logo
Quantum Randomness Could Create a Spoof-Proof Internet

Quantum Randomness Could Create a Spoof-Proof Internet

Quantinuum's 56-bit trapped-ion computer has succeeded in demonstrating randomness in quantum circuits to establish secure, private connections
By & Lee Billings
The allure of quantum computers is, at its heart, quite simple: by leveraging counterintuitive quantum effects, they could perform computational feats utterly impossible for any classical computer. But reality is more complex: to date, most claims of quantum 'advantage' —an achievement by a quantum computer that a regular machine can't match—have struggled to show they truly exceed classical capabilities. And many of these claims involve contrived tasks of minimal practical use, fueling criticisms that quantum computing is at best overhyped and at worst on a road to nowhere.
Now, however, a team of researchers from JPMorganChase, quantum computing firm Quantinuum, Argonne National Laboratory, Oak Ridge National Laboratory and the University of Texas at Austin seems to have shown a genuine advantage that's relevant to real-life issues of online security. The group's results, published recently in Nature, build upon a previous certification protocol —a way to check that random numbers were generated fairly—developed by U.T. Austin computer scientist Scott Aaronson and his former postdoctoral researcher Shih-Han Hung.
Using a Quantinuum-developed quantum computer in tandem with classical, or traditional, supercomputers at Argonne and Oak Ridge, the team demonstrated a technique that achieves what is called certified randomness. This method generates random numbers from a quantum computer that are then verified using classical supercomputers, allowing the now-certified random numbers to be safely used as passkeys for encrypted communications. The technique, the team notes, outputs more randomness than it takes in—a task unachievable by classical computation.
On supporting science journalism
If you're enjoying this article, consider supporting our award-winning journalism by subscribing. By purchasing a subscription you are helping to ensure the future of impactful stories about the discoveries and ideas shaping our world today.
'Theoretically, I think it's interesting because you need to put together a lot of technical tools in order to make the theoretical analysis fly,' says Hung, now an assistant professor of electrical engineering at National Taiwan University. 'Random-number generation is a central task for modern cryptography and algorithms. You want the encryption to be secure and for the [passkey] to be truly random.'
When it comes to Internet security, randomness is a weapon—a mathematically impenetrable shield against malicious adversaries who seek to spy on secret communications and manipulate or steal sensitive data. The two-factor authentication routinely used to protect personal online accounts is a good example: A user logs in to a system with a password but then also uses a secure device to receive a string of randomly generated numbers from an external source. By inputting that string, which can't be predicted by adversaries because of its randomness, the user verifies their identity and is granted access.
'Random numbers are used everywhere in our digital lives,' says Henry Yuen, a computer scientist at Columbia University, who was uninvolved with the study. 'We use them to secure our digital communications, run randomized controlled trials for medical testing, power computer simulations of cars and airplanes—it's important to ensure that the numbers used for these are indeed randomly generated.'
In more cryptographic applications, on the other hand, it's not enough to just generate random numbers. We need to generate random results that we know for certain are the outcome of an unbiased process. 'It's important to be able to prove the randomness to a skeptic who does not trust the device producing the randomness,' says Bill Fefferman, a computer scientist at the University of Chicago, who was not involved in the new work. Implementing such protocols to check each and every outcome would be 'impossible classically,' Fefferman says, but possible with the superior computational potential of quantum devices.
'Quantum computers and quantum technologies offer the only way to reliably generate and test randomness,' Yuen says. Unlike classical computers, which depend on binary 'bits' to process information, quantum computers operate on qubits, which can have an infinite number of possible orientations when existing in a superposition state. These qubits allow quantum computers to process exponentially larger loads of data at much faster rates.
The quantum computer involved in the latest demonstration uses 56 such qubits to run the protocol developed by Aaronson and Hung. The gist of the procedure is relatively straightforward. First, the quantum computer is given a complex problem that requires it to generate random outputs, in a process called random circuit sampling. For a small enough quantum computer, usually under 75 qubits, these outputs can be traced on classical computers to ascertain that the results couldn't have been generated classically, explains Christopher Monroe, a quantum computing expert at Duke University, who was not involved in the study.
Verifying this is the next step in the protocol, but it includes an added caveat: time. The quantum computer must generate its outputs faster than they could be mimicked (or 'spoofed') by any known classical computing method. In the team's demonstration, the Quantinuum system took a couple of seconds to produce each output. Two national laboratory supercomputers subsequently verified these outputs, ultimately devoting a total of 18 hours of computing time to generate more than 70,000 certified random bits.
These bits were certified using a test that gives the outcomes something called a cross-entropy benchmarking (XEB) score, which checks how 'ideal' the randomness of the distributions is. A high XEB score coupled with a short response time would mean that a certain outcome is very unlikely to have been influenced by any interference from untrusted sources. The task of classically simulating all that effort to spoof the system would, according to Aaronson, require the continuous work of at least four comparable supercomputers.
'The outcome of the [certified randomness test] is governed by quantum-mechanical randomness—it's not uniformly random,' Aaronson says. For example, in the case of Quantinuum's 56-qubit computer, 53 out of 56 bits could have a lot of entropy, or randomness, and that would be just fine. 'And, in fact, that it's not uniform is very important; it's the deviations from uniformity that allow us to test that in the first place that yes, these samples are good. They really did come from this quantum circuit.'
But the fact that these measurements must be additionally verified with classical computers puts 'important limits on the scalability and utility of this protocol,' Fefferman notes. Somewhat ironically, in order to prove that a quantum computer has performed some task correctly, classical supercomputers need to be brought in to pick apart its work. This is an inherent issue for most of the current generation of experiments seeking to prove quantum advantage, he says.
Aaronson is also aware of this limitation. 'For exactly the same reason why we believe that these experiments are very hard to spoof using a classical computer, you're playing this very delicate game where you need to be, like, just at the limit of what a classical computer can do,' Aaronson says.
That said, this is still an impressive first step, Fefferman says, and the protocol will be useful for instances such as public lotteries or jury selection, where unbiased fairness is key. 'If you want random numbers, that's trivial—just take a Geiger counter and put it next to some radioactive material,' Aaronson says. 'Using classical chaos can be fine if you trust the setup, but doesn't provide certification against a dishonest server who just ignores the chaotic system and feeds you the output of a pseudorandom generator instead,' Aaronson adds in a reply to a comment on his blog post about the protocol.
Whether the protocol will truly have practical value will depend on subsequent research—which is generally the case for many 'quantum advantage' experiments. 'The hype in the field is just insane right now,' Monroe says. 'But there's something behind it, I'm convinced. Maybe not today, but I think in the long run, we're going to see these things.'
If anything, the new work is still a formidable advance in terms of quantum hardware, Yuen says. 'A few years ago we were thrilled to have a handful of high-quality qubits in a lab. Now Quantinuum has made a quantum processor with 56 qubits.'
'Quantum advantage is not like landing on the moon—it's a negative statement,' Aaronson says. 'It's a statement [claiming that] no one can do this using a classical computer. Then classical computing gets to fight back.... The classical hardware keeps improving, and people keep discovering new classical algorithms.'
In that sense, quantum computing may be akin to ' a moving target ' of sorts, Aaronson says. 'We expect that, ultimately, for some problems, this war will be won by the quantum side.But if you want to win the war, you have to do problems where the quantum advantage is a little bit iffier, where it's a little bit more vulnerable.'

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

TSA Announces Big Change at Seattle-Tacoma International Airport
TSA Announces Big Change at Seattle-Tacoma International Airport

Yahoo

time31 minutes ago

  • Yahoo

TSA Announces Big Change at Seattle-Tacoma International Airport

Over the past several months the Transportation Security Administration has been rolling out new technology to screen passengers before their travels. One of the busiest airports in the United States will be seeing that upgrade this month. On June 5 the TSA announced a new security checkpoint located at the south end of the terminal on the arrivals level at Seattle-Tacoma International Airport. The new checkpoint is designed to screen up to 750 passengers per hour. "It will be open daily 4 a.m. to 8 p.m. This is the first checkpoint on the baggage claim level as part of innovative designs in a space constrained terminal. This will provide a new option for travelers for convenience as well as additional queuing and re-composure space to improve the customer experience," the TSA said in a statement. The security administration revealed what passengers can expect when encountering the latest version of Credential Authentication Technology (CAT-2). "A TSA officer will scan the passenger's photo identification and a camera will capture a real-time photo of the passenger. CAT-2 uses facial matching technology to compare the features on the photo ID against the in-person, real-time photo," the TSA said. "Once the unit confirms a match, a TSA officer verifies it and the traveler can proceed to security screening. TSA officers can perform additional passenger verification if needed. Through a secure Internet connection, the units also verify that an individual is ticketed for air travel, negating the need to show a boarding pass." The TSA also revealed photos captured by the new equipment are "never stored or used for any other purpose than immediate identity verification." Travelers who don't want to participate in the facial matching process have the option to opt Announces Big Change at Seattle-Tacoma International Airport first appeared on Men's Journal on Jun 6, 2025

Tools for Humanity's Orb Explained
Tools for Humanity's Orb Explained

Time​ Magazine

time2 hours ago

  • Time​ Magazine

Tools for Humanity's Orb Explained

Sam Altman co-founded Tools for Humanity in 2019 as part of a suite of companies he believed would reshape the world. Once the tech he was developing at OpenAI passed a certain level of intelligence, he reasoned, it would mark the end of one era on the Internet and the beginning of another, in which AI became so advanced, so human-like, that you would no longer be able to tell whether what you read, saw, or heard online came from a real person. When that happened, Altman imagined, we would need a new kind of online infrastructure: a human-verification layer for the Internet, to distinguish real people from the proliferating number of bots and AI 'agents.' TIME Correspondent Billy Perrigo explains the solution that Altman came up with - a mysterious device called the Orb.

You Can Save $40 on Starlink Right Now If You're Fine With Slower Internet
You Can Save $40 on Starlink Right Now If You're Fine With Slower Internet

CNET

time2 hours ago

  • CNET

You Can Save $40 on Starlink Right Now If You're Fine With Slower Internet

If you've been holding off on getting Starlink because of the steep monthly price, now might be the time to reconsider. The satellite internet service provider just rolled out a more budget-friendly plan called Residential Lite, bringing the monthly cost down from $120 to $80 in select areas. That's a $40 discount for customers in 30 US states, making it one of the most significant price drops we've seen from Starlink yet. Of course, there's a trade-off. While the new plan still offers unlimited data, download speeds are lower-ranging from 45 to 130 megabits per second, according to Starlink's official FAQ. That might be more than enough for everyday browsing and streaming, but it won't match the performance of the standard plan. Still, if you're in one of the eligible states and need reliable rural internet access without paying top-tier prices, this lighter plan could be exactly what you've been waiting for. Read more: Ontario Contract With Starlink Is Canceled Even if Tariffs Are Lifted The Residential Lite plan at $80 a month is now available in 30 states. Starlink The less expensive plan has some caveats. It's half the speed of the Residential plan, which boasts download speeds of 100 to 270Mbps. In addition, Starlink acknowledges that Residential Lite plans will be the first to be deprioritized, which may result in lower speeds during peak hours. "This service plan will be deprioritized compared to Residential service during peak hours," Starlink says. "This means speeds may be slower for Residential Lite service relative to Residential service when our network has the most users online." Locating local internet providers Peak hours are generally between 6 to 11 p.m. on weekdays. That's right around when everyone finishes work and school and sits down to eat dinner, play video games or watch some Netflix before bed. Starlink says its network is a "finite resource" until the company can reach a peak number of Starlink satellites. Thus, Residential Lite subscribers may experience slow internet speeds if enough people are online. The big picture for low-income households The Affordable Connectivity Program ended last year, due to funds running out. Before the ACP ended, the government subsidized low-income households from $30 to $75 per month to help them get internet in their homes. The end of the program saw around 23 million households lose their internet connection. While Congress has not yet passed a similar bill or found a way to revive the ACP, other low-cost internet options exist. At $80 per month, the Residential Lite plan from Starlink is quite affordable for satellite internet service, but it's still not quite as good a deal as faster broadband plans from major ISP providers. For instance, I pay $80 per month to Spectrum for much faster, 600Mbps download speeds. For around the same price, Cox offers 250Mbps. AT&T Fiber's 300Mbps plan is $55 monthly, and Xfinity is even cheaper with a 400Mbps plan at a starting price of $40. People looking for cheap internet have more affordable broadband options than Starlink's Residential Lite tier. But this less expensive, albeit slower, plan could appeal to those in rural areas without many ISP options.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store