Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Cohere’s new AI agent promises to protect the platform, North, enterprise data

    August 6, 2025

    5 command line backup tool each Linux user should use for desktop and server

    August 6, 2025

    8 Reasons I replaced my kindle with an ipad mini to read e -books

    August 6, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»AI/ML»Cloud Quantum Computing: A trillion-dollar opportunity with dangerous hidden risks
    AI/ML

    Cloud Quantum Computing: A trillion-dollar opportunity with dangerous hidden risks

    PineapplesUpdateBy PineapplesUpdateJune 22, 2025No Comments9 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Cloud Quantum Computing: A trillion-dollar opportunity with dangerous hidden risks
    Share
    Facebook Twitter LinkedIn Pinterest Email

    For nearly two decades, join a reliable event by Enterprise leaders. The VB transform brings people together with real venture AI strategy together. learn more


    Quantum Computing (QC) brings with it a mixture of groundbreaking possibilities and significant risks. Major technical players like IBM, Google, Microsoft And Heroic Already commercial QC has rolled cloud services, while special firms such as Quantinum and PSIQUANTUM have quickly achieved unicorn position. Experts estimate that the global QC may add more to the market $ 1 trillion For the world economy between 2025 and 2035. However, can we certainly say that the benefits overtake the risks?

    On the one hand, these state -of -the -art systems promise to revolutionize areas such as drug discovery, climate modeling, AI and perhaps the development of Artificial General Intelligence (AGI). On the other hand, they also introduce serious cyber security challenges, which should be addressed now, even though the fully functional quantum computers capable of breaking today’s encryption standards are still several years away.

    Understanding the landscape of QC danger

    The main cyber security fear associated with QC is its ability to break the encryption algorithm which has been considered unbreakable. A survey KPMG revealed that about 78% of American companies and 60% Canadian companies estimate that quantum computers would become mainstream by 2030. More dangerous, 73% of American respondents and 60% Canadian respondents believe that the cyber criminal has begun to use QC, which reduces current security measures.

    Methods of modern encryption depends a lot more on mathematical problems that are almost disqualified by classical computers, at least within a reasonable time frame. For example, RSA will take such a computer by factoring large prime numbers used in encryption. 300 trillion yearHowever, with the noise algorithm (the quantum computer factor developed in 1994 to help quickly to a large number of numbers), an adequately powerful quantum computer can potentially solve it. Rapidly,

    The algorithm of the Grover, designed for unarmed discovery, is a real game-chain when it comes to symmetric encryption methods, as it effectively cuts their safety power in half. For example, the AES -128 encryption will offer the same security level to the 64 -bit system, making it open to quantum attacks. This situation asks to give a push to a strong encryption standards like AES-256, which may be firm against potential quantum threats. In near future,

    Now harvesting, later decrying

    The most related “Harvest now, later decrypt” This is an important risk for data that holds long -term values, such as health records, financial statements, classified government documents and military intelligence.

    Given the possible serious consequences of HNDL attacks, Many organizations “Crypto Forestity” should be adopted responsible for important systems worldwide. This means that whenever new weaknesses are revealed, they should be ready to swap cryptographic algorithms and implementation. This concern is also reflected in American national security Memorandum On promoting American leadership in quantum computing, reducing the risk for weak cryptographic systemsWhich especially indicates this danger and asks for active measures to combat it.

    Danger Timeline

    When it comes to predicting the timeline for quantum hazards, the opinion of the expert is on all maps. A Recent report Miter suggests that we will probably not see a quantum computer powerful, which is enough to crack the RSA -2048 encryption, which is from 2055 to 2060 depending on the current trends in the quantum volume -a metric used to compare the quality of different quantum computers.

    At the same time, some experts feel more optimistic. He believes that quantum error improvement and algorithm design can lead to things with recent successes, possibly allowing quantum decryption capabilities. a report At the end of 2020, 90% of the confidence that RSA-2048 can be factor before 2060.

    While the exact timeline is still in the air, one thing is clear: experts agree that organizations need to start preparation immediately, no matter when quantum threat comes.

    Quantum Machine Learning – Param Black Box?

    In addition to the suspected crypto agility of today’s organizations, security researchers and futurists Are worrying too AI and QS appear to be the merger of the unavoidable future. Quantum technology has the ability to supercharges AI development as it can handle complex calculations at lightning speed. This can play an important role in reaching AGI, as today’s AI system requires trillion parameters to become smarter, leading to some serious computational obstacles. However, this synergy also opens the scenarios that may be beyond our ability to predict.

    You do not need AGI to understand the essence of the problem. Imagine whether quantum computing was to be integrated into machine learning (ML). We can see what experts call the ultimate black box problem. Deep neural networks (DNN) are already known to be quite opaque, with hidden layers that their creators also struggle to interpret. Whereas to understand how classical nerve networks already decide, quantum ML will lead to a more misleading position.

    The root of the issue lies in the nature of QC, that is, the fact that it uses superposition, entanglement and intervention to process information in ways that have no classical equivalent. When these quantum features are applied to the ML algorithm, the models that emerge may include procedures that are difficult to translate into the logic that man can understand. It enhances some obvious concerns for important areas such as healthcare, finance and autonomous systems, where it is important to understand the decisions of AI.

    Will post-quantum cryptography be sufficient?

    To deal with the increasing dangers generated by QC, the US National Institute of Standards and Technology (NIST) shut down it Quantum cryptography standardization Project Back in 2016. This included a thorough review of 69 candidates from Cryptographer worldwide. On completion of the review, the NIST chose several promising methods that rely on structured latis and hash functions. These are mathematical challenges that are capable of understanding attacks from both classical and quantum computers.

    In 2024, NIST rolled out detailed post-quantum Cryptographic standardAnd major tech companies have been taking steps to implement initial security since then. For example, Apple unveiled the PQ3-a post-quantum protocol-for its IMessage platform, aimed at protecting against advanced quantum attacks. On a similar note, Google has been experimenting with post-quantum algorithms in Chrome since 2016 and has been continuously integrating them into various services.

    Meanwhile, Microsoft is progressing to increase the QBIT error correction without disturbing the quantum environment, marking a significant leap in the credibility of the QC. For example, earlier this year, the company announced that it made A. “New Status Status” (In addition to a solid, liquid and gas) dubbed “topological quit”, which can feel completely QCS in years instead of decades.

    Major transition challenges

    Nevertheless, the shift after quantum cryptography comes with a host of challenges which should be dealt with:

    • Implementation deadline: American officials are predicting it can take it anywhere 10 to 15 years To roll new cryptographic standards in all systems. It is especially difficult for hardware located in hard-to-wheel places such as satellites, vehicles and ATMs.
    • Performance effect: Post-quantum encryption usually demands Large major size And more complex mathematical operations, which can slow down both encryption and decryption processes.
    • A Lack of technical expertiseTo successfully integrate quantum-resistant cryptography in existing systems, organizations require highly skilled IT professionals who are well aware of both classical and quantum concepts.
    • Search for vulnerability: Even the most promising post-quantum algorithms can be hidden weaknesses, As we have seen Nist-selected crystals-kyber algorithm.
    • Supply chain concern: Essential quantum components, such as cryocular and special laser, can be affected by geo -political stress and supply disruption.

    Last but certainly not minimum, technology-lover is going to be important in the quantum era. As companies run to adopt post-quantum cryptography, it is important to remember that encryption alone will not mold them from employees who click on harmful links, opens suspicious email attachments or misuse their access to data.

    A recent example is when Microsoft received two applications, which unknowingly revealed their private encryption keys – while the underlying mathematics was solid, the human error made that security ineffective. Mistakes in implementation often compromise with systems that are theoretically protected.

    Quantum future preparation

    Organizations need to take some important steps to get ready for challenges arising from quantum security threats. What should they do in very wide words here:

    • Conduct a cryptographic inventory – take stock of all the systems that use encryption and can lead to risk from quantum attacks.
    • Assess the lifetime value of the data-Find out which pieces of information require long-term security, and prefer to upgrade those systems.
    • Develop migration timeline-Set realistic schedule to go into post-quantum cryptography in all systems.
    • Allocate appropriate resource-quantum-resistant safety measures and ensure budget for important costs coming.
    • Increase monitoring capabilities – Keep the system to spot potential HNDL attacks.

    Michelle Moske has come with one Theoretical To help plan out organizations for quantum security: X (if the time needs to be safe) is more than Z Plus Y (takes time to upgrade the cryptographic system) more than Z (for time for time the quantum computer cannot crack current encryption), organizations must take immediate action.

    conclusion

    We are stepping into an era of quantum computing that brings with us some serious cyber security challenges, and we all need to work fast, even though we are not completely certain that these challenges will be completely physical. It may be before decades that we can see quantum computers that can break the current encryption, but the risk of inaction is simply very good.

    Vivek Wadhwa off foreign policy magazine Puts it with bluntness: “The world’s failure to curb AI – or rather, raw technologies are being matured in this way – should act as a deep warning. There is an even more powerful emerging technique with the ability to wreak havoc, especially if it is combined with AI: Quantum Computing.”

    To overtake this technical wave, organizations must begin to apply post-quantum cryptography, keeping an eye on adverse quantum programs and safe quantum supply chain. This is now important to prepare – suddenly disrespect our current safety measures before quantum computer.

    Julius is CEO in černiauskas Oxlabs,

    Daily insights on business use cases with VB daily

    If you want to impress your boss, VB daily has covered you. We give you the scoop inside what companies are doing with generative AI, from regulatory changes to practical deployment, so you can share insight for maximum ROI.

    Read our privacy policy

    Thanks for membership. See more VB newsletters here.

    There was an error.

    Cloud Quantum Computing: A trillion-dollar opportunity with dangerous hidden risks

    cloud computing dangerous hidden opportunity Quantum risks trilliondollar
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleFart Walking-To reduce your blood sugar, do 10 minutes of indoor walking workout immediately after meals, help lose weight
    Next Article Gear News this week: Adob
    PineapplesUpdate
    • Website

    Related Posts

    AI/ML

    Cohere’s new AI agent promises to protect the platform, North, enterprise data

    August 6, 2025
    AI/ML

    I tried the first 360-degree camera of DJI, and its recording capabilities take out the competition.

    August 6, 2025
    AI/ML

    Should you upgrade M4 to M4 MacBook Pro? I did, and it was perfectly worth it

    August 6, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    Cohere’s new AI agent promises to protect the platform, North, enterprise data

    August 6, 2025

    5 command line backup tool each Linux user should use for desktop and server

    August 6, 2025

    8 Reasons I replaced my kindle with an ipad mini to read e -books

    August 6, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.