A quantum enigma machine is theoretical device that is able to use photons to encrypt messages using keys that are shorter than the message itself—and now it’s real.
  
  
  Magine a future in which hyper-efficient solar panels provide renewable sources of energy, improved water filters quickly remove toxins from drinking water, and the air is scrubbed clean of pollution and greenhouse gases. That could become a reality with the right molecules and materials.
Scientists from Harvard and Google have taken a major step toward making the search for those molecules easier, demonstrating for the first time that a quantum computer could be used to model the electron interactions in a complex molecule. The work is described in a new paper published in the journal Physical Review X by Professor Alán Aspuru-Guzik from the Department of Chemistry and Chemical Biology and several co-authors.
“There are a number of applications that a quantum computer would be useful for: cryptography, machine learning, and certain number-theory problems,” Aspuru-Guzik said. “But one that has always been mentioned, even from the first conceptions of a quantum computer, was to use it to simulate matter. In this case, we use it to simulate chemistry.”
  Electronic computer technology has moved from valves to transistors to progressively more complex integrated circuits and processor designs, with each change bringing higher levels of performance. Now the advent of quantum computers promises a huge step increase in processor performance to solve certain types of problems.
Quantum computers are much faster than the world’s fastest supercomputers for some applications. In 1994 Peter Shor, an applied mathematician at Bell Laboratories, gave the encryption world a shock when he demonstrated an algorithm showing that quantum computers could threaten conventional prime number based encryption methods.
If an adversary conducts successful espionage raids on encrypted information stored in present technology computer installations, possibly through a compromised or issue-motivated individual who transfers it to portable media, it could become vulnerable to decryption by that rival’s quantum computers.
  Excellent write up on a paper submitted to the International Association for Cryptologic Research, by a group of UK and Belgian researchers are offering up a dig-sig scheme to assist in the addressing of Digital signatures (one of the fundamental parts of cryptography) in a post-quantum world. Expect the heat to rise on QC security as China’s launch date nears for the new Quantum Satellite.
Boffins smokin’ idea to share parts of keys to cook quantum-proof crypto.
  
  All that I can say is “WOW!”
CHINA is on the brink of launching a groundbreaking new satellite capable of conducting quantum experiments in space, leading some to predict it will usher in the beginning of a new space race.
The world will be watching very closely after the Chinese-led satellite launches in August. If it proves successful in carrying out the quantum experiments, China is expected to follow it with many more in a bid to create a super secure network that uses an encryption technique based on the principles of quantum communication.
The reason world powers will be paying such close attention is that quantum-enabled spacecrafts are able to provide communication pathways that are completely unhackable. While the technology has been trialled on the ground over short distances, the capability to do so across the globe would be a huge game changer — it holds the promise of a world with completely secure digital communication.
This is a true question especially since China launches their new Quantum Satellite communications in the next few weeks. I do believe some will be protected; however, the broader majority will be a stretch.
The encryption of today will be broken by the computers of tomorrow, even retroactively.
  Luv it; more believers.
Quantum computers promise to enable faster, far more complex calculations than today’s silicon chip-based computers. But they also raise the possibility that future computers could retroactively break the security of any digital communications that exist today, which is why Google is experimenting with something called “post-quantum cryptography.”
While quantum computer development remains in its early stages, some such computers are already in operation. In theory, future generations of quantum computers could “decrypt any Internet communication that was recorded today, and many types of information need to remain confidential for decades,” software engineer Matt Braithwaite wrote yesterday in a post on Google’s security blog. “Thus even the possibility of a future quantum computer is something that we should be thinking about today.”
Preventing potential nightmares for cryptographers and security organizations will require post-quantum cryptography, Braithwaite said. But Google is far from the only organization researching the possibilities.
Transhuman Terminology.
ADHOCRACY
 AEONOMICS
 A-LIFE
 AGORIC SYSTEM
AI-COMPLETE ALEPH ALGERNON AMORTALIST ARACHNIOGRAPHY ARCH-ANARCHY ARCOLOGY ARROW IMPOSSIBILITY THEOREM ARTILECT ASEX ASIMORT ASIMOV ASSEMBLER ATHANASIA ATHANOPHY ATHEOSIS AUGMENT AUTOEVOLUTIONIST AUTOMATED ENGINEERING AUTOMORPHISM AUTOPOTENT AUTOSCIENT BABY UNIVERSE BASEMENT UNIVERSE BEAN DIP CATASTROPHE BEANSTALK BEKENSTEIN BOUND BERSERKER BETELGEUSE-BRAIN BIG CRUNCH BINERATOR BIOCHAUVINISM BIOLOGICAL FUNDAMENTALISM BIONICS BIONOMICS BIOPHILIAC BIOSTASIS B-LIFE BLIGHT BLIND UPLOADING BLUE GOO BOGOSITY FILTER BORGANISM BREAKEVEN POINT BROADCATCHING BRUTE FORCE UPLOADING BUSH ROBOT CALCUTTA SYNDROME CALM TECHNOLOGY CALORIE RESTRICTION CASIMIR EFFECT CEREBROSTHESIS CHINESE ROOM CHRONONAUTS CHURCH-TURING THESIS COBOTS COMPUFORM COMPUTRONIUM CONCENTRATED INTELLIGENCE CONSILIENCE CONNECTIONISM CONTELLIGENCE CONTINUITY IDENTITY THEORY COSMYTHOLOGY CRYOBIOLOGY CRYOCRASTINATE CRYOGENICS CRYONICS CRYONIC SUSPENSION CRYPTO ANARCHY CRYPTOCOSMOLOGY CYBERCIDE CYBERFICTION CYBERGNOSTICISM CYBERIAN CYBERNATE/CYBERNIZE CYBERSPACE/CYBERMATRIX CYBRARIAN CYPHERPUNK DEANIMALIZE DEATH FORWARD DEATHISM DEEP ANARCHY DEFLESH DIGITAL PSEUDONYM DIAMONDOID DISASSEMBLER DISASTERBATION DISTRIBUTED INTELLIGENCE DIVERGENT TRACK HYPOTHESIS DIVERSITY IQ DIVIDUALS DOOMSDAY ARGUMENT DOWNLOAD DRYWARE DUBIFIER DYSON SPHERE ECOCALYPSE ECTOGENESIS
EMBRYOMEME
 EMULATION
 ENHANCED REALITY
 ENVIROCAPITALISM
 EPHEMERALISTS
 E-PRIME
 ESCALATORLOGY
 THE ETERNAL LIFE POSTULATE
 EUPSYCHIA
 EUTHENICS
 EVOLUTIONARILY STABLE STRATEGY (ESS)
 EVOLUTURE
 EXCONOMICS
 EXES
 EXFORMATION
 EXISTENTIAL TECHNOLOGY
 EXOPHOBIA
 EXOSELF
 EXTROPIAN
 EXTROPIATE
 EXTROPIC
 EXTROPOLIS
 EXTROPY
 FACULTATIVE ANAGOROBE
 FAR EDGE PARTY
 THE FERMI PARADOX
 FEMTOTECHNOLOGY
 FLATLANDER
 FLUIDENTITY
 FOGLET
 FORK
 FREDKIN’S PARADOX
 FUNCTIONAL SOUP
 FUTIQUE
 FUTURE SHOCK
 GALAXY BRAIN
 GAUSSIAN
 GENEGENEERING
 GENETIC ALGORITHM
 GENIE
 GREEN GOO
 GÖDEL’S THEOREM
 GOLDEN GOO
 GREAT FILTER, THE
 GREY GOO
 GUY FAWKES SCENARIO
 HALLUCINOMEMIC
 HIVE COMPUTING
 HOMORPH
 HPLD
 HYPERTEXT
 HYPONEIRIA
 HYPOTECH
IDEAL IDENTITY
 IMMORTALIST
 IMMORTECHNICS
 IMP
 INACTIVATE
 INFOGLUT
 INFOMORPH
 INFORMATION-THEORETICAL DEATH
 INLINE UNIVERSITIES
 INTERFACER
 INTERNALNET
 JUPITER-BRAIN
 KHAKI GOO
 KARDASCHEV TYPES
 KNOWBOTS
 KOLMOGOROV COMPELXITY
 LEONARDO DA VINCI SYNDROME
 LINDE SCENARIO
 LIQUIDENTITY
 LOFSTROM LOOP
 LONGEVIST
 MASPAR
 MATAGLAP
 MEGATECHNOLOGY (or MEGASCALE ENGINEERING)
 MEMETICS
 MEMIE
 MEMIUS
 MEMOTYPE
 MEMOID (or MEMEOID)
 MEHUM
 MERCHANCY
 MESOSCALE
 MINDKIND
 MOLMAC
 MORPHOLOGICAL FREEDOM
 MUTUAL REALITY
 NANARCHIST
 NANARCHY
 NANITE
 NANOCHONDRIA
 NANOFACTURE
 NANOMEDICINE
 NANOSOME
 NANOTECH
 (MOLECULAR) NANOTECHNOLOGY
 NEG
 NEOMORPH
 NEOLOGOMANIA
 NEOPHILE
 NEOPHILIA
 NEOPHOBE
 NEUROCOMPUTATION
 NEURONAUT
 NEURON STAR
 NEUROPROSTHESIS
 NEUROSUSPENSION
 NOOTROPIC
 NOW SHOCK
 NUTRACEUTICAL
 OFFLOADING
 OMEGA POINT
 OMEGON
 OMNESCIENCE
 O’NEILL COLONY
 O’NEILL CYLINDERS
 ONTOLOGICAL CONSERVATIVES
 OPTIMAL PERSONA
 PANCRITICAL RATIONALISM
 ORBITAL TOWER
 PARTIALATE
 PATTERN IDENTITY THEORY
 PERICOMPUTER
 PERIMELASMA
 PERSOGATE
 PERVERSION ATTACK
 PHARMING
 PHYLE
 PHYSICAL ESCHATOLOGY
 PICO TECHNOLOGY
 PIDGIN BRAIN
 PINK GOO
 PLEXURE
 POME
 POSTHUMAN
 POSTJUDICE
 POWERSHIFT
 PRISONERS’ DILEMMA
 PRIVACY MANAGEMENT
 PROLONGEVITY
 QUANTUM COMPUTING
 QUANTUM CRYPTOGRAPHY
 QUASISPECIES
 RAPTURE OF THE FUTURE
 RED GOO
 RED QUEEN PRINCIPLE
 RED QUEENED
 REMEMBRANCE AGENT
 REVERSIBLE
 RIF
 SANS CEILING HYPOTHESIS
 SANTA MACHINE
 SAPPER MEME
 SCHEME
 SENTIENCE QUOTIENT
 SHIH
 SINGULARITY
 SINGULARITARIAN
 SKY HOOK
 SMART-FACED
 SOCIOTYPE
 SOLID STATE CIVILIZATION
 SPIKE, THE
 SPOCK MEME
 SPONTANEOUS VOLUNTARISM
 SPACE FOUNTAIN
 STAR LIFTING
 STELLAR HUSBANDRY
 STEWARD
 STRONG AI POSTULATE
 STRONG CONVERGENCE HYPOTHESIS
 SUSPENDED ANIMATION
 SYNTHESPIAN
 TAZ/Temporary Autonomous Zone.
 TECHNOCYTE
 TECHNOSPHERE
 TECHNOCALYPS
 TELEOLOGICAL THREAD
 THEORETICAL APPLIED SCIENCE
 TITHONUS SYNDROME
 TIPLER CYLINDER
 TIPLERITE
 TRANSBIOMORPHOSIS (TRANSBIOLOGICAL METAMORPHOSIS)
 TRANSCEND
 TRANSCENSION
 TRANSCIENT
 TRANSCLUSION
 TRANSHUMANISM
 TRANSHUMANITIES
 TRAPDOOR FUNCTION
 TURING MACHINE
 TURING TEST
 ÜBERGOO
 UBIQUITOUS COMPUTING
 UPLIFT
 UPLOADER
 UNIVERSAL CONSTRUCTOR
 UNIVERSAL IMMORTALISM
 UNIVERSAL TURING MACHINE
 UTILITY FOG
 VACCIME
 VASTEN
 VENTURISM
 VIEWQUAKE
 VIRIAN
 VIRION
 VIRTUAL COMMUNITY
 VIRTUAL RIGHTS
 VITOLOGY
 VIVISYSTEM
 VON NEUMANN MACHINE
 VON NEUMANN PROBE
 WEBORIZE
 WETWARE
 WORMHOLE
 XENOBIOLOGY
 XENOEVOLUTURE
 XEROPHILIA
 XOXER
 ZERO KNOWLEDGE PROOF
This may not be the best possible neologism for this sort of entity, but I think it’s a good idea on principle to generate neologisms. They are good for us and solidify our thinking. Bruce Sterling, Speech at Lifelike Computer Characters ‘95.