Toggle light / dark theme

Manchester Researchers a Step Closer to Developing Quantum Computing

QC micro devices are coming.


Researchers from The University of Manchester have taken a significant step closer to demonstrate that it is possible to create miniscule – but very powerful – computers that could work at atomic scale.

Scientists have been working on the developing the theory of quantum computing for decades – that is, highly efficient and powerful computing created at atomic scale. Such computing would perform some computational tasks far more efficiently than the computers we currently use.

Now The University of Manchester has revealed breakthrough evidence that large molecules made of nickel and chromium could store and process information in the same way bytes do for everyday digital computers.

Creating Ultrafast Qubits In Zinc Selenide Crystal

I told folks that we would find that crystalized formations is truly making a difference in the future of QC. There is so much more for us to learn how impactful the formations are in some many areas of communications and technology.

It does make one step back and ponder that perhaps we truly are connected in so many ways as John Wheeler has described many times.


Zinc selenide is a crystal in which atoms are precisely organized, and it is considered a well-known semiconductor material, conducive to introducing tellurium impurities, which can effectively trap positively-charged “holes.” Electron holes are not physical particles like negatively-charged electrons, but can be thought of as the absence of an electron in a particular place in an atom.

A zinc-selenide/tellurium impurity-host system is an ideal environment to protect a hole’s spin from which a quantum bit (qubit) can be formed, and for its coherence time can be sustained. Scientists aim to achieve for the longest coherence time in qubits to store, encode and process robust quantum information.

Quantum Computers and the End of Privacy #Infographic ~ Visualistan

Luv the map; however, missing a lot of info. Namely, many decades and contributors. QC officially recorded to start in 1960 with Stephen Wiesner discovery of a cryptographic tool. And, even modern day QC such as a QC Net has been in existence since late 90s with Los Alamos.

Still nice colored map for a limited view of 2014, 2015, and current. However, I don’t see the ORNL, Oxford, U. of Sydney, China, USC, MIT, etc. breakthroughs most importantly the scalable Quantum, syn. diamonds contribution to enable stable QC and QC Net.


From law enforcement to criminals, governments to insurgents, and activists to Facebook dabblers, many people have come to rely on encryption to protect their digital information and keep their communications secure. But the current forms of encryption could be obsolete the moment anyone succeeds in building a quantum computer. A what! Read on about the brave new world awaiting us.

Quantum Computers and the End of Privacy

Infographic by: www.whoishostingthis.com

Cooling Electrons Close to Absolute Zero Gives Us New Perspective on Quantum Mechanics

Talk about scalability!


In Brief:

  • Cooling down electrons close to absolute zero has given us new perspective on how the world behaves at the smallest of scales.
  • This could be the gateway to gaining greater understanding and perhaps even mastery of superconductivity.

Scientists have discovered that electrons cooled close to absolute zero slow down so much that they can be studied individually – allowing us to see the world in a whole new level of detail.

At those temperatures, electric current stops flowing. Instead, electrons trickle through a conductor like grains of sand in an hourglass, finally revealing their quantum state and allowing us to study them one at a time.

Lucid-Dreaming Quantum Physics

Maybe this is the secret ingredient to futurists.


By Paul Levy: The following is excerpted from from Paul Levy’s upcoming book, The Quantum Revelation: A Modern-Day Spiritual Treasure, and was originally published on Paul’s website Awaken the Dream

Awaken

The observer effect, the central pillar of quantum physics, reveals that the act of observation is not merely a passive reception of information, but rather, is a creative act that we are all—knowingly or unknowingly—participating in every moment of our lives. This process is tantamount to the same kind of dynamic creativity that we engage with in our night dreams. In a dream, the un-manifest potentialities (the wavefunction of dream possibilities) within the unconscious, depending upon the psyche of the dreamer, are actualized or “dreamed up” into specific appearances through and as the fabric of the dream.

Semantic Scholar search engine is expanded into neuroscience

Bio Intelligence-based search engine; coming soon. Building blocks if you think about it with the whole Synthetic DNA storage, connected cell circuitry to make buildings, machines, devices, etc. living. We needed quantum in the infrastructure to ensure things like bio-intelligence, autonomous machines, and connected super humans could eventually happen while reducing risks and threats. Now, we’re watching the ramp up of synthetic bio systems. Definitely exciting especially when we could see in our lifetime mobile devices no longer needed.


(Tech Xplore)—Allen Institute for Artificial Intelligence is in the news with its smart search engine, Semantic Scholar.

Namely, they are expanding their intelligence-based service into neuroscience research.

Nicola Jones said Friday in Nature that Semantic Scholar “is expanding its corpus of papers to cover some 10 million research articles in computer science and neuroscience.”

Bitcoin users relax: Quantum computing no match for SHA-2 encryption

Worried about security for your bitcoin in the face of quantum computing? According to computer researchers, there’s no reason to be.

Source: https://hacked.com/breathe-easy-bitcoiners-quantum-computing…encryption

Some people assume that once quantum computing comes along modern encryption technologies will be outpowered. But experts are starting to posit that hash functions and asymmetric encryption could defend not only against modern computers, but also against quantum attackers from the future.

Matthew Amy from Canada’s University of Waterloo proposes just this in a paper by the International Association of Cryptologic Research.

Amy, and researchers from Perimeter Institute for Theoretical Physics and the Canadian Institute for Advanced Research, examined attacks against SHA-2 and SHA-3 with Grover’s algorithm.

Grover’s algorithm is a quantum algorithm that finds with high probability the input to black box functions that produce particular, and predictable, output values.

Grover’s algorithm could brute-force a 128-bit symmetric cryptographic key in roughly 264iterations,” Wikipedia states, “or a 256-bit key in roughly 2128 iterations. As a result, it is sometimes suggested that symmetric key lengths be doubled to protect against future quantum attacks.”

Researchers surmise SHA-256 and SHA3-256 need 2166 “logical qubit cycles” to break, and the paper suggests quantum papers pose little threat, though classical processors will need to manage them.

The paper notes: “The main difficulty is that the coherence time of physical qubits is finite. Noise in the physical system will eventually corrupt the state of any long computation,” the paper states. “Preserving the state of a logical qubit is an active process that requires periodic evaluation of an error detection and correction routine.”

With ASICs running at a few million hashes per second, it would take Grover’s algorithm 1032 years to crack SHA-256 or SHA3-256. That is longer than the universe has existed.

As The Register adds: “Even if you didn’t care about the circuit footprint and used a billion-hash-per-second Bitcoin-mining ASIC, the calculation still seems to be in the order of 1029 years.”

SHA-2 is the set of cryptographic hash functions designed by the National Security Agency (NSA), an intelligence branch of the US government under scrutiny for ubiquitous surveillance due to revelations released by Edward Snowden. SHA stands for “Secure Hash Algorithm.”

These hash functions represent mathematical operations run by digital means Cryptographic hash functions boast collision resistance, which means attackers cannot find two different input values that result in the same hash output. The SHA-2 family is comprised of altogether six hash functions with hash values that are 224, 256, 384 or 512 bits: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256.

SHA-256 and SHA-512 are novel hash functions computed with 32-bit and 64-bit words, respectively.

/* */