Quantum physics not only explains how matter behaves at the subatomic level, but is also used to create many devices in our everyday lives, from lasers and transistors to GPS and mobile phones. The next wave of innovation could lead to unbreakable encryption and computers that are up to one million times faster. On 6 April, Parliament’s Science and Technology Options Assessment (STOA) unit organised a workshop to discuss with experts the potential of these new quantum technologies.
Exploiting the quirks of the quantum world
Quantum theory looks at matter at the subatomic level – down to electrons. And that behaviour, compared to our everyday world, is very strange. For example, an electron can be in different places at the same time, a phenomenon known as superposition. Or it can interact with another particle at a large distance thanks to an effect called “entanglement”.
Scientists and engineers are making use of this “weirdness” of the quantum world to develop cutting-edge technologies such as computers up to one million times faster than today or super-accurate clocks and extremely precise sensors.
Using the ability of subatomic particles to be in different states simultaneously, engineers are trying to build a quantum computer that processes information encoded in “qubits”. Compared to classical bits (either 1 or 0), “qubits” can also be 1 and 0 at the same time. This allows the computer to carry out “parallel” computations and so increases its speed exponentially.
Opportunities for creating new technologies
The workshop on 6 April looked at how companies could make use of quantum physics to develop new technologies. Opening the workshop, STOA chair Paul Rübig, an Austrian member of the EPP group, said: “Quantum technologies also pave the way for more secure communications through potentially unbreakable cryptography.”
However, the commercial exploitation of quantum mechanics is still limited, warned Günther Oettinger, commissioner for digital economy and society. “Timing is essential in this endeavour, as our competitors will not wait.”
French physicist Alain Aspect called on European politicians to better fund scientists. “If not, we will no longer be able to compete in the top league,” he said. “Part of this money must serve to create more partnerships with industry.”
Cora van Nieuwenhuizen, a Dutch member of the ALDE group, said: “We want to establish a chain of knowledge combining academy, industry and policy makers.”
Leo Kouwenhoven, from the QuTech Institute at Delft University of Technology in the Netherlands, said that quantum computing would not only be much faster, but also consume less energy than classic computers. “Already today, the energy consumption by IT world-wide is about 10% of the electrical bill.”
Aspect added: “I don’t know if it will take 35 years or even 25 years to build a quantum computer, but we have to know that when physics tells us that it is in principle possible, it is in fact possible.”
Quantum computing is a nascent technology based on quantum theory in physics which explains the behavior of particles at the subatomic level, and states that until observed these particles can exist in different places at the same time. While normal computers store information in ones and zeros, quantum computers are not limited by the binary nature of current data processing and so can provide exponentially more computing power.
“Quantum things can be in multiple places at the same time,” said Chris Monroe, a University of Maryland physicist and founder of IonQ. “The rules are very simple, they’re just confounding.”
In October, Alphabet Inc. GOOG subsidiary Google claimed to have achieved a breakthrough by using a quantum computer to complete a calculation in 200 seconds on a 53-qubit quantum computing chip, a task it calculated would take the fastest current super-computer 10,000 years. Earlier this month, Amazon.com Inc. AMZN Announced its intention to collaborate with experts to develop quantum computing technologies that can be used in conjunction with its cloud computing services. International Business Machines Corp. IBM and Microsoft Corp. MSFT are also developing quantum computing technology.
It is ideal for use in mobile phone, automotive, computing, critical infrastructure, IoT and security applications where compact size and resistance to external environmental perturbations are critical. IDQ’s QRNG chip is available in three models, depending on size, performance, power consumption and certifications, in order to fit various industry-specific needs.
Quantis QRNG IDQ250C2
Quantis QRNG IDQ250C2 is the first Quantum Random Number Generator designed and manufactured specifically for mobile handsets. IoT and edge devices. With its low profile, compact size and low power consumption, it is ideal for securing the collection and transfer of sensitive data at the edge.
In May 2020, ID Quantique and SK Telecom announced to the world the first 5g smartphone with quantum security.
By integrating a Quantum Random Number Generator (QRNG) into its new Samsung Galaxy A Quantum smartphone. Samsung has added quantum technology to smartphone. Security for SK Telecom to provide the highest level of trust for customer’s sensitive information.
ID Quantique was the first company to develop a quantum random number generator (QRNG). In 2001 and it remains the market leader in terms of reliability and certifications. The operation of Quantis is continuously monitored and if a failure is detected the random bit stream is immediately disabled.
In addition, unlike PRNGs which need to accumulate external entropy, Quantis provides full entropy (randomness). Instantaneously from the very first photon (bit). IDQ’s quantum random number generators (QRNG) offer high quality entropy for use in highly secure crypto operations. And solutions requiring proven and certified randomness.
IDQ is actively developing new QRNG products for its customers. In various fields like automobile, consumer electronics, computer and mobile, financial, gaming and security markets.
Our quantum technology provides the most secure encryption keys. Today and in the quantum computing era, guaranteeing the highest level of trust for consumers.
Mobile Phone security report
According to the Mobile Phone security report. Published in 2019, high-risk vulnerabilities were found in 38% of mobile applications for iOS and in 43% of Android applications. Insecure data storage is the most common issue, found in 76% of mobile applications. Passwords, financial information, personal data, and correspondence are at risk.
Many cyber attacks rely on user inattention while most cases are caused by weaknesses in security mechanisms. Because such vulnerabilities creep in during the design stage, fixing them requires significant changes to code.
In many cases, risks are the product of several seemingly small deficiencies in various parts of the mobile application. Taken together, these oversights can add up to serious consequences, including financial loss.