A newly discovered trade-off in the way time-keeping devices operate on a fundamental level could set a hard limit on the performance of large-scale quantum computers, according to researchers from the Vienna University of Technology.

  • shortwavesurfer@monero.town
    link
    fedilink
    English
    arrow-up
    61
    ·
    10 months ago

    whether entropy will have the final say on just how powerful quantum computers can get, only time will tell.

    I wonder if this pun was on purpose

  • souperk@reddthat.com
    link
    fedilink
    English
    arrow-up
    45
    ·
    10 months ago

    Scientist:

    That means: Either the clock works quickly or it works precisely – both are not possible at the same time.

    Engineer: Explain that to my manager please!

    Also, Engineer: Well, what if we accounted for error rate and fixed precision post-processing?

  • NeoNachtwaechter@lemmy.world
    link
    fedilink
    English
    arrow-up
    25
    ·
    10 months ago

    the measure of time is bound by the limits of physics itself.

    It feels like a relief.

    We already had quantum theory that told us not to hack energy into infinitely small pieces, and we had the uncertainty principle, so we refrained from doing the same to space.

    Now we know that time behaves itself somewhat accordingly.

  • Arthur Besse@lemmy.ml
    link
    fedilink
    English
    arrow-up
    17
    arrow-down
    1
    ·
    edit-2
    10 months ago

    I really hope that there isn’t a cryptographically-relevant quantum computer built in our lifetimes, but we should still assume that there likely will be and accordingly should switch everything to use (hybrid) post-quantum cryptography ASAP.

    • jayrhacker@kbin.social
      link
      fedilink
      arrow-up
      3
      ·
      10 months ago

      Why not? I’ve got a hard drive which I lost the keys to I’d like to recover, and having all the old secrets out in the open would be really interesting.

      • Arthur Besse@lemmy.ml
        link
        fedilink
        English
        arrow-up
        3
        ·
        10 months ago

        It isn’t expected that a quantum computer will be able to instantly break symmetric encryption, as is used in full disk encryption. It will give an enormous advantage (halving the number of bits of security) but attacking that will still require a large amount of time and energy. What a CRQC will very quickly break is the asymmetric primitives, as used in TLS, encrypted email and chats, etc.

        On the other hand, using default parameters from not so long ago, it is cheaper than you might expect to brute-force your disk passphrase already today without a quantum computer… which is why you should use a stronger key derivation function (in addition to a strong passphrase, of course).

      • Plopp@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        10 months ago

        Isn’t that symmetrical encryption? Quantum computers aren’t really that beneficial for symmetrical encryption iirc, due to it being a process that can’t be parallelized very efficiently (and quantum computers are kinda slow per operation).

    • NeoNachtwaechter@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      1
      ·
      10 months ago

      Maybe we need more quantity

      More quantity of time?
      For you?
      Declined.
      You’ll get your 60-70 years like everybody else. :-)