{"id":16711,"date":"2020-05-06T20:49:30","date_gmt":"2020-05-06T16:49:30","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/quantum-computing-explained\/16711\/"},"modified":"2020-05-06T20:49:30","modified_gmt":"2020-05-06T16:49:30","slug":"quantum-computing-explained","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/quantum-computing-explained\/16711\/","title":{"rendered":"Quantum computers 101"},"content":{"rendered":"<p>Last fall, Google announced that it had <a href=\"https:\/\/www.nature.com\/articles\/s41586-019-1666-5.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">achieved quantum supremacy<\/a>. If that sounds a bit abstract and not relevant to the average user, think again. What the Google team did, essentially, was use a quantum computer to solve a problem that would have bamboozled even the snazziest supercomputer. Impressive, wouldn\u2019t you agree?<\/p>\n<p>What\u2019s more, the state of quantum computing has a direct bearing on the security of your data. After all, many protection methods in the digital world are based not on being uncrackable, but on being uncrackable <em>within a reasonable amount of time<\/em>. Here, we take a look at Google\u2019s new toy and consider whether we should worry about cybercriminals one day using it to hack into our lives.<\/p>\n<h2>What is a quantum computer?<\/h2>\n<p>The main difference between quantum computers and the traditional transistor kind that we all use today is how they handle data. The devices that we are familiar with\u00a0\u2014 from smartphones and laptops to the Deep Blue chess supercomputer\u00a0\u2014 store everything in <em>bits<\/em>, which is the name given to the smallest unit of information. A bit can take one of two values: 0 or 1.<\/p>\n<p>Consider the light bulb: It\u2019s either on (1) or off (0). A file on a computer disk looks like a set of light bulbs, some on, the others off. Armed with many such light bulbs, you can encode information, such as the phrase \u201cAlbert was here\u201d or an image of the Mona Lisa.<\/p>\n<p>When a two-state device solves a problem, it has to turn those light bulbs on and off continuously, writing and erasing the results of intermediate calculations to prevent them from clogging up its memory. That takes time, so if the task is very complex, the computer will think for a long, long time.<\/p>\n<p>Quantum computers, unlike their elder cousins, store and process data using quantum bits, or <em>qubits<\/em> for short. These can not only be turned \u201con\u201d and \u201coff\u201d but be in a transitional state or even on <em>and<\/em> off at the same time. Continuing the light bulb analogy, a qubit is like a lamp that you turned off but continues to blink. Or like <a href=\"https:\/\/en.wikipedia.org\/wiki\/Schr%C3%B6dinger's_cat\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Schr\u00f6dinger\u2019s cat<\/a>, which is considered simultaneously both alive and dead.<\/p>\n<p>The light bulbs in a quantum computer being both on and off saves a huge amount of time. Therefore, a quantum computer can solve complex problems much faster than even the most powerful traditional device. Google claims that its quantum machine, Sycamore, performed calculations in a bit over 3 minutes that would have taken an ordinary supercomputer 10,000 years. That\u2019s where the term \u201csupremacy\u201d comes in.<\/p>\n<h2>Quantum computers in real life<\/h2>\n<p>We\u2019ve established that quantum computers are pretty sharp when it comes to solving highly complex problems. So, why hasn\u2019t the transistor age been consigned to the history books already? Because quantum technology is still young, and the state of the \u201cblinking light bulb\u201d is very unstable \u2014 not to mention that the more qubits a system contains, the more difficult it is to maintain stability. And the feasibility of complex calculations depends, inter alia, on the number of qubits: With two bulbs, even top-end ones, you won\u2019t draw the Mona Lisa.<\/p>\n<p>Other reasons prevent quantum computers from totally supplanting their predecessors. Keep in mind that they process information in a fundamentally different way. That means software for them has to be developed from scratch. You can\u2019t just install Windows on a quantum computer; you\u2019d need a wholly new quantum operating system and quantum applications.<\/p>\n<p>Although <a href=\"https:\/\/wccftech.com\/operating-system-for-quantum-os-designed\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">scientists<\/a> and <a href=\"https:\/\/www.pcworld.com\/article\/3226783\/microsoft-plans-to-own-quantum-computing-like-it-owns-windows-pcs.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">IT giants<\/a> are dipping their toes into quantum waters, for the time being quantum computers work approximately like external hard drives, connected to and controlled by regular computers. They are used to solve a narrow range of problems, such as <a href=\"https:\/\/journals.aps.org\/prx\/abstract\/10.1103\/PhysRevX.6.031007\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">modeling a hydrogen atom<\/a> or searching databases. Despite quantum computing\u2019s power, you can\u2019t yet use it to go online and watch a video of skateboarding cats.<\/p>\n<p>Nevertheless, many believe the future belongs to quantum computing. The first quantum computers appeared on the market back in 1999. Today, large organizations such as Google, <a href=\"https:\/\/physicsworld.com\/a\/honeywell-says-it-will-soon-release-the-most-powerful-quantum-computer-yet\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Honeywell<\/a>, and <a href=\"https:\/\/techcrunch.com\/2019\/09\/18\/ibm-will-soon-launch-a-53-qubit-quantum-computer\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">IBM<\/a> (the latter already offers customers <a href=\"https:\/\/www.technologyreview.com\/f\/614346\/ibms-new-53-qubit-quantum-computer-is-the-most-powerful-machine-you-can-use\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">cloud access to its quantum computer<\/a>), Toshiba, <a href=\"https:\/\/www.abacusnews.com\/tech\/they-lag-behind-google-alibaba-and-baidu-are-also-fighting-quantum-supremacy\/article\/3034356\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Alibaba, and Baidu<\/a> are investing heavily in this area.<\/p>\n<p>However, it\u2019s worth pointing out that the task Google solved has no practical use, except to demonstrate the capabilities of quantum computing. We will not delve into the nitty-gritty, because it really is very complex and not very necessary for the everyday user. But if you want to study the details, take a look at <a href=\"https:\/\/www.nature.com\/articles\/s41586-019-1666-5.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Google\u2019s report<\/a>.<\/p>\n<p>Incidentally, not everyone agrees with Google\u2019s 10,000-year claim. IBM, for example, is sure that a <a href=\"https:\/\/www.ibm.com\/blogs\/research\/2019\/10\/on-quantum-supremacy\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">supercomputer could solve the same task<\/a>, if not in 3 minutes, then in not much more than 48 hours. But still, even if this estimate is more accurate, even non-mathematicians will spot a noticeable speed difference between quantum and traditional computers.<\/p>\n<h2>Quantum computers not (yet) a threat<\/h2>\n<p>As you can see, quantum computers are still more of a plaything for scientists than they are consumer devices or hacker tools. But that of course doesn\u2019t mean that they won\u2019t become more practical (and dangerous) down the line. With that in mind, data security experts are already drawing up battle plans. But more about that next time.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksc-trial-generic\">\n","protected":false},"excerpt":{"rendered":"<p>We explain quantum computers with the help of cats and light bulbs.<\/p>\n","protected":false},"author":2463,"featured_media":16712,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1226],"tags":[2088,566,191,261,448,2288],"class_list":{"0":"post-16711","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technology","8":"tag-tips","9":"tag-cryptography","10":"tag-data","11":"tag-encryption","12":"tag-quantum-computers","13":"tag-quantum-supremacy"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/quantum-computing-explained\/16711\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/quantum-computing-explained\/21245\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/quantum-computing-explained\/8208\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/quantum-computing-explained\/22236\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/quantum-computing-explained\/19983\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/quantum-computing-explained\/18679\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/quantum-computing-explained\/22652\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/quantum-computing-explained\/21587\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/quantum-computing-explained\/28316\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/quantum-computing-explained\/8215\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/quantum-computing-explained\/35290\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/quantum-computing-explained\/14805\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/quantum-computing-explained\/15184\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/quantum-computing-explained\/13434\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/quantum-computing-explained\/23952\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/quantum-computing-explained\/11442\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/quantum-computing-explained\/28276\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/quantum-computing-explained\/25401\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/quantum-computing-explained\/22206\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/quantum-computing-explained\/27548\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/quantum-computing-explained\/27384\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/quantum-computers\/","name":"Quantum Computers"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/16711","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2463"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=16711"}],"version-history":[{"count":0,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/16711\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/16712"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=16711"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=16711"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=16711"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}