists Tout Photonic Chip As Quantum Chip Breakthrough
Researchers say they have developed the first quantum computer device that can create, manipulate and measure particle interaction on a small chip.
They hope that their quantum computer chip will help physicists in their efforts to better understand and characterize quantum circuits.
According to Jeremy O'Brien, Director of the Centre for Quantum Photonics, the chip is just 70 mm by 3 mm in size and performs multiple experiments that "would each ordinarily be carried out on an optical bench the size of a large dining table." The device integrates a network of channels that route and manipulate light particles. There are eight configurable electrodes that enable the circuit to affect photon pairs and produce "any possible entangled state of two photons or any mixed state of one photon," the researchers claim.
"In order to build a quantum computer, we not only need to be able to control complex phenomena such as entanglement and mixture, but we need to be able to do this on a chip, so that we can scalably and practically duplicate many such miniature circuits—in much the same way as the modern computers we have today," said O'Brien. "Our device enables this and we believe it is a major step forward towards optical quantum computing."
The scientist have invested six years of development in their chip so far and now intend to scale its complexity.
Could it be that someone got the measurement conversions fudged up ?
If and when they do crack the quantum computing nut, it will be a great day for computer technology and a black day for privacy and security as it would render all currently known and utilized forms of cryptography obsolete.
Its first gen technology.
Not necessarily. (1) Most likely, important data (banking, national security, etc.) will have quantum computing way before people do. (2) Most likely, important data (banking, national security, etc.) will have quantum encryption way before people have quantum computing. From what I hear, it's already the case! (3) If the current encryption has a sufficient number of bits, then first available quantum computers might not be powerful enough to crack the encryption in a reasonable amount of time.
Public key cyphers (e.g. RSA, Diffie-Hellman, Elliptic Curve) are screwed if this makes it to functionality and scale. The security is based on the impossibility of factoring multiples of large primes, but with quantum computers the feat is the same order of complexity of using the key for a single encryption.
Symmetric cyphers (e.g. AES, BlowFish) don't allow for a publicly known key and are much more secure. Quantum computing only reduces the complexity by an equivalent of halving the key length. Simple brute forcing AES-128 is currently computationally infeasible. If we developed 1 watt, 3 GHz cpu cores, 2^128 cpu core cycles would still take more energy than required to boil off the oceans, plus any electricity used by the rest of the computer. AES was designed to support 256 bit keys so that a quantum computing attack would still have the same complexity as a traditional attack on AES-128. As long as the keys can be properly handled the data is still safe.
Unfortunately, secret keys for symmetric cyphers are often exchanged using some sort of public key encryption. A quantum attack would make this insecure. Pre-shared keys (e.g. copied by thumb drive to both computers) don't have to worry about public exchange, but because of their generally longer use, are more vulnerable to side-channel attacks, which are actually feasible. While this doesn't affect being able to securely store a secured bank file on your computer, it makes it difficult to do online banking or shopping or anything on an accessible network without a changing list of pre-shared keys.
Public key exchange doesn't really have a good solution at this point anyway. It's often a matter of "secure enough," so we can just add this to a list of impending security problems. In the end, it's still easier for a waiter to steal your credit card number than for someone over unencrypted Internet transmissions. Just think how often you let a stranger with a pocket camera run off with your credit card at a restaurant (e.g. the waiter with a cell phone).