Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

On the Role of Quantum Computing in Science and Cybersecurity

Giovanny Espitia and Jungkyu Park, P.h.D

Kennesaw State University

ABSTRACT

In this paper, we examine the state art of quantum computing and analyze its potential effects in
scientific computing and cybersecurity. Additionally, a non-technical description of the mechanics
of the listed form of computing is provided to educate the reader for better understanding of the
arguments provided. The purpose of this study is not only to increase awareness in this nescient
technology, but also serve as a general reference guide for any individual wishing to study other
applications of quantum computing in areas that include finance, bio – chemistry, and data science.
Lastly, an educated argument is provided in the discussion section that addresses the implications
this form of computing will have in the main areas examined.

I. INTRODUCTION

In latter half of the 1930’s, two prominent a general description of this form of
mathematicians hypothesized the idea of a computing will be provided in an attempt to
universal machine capable of simulating any answer the question, how will quantum
other machine [3]. This type of machine came computing affect our perception of modern
to be known as “Universal Turing Machine” science and geopolitics in terms of
in honor of its main postulator, Alan Turing. computational models and cybersecurity?
Such machine was soon realized, giving rise
to the information age we live in. II. TECHNOLOGY OVERVIEW
Additionally, the realization of such machine
allowed for rapid progress in science and Quantum computing is a computational
geopolitics along with related fields to the paradigm that makes use of different
former disciplines. For this reason, our phenomena developed in the theory of
civilization has benefited from quantum mechanics. These phenomena allow
unprecedented wealth and a high standard of for the existence of a different unit of
living relative to our species history. information known as the quantum bit or
However, based on the laws of physics, the “qubit” for short. In contrast to the classical
exponential increase that has been bit, a qubit makes use of three fundamental
commonplace up this stage is bound to halt as principles that include superposition,
advances in microchip design approach the interference, and entanglement. These three
single atom scale. Interestingly, a solution to principles endow the discussed qubit with the
this problem was proposed in the latter half property of spin capable of existing in a
of the 1980’s by physicist and Nobel laurate, superposition of states as opposed to a binary
Richard Feynman [4]. This solution calls for on/off state experienced by classical systems.
an entirely new computational paradigm In other words, if a classical system can
known as quantum computing. In this paper, perform n operations, a quantum system can

1
perform 2! logic operations [1]. This This translates into even more sophisticated
capability translates into an array of applications including molecular dynamics,
applications, including scientific computing protein folding, and enzyme simulation for
and cybersecurity. the development of new medicine. For this
reason, various academic, private, and
III. APPLICATIONS AND governmental institutions have begun
CAPABILITIES research efforts in this discipline at an
unprecedented level of support in our history.
Quantum computing opens a wealth of Besides from these scientific applications,
possibilities for scientists and engineers to quantum computing is recognized by its
better examine and study their models. Over revolutionary potential in cryptography and
the last couple of decades, scientist begin to thus cybersecurity. As our society has
employ computational programs to better transitioned to an economy filled and
understand real world phenomena as opposed essentially run by data, information, and
to the traditional mathematical models. One computing systems, the proper protection of
example being “The Wolfram Physics the latter becomes essential. Up to this stage,
Project” [11] led by Wolfram et al. modern cybersecurity systems are based in a
Furthermore, this computational approach paradigm known as RSA [8] encryption. This
has allowed for safer and more efficient form of encryption attributes its success to
engineering by allowing numerical the computational complexity associated
approximations to systems of differential with the factorization of large prime
equations, whose solutions cannot be numbers. The latter represents a significant
obtained by analytical methods. The latter challenge to modern classical computers, but
accomplishment has allowed for computer a quantum computer programmed with an
aided design (CAD) software to decrease the algorithm known as Shor’s algorithm [10] is
amount of time required to design a system, able to achieve this computation in a fraction
while at the same time increasing its of time.
effectiveness and safety grade. However, as
scientists and engineers begin to study more IV. REALIZATION EFFORTS
complex phenomena in a linear fashion,
sooner rather than later, our silicon-based The race toward seamless quantum
computing infrastructure will not be able to computers begun in the latter part of the
meet these rigorous demands. For this reason, 2010’s with private companies including
quantum computers no longer become a IBM, Google, and D- Wave as the dominant
luxury, but rather a necessity. Quantum figures. The efforts conducted by the latter
computers as mentioned before, are capable has already allowed computations that cannot
of completing a task of comparable be performed in a classical computer in a
complexity to that of a classical computer not reasonable amount of time. One example is
only with a lower number of digits of Google’s Sycamore processor being able to
information, but also with a smaller wastage perform a calculation in 200 second as
of natural resources such as opposed to 10, 000 years in a classical system
electricity. Furthermore, quantum computers [7]. In recent years however, this western
have less difficulty in simulating interactions domination has begun to shift toward south
at the atomic level relative to a classical eastern countries, particularly China. The
system, in part, because the system running latter can be attributed to significant
the simulation is a quantum system by itself.

2
governmental support with the primary goal computations including simulation, time to
to assert leadership in this field. coherence, and predictability.
In contrast to the Unites States, The
V. DIFFERING APPROACHES People’s Republic of China has made the
realization of this technology into a task of
The achievement of the studied technology national priority. The latter has been
is based on three criteria. These include the indicated in three consecutive 5 – year plans
funding allotted toward this effort, the devised by the government. Additionally,
political ideologies, and the state of the art of China’s national secretary, Xi Jinping, has
established channels of communication. listed the advancement of quantum
In the United States, complying with the information science as a must due to it having
established ideology of capitalism, the main the potential to cause major repercussions in
entities striving for this technology are both the national security and cybersecurity
private companies as opposed to national spaces. To achieve this technology, China is
laboratories or universities. This fact is relying primarily in government funded
analogous with NASA outsourcing the institutions including the Chinese Academy
design and manufacturing of the various of Sciences, the National Science Foundation
spacecraft systems during the Gemini and of China, and other research institutions
Apollo programs as opposed to conducting including Tsinghua and Pekin Universities.
the listed processes in house. In this race Furthermore, differing from the competitive
however, the main companies performing the environment created by capitalism in the
effort for the United States include Google, United States, China plans to advance this
IBM, and ION Q. These companies have technology in a united and cooperative
taken a different approach toward this fashion that has already begin to prove its
technology that is optimized for a particular worth. For example, to combat cybersecurity
task. For example, Google’s subdivision AI attacks, a 4, 600 km quantum network [2] has
Quantum has opted for an architecture known already been built to provide an alternative
as “Quantum Turing Machine” [5] that could path toward the flow of quantum keys and
theoretically serve as a universal computing thus a theoretically uncrackable network of
machine. This type of architecture will enable communication. In addition, to complement
a quantum system to function in a similar way the network described, in 2016 China
to that of a classical system. In contrast to launched the first quantum satellite known as
this, IBM is striving toward an architecture “Micious” capable to communicating with
known as “Adiabatic” [9] capable of ground bases following the Quantum Key
outperforming the architecture pursued by distribution paradigm [12]. The latter
Google in the short term. This occurs, network has been devised with the primary
because Adiabatic systems are configured for intent to enhance established channels of
a particular task and are intended to solve communication, but it has the potential to
optimization problems, thus finding most of achieve mass adoption through what is called
their users in academia. Lastly, ION Q which “The Quantum Internet”. Theoretically, this
is a startup company founded by two former type of internet is superior to the established
professors from Maryland and Duke, is one due to its use of Quantum Key
striving for a trapped ion architecture [6]. Distribution, thus making it practically
This architecture was first proposed by the uncrackable.
academics referred and it has the potential to
outperform physical qubits across different

3
VI. DISCUSSION newly dominant figures in the world stage
became evident. China began a national
Now that a better understanding of quantum effort to realize this technology in a speedier
computing as a scientific and national manner than their American counterparts.
security tool is present, one can venture to the With great investments in terms of physical
main premise of this paper. So how will and human capital, China is close to their
quantum computing affect our understanding goal and thus pose a threat to their political
of computational science? rivals including the United States. This event
Quantum computing will increase the will shift the manner in which geopolitics is
capabilities researchers have when it comes conducted by inducing a transition in the
to simulations with the objective of modeling resource of choice from oil and nuclear
their hypothesis or query. Due to the nature reserves, to information and top
of the systems previously discussed, the governmental secrets.
reliability of results gathered will be higher
and thus indistinguishable from the real CONCLUSION
system. This fact will force current nay-
sayers against quantum computing to re- Quantum computing is a revolutionary
consider the opportunities presented by this paradigm that combines the main ideas
technology in terms of study. For example, a developed in 20 century. From quantum
th

cosmologist could simulate the event horizon mechanics to information theory, from
that occurs in a black hole for any arbitrary computational cryptography to
number of black holes. With this example, cybersecurity. This technology has been
one can appreciate the increase in efficiency devised to stay, but its effects in society are
in terms of time, due to the cosmologist being yet to be seen. Nonetheless, with a working
able to simulate simultaneous models as knowledge and competency in history, one
opposed to one in the same amount of time. can provide educated arguments for what the
As a result, computational science will shift future holds as provisioned in this paper.
from being the last resort for experimentation
to the primary one. REFERENCES
Next, how will quantum computing affect
the way geopolitics is conducted? Towards
the end of the 20 century, with the drastic
th 1] Bernhardt, C. (2020). Quantum
progress in computer technology, Computing for Everyone (Mit Press)
cybersecurity and protection of encrypted (Illustrated ed.). The MIT Press.
information became more prominent than
ever. In addition, the introduction of public [2] Chen, Y. A., Zhang, Q., Chen, T. Y.,
key cryptography and RSA encryption, led Cai, W. Q., Liao, S. K., Zhang, J.,
many experts in the area to conclude that such Chen, K., Yin, J., Ren, J. G., Chen, Z.,
field was completed. However, as mentioned Han, S. L., Yu, Q., Liang, K., Zhou,
before, mathematician Peter Shor [10] F., Yuan, X., Zhao, M. S., Wang, T.
developed an algorithm capable of Y., Jiang, X., Zhang, L., . . . Pan, J.
performing prime factorization and thus W. (2021). An integrated space-to-
posing a threat not only to the RSA paradigm, ground quantum communication
but any organization that made usage of this network over 4,600 kilometres.
theory to encrypt their information. For this Nature, 589(7841), 214–219.
reason, an unprecedented interested from https://doi.org/10.1038/s41586-020-
03093-8
4
[3] Copeland, J. (2007). The Church- [8] Rivest, R. L., Shamir, A., &
Turing Thesis. NeuroQuantology, Adleman, L. (1983). A method for
2(2). obtaining digital signatures and
https://doi.org/10.14704/nq.2004.2.2. public-key cryptosystems.
40 Communications of the ACM, 26(1),
96–99.
[4] Feynman, R. P. (1982). Simulating https://doi.org/10.1145/357980.3580
physics with computers. 17
International Journal of Theoretical
Physics, 21(6–7), 467–488. [9] Saravanan. (2014). NOVEL
https://doi.org/10.1007/bf02650179 REVERSIBLE VARIABLE
PRECISION MULTIPLIER USING
[5] Muller, M. (2008). Strongly REVERSIBLE LOGIC GATES.
Universal Quantum Turing Machines Journal of Computer Science, 10(7),
and Invariance of Kolmogorov 1135–1138.
Complexity. IEEE Transactions on https://doi.org/10.3844/jcssp.2014.11
Information Theory, 54(2), 763–780. 35.1138
https://doi.org/10.1109/tit.2007.9132
63 [10] Shor, P. W. (1999). Polynomial-
Time Algorithms for Prime
[6] Pino, J. M., Dreiling, J. M., Figgatt, Factorization and Discrete
C., Gaebler, J. P., Moses, S. A., Logarithms on a Quantum Computer.
Allman, M. S., Baldwin, C. H., Foss- SIAM Review, 41(2), 303–332.
Feig, M., Hayes, D., Mayer, K., https://doi.org/10.1137/s0036144598
Ryan-Anderson, C., & Neyenhuis, B. 347011
(2021). Demonstration of the trapped-
ion quantum CCD computer [11] Wolfram Physics Project | A Class
architecture. Nature, 592(7853), 209– of Models with the Potential to
213. https://doi.org/10.1038/s41586- Represent Fundamental Physics.
021-03318-4 (2020). Wolfram Physics Project.
https://www.wolframphysics.org/tec
[7] Quantum Supremacy Using a hnical-introduction/
Programmable Superconducting
Processor. (2019, October 23). [12] Yuen, H. P. (2016). Security of
Google AI Blog. Quantum Key Distribution. IEEE
https://ai.googleblog.com/2019/10/q Access, 4, 724–749.
uantum-supremacy-using- https://doi.org/10.1109/access.2016.2
programmable.html 528227

You might also like