{"id":185,"date":"2024-09-10T19:48:30","date_gmt":"2024-09-10T19:48:30","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=185"},"modified":"2024-09-10T19:48:30","modified_gmt":"2024-09-10T19:48:30","slug":"us-quantum-computing-lead-over-china-threatened-by-weakness-in-commercialization","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=185","title":{"rendered":"US quantum computing lead over China threatened by weakness in commercialization"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>The US leads the world in quantum computing research, but it will need more government investment to maintain its lead over China, an assessment by the Information Technology and Innovation Foundation (ITIF) has argued.<\/p>\n<p>Broadly, the ITIF\u2019s <a href=\"https:\/\/itif.org\/publications\/2024\/09\/09\/how-innovative-is-china-in-quantum\/\">latest report<\/a>, the result of interviews with experts as well as a review of scientific articles and patents, is positive about US efforts in a sector that has the <a href=\"https:\/\/www.cio.com\/article\/2074464\/think-you-can-ignore-quantum-computing-think-again.html\">potential to be<\/a> as technologically disruptive as anything wrought by artificial intelligence (AI).<\/p>\n<p>The US, it says, currently leads in mainstream quantum computing (getting quantum computers to spit out useful answers), and is neck and neck in quantum sensors (super-accurate measurement, useful for geolocation and medical imaging), while China leads in <a href=\"https:\/\/www.csoonline.com\/article\/572109\/new-quantum-key-distribution-network-resistant-to-quantum-attacks.html\">quantum key decryption<\/a> (QKD, used for secure communications that can\u2019t be secretly eavesdropped upon).<\/p>\n<p>However, as much as it is a competitive race, the rivalry between the US and China in quantum appears to be a battle between two entirely different systems.<\/p>\n<p>The US lead in quantum computing has emerged from the private sector, where competing innovations from IBM, Google, and others have racked up slow but steady advances. China\u2019s efforts, meanwhile, are dominated by government-funded programs, a reflection of a growing tendency of the state to direct innovation toward political goals.<\/p>\n<p>\u201cWhile the US invests in the long-term potential of quantum computing \u2014 a less mature but highly promising technology with broad applicability across multiple industries \u2014 China focuses on the immediate and secure applications of quantum communications, a more mature set of technologies with a narrower market scope,\u201d noted the report.<\/p>\n<p>China\u2019s excellence in QKD is one area where this approach has borne fruit, allowing it to build a 1,200 mile (1,931.2km) fiber QKD link between Beijing and Shanghai, extended into space via satellites.<\/p>\n<p>The wider question is whether the US versus China matters beyond national pride.<\/p>\n<p>In one important sense, the report reckons it does. The US approach is open, but assumes the private sector will do most of the legwork at its own pace. China is more insular, but focussed on achieving commercial goals as soon as possible.<\/p>\n<p>The insularity of China gives the US an edge, the report believes. Quantum computing is complex, requiring huge intellectual capital as well as investment. But limiting collaboration has downsides.<\/p>\n<p>\u201cThis approach yields rapid gains but poses long-term risks in sustaining complex technology advancements,\u201d noted the report.<\/p>\n<h2 class=\"wp-block-heading\">Why does quantum computing matter?<\/h2>\n<p>Along with AI, quantum computing is cited as having the potential to create huge technological disruption. While this is true, quantum computing\u2019s bugbear is the incredible challenge of commercialization. Progress towards saleable systems has been slow, expensive, and often stuck in experimental mode.<\/p>\n<p>Nevertheless, the mere possibility of quantum computing is already affecting mainstream computing, even in advance of full implementation. A good example is <a href=\"https:\/\/www.networkworld.com\/article\/3486075\/nist-finally-settles-on-quantum-safe-crypto-standards.html\">NIST\u2019s program to develop quantum safe algorithms<\/a> able to resist the theoretical ability of a quantum computer to factorize large numbers sufficiently fast to break today\u2019s public key infrastructure (PKI).<\/p>\n<p>This has created the possibility of \u201charvest now, decrypt later\u201d attacks, which many believe are already underway. Under this scenario, nation states gather vast amounts of encrypted data as it travels across the Internet, so that when a sufficiently powerful quantum computer is developed, they will be able to decrypt the data to reveal the secrets of rival nations and businesses.<\/p>\n<p>Should this happen, it\u2019s unlikely anyone would be told. As with Britain\u2019s ability to decipher German enigma transmissions in World War II, it would remain a top secret advantage.<\/p>\n<p>One solution is to use symmetric rather than asymmetric PKI keys to encrypt data, which even quantum computers can\u2019t easily derive. However, inconveniently, unlike with PKI, that means those keys need to be transported to the receiver.<\/p>\n<p>QKD provides a way to do this so that, should the symmetric keys (which quantum computers <em>might<\/em> decrypt in future) be intercepted, the sender will know this with the certainty of the laws of physics.<\/p>\n<h2 class=\"wp-block-heading\">One way street<\/h2>\n<p>The weakness of the US model for quantum research is that at times it resembles a \u201cVannevar Bush science project\u201d rather than an endeavor with geo-political implications, the report said. \u201cIn this model, basic research leads to applied research, which then leads to development, and eventually to commercial products. It\u2019s a step-by-step process that can be slow and disjointed, with each stage often handled by different entities.\u201d<\/p>\n<p>China, in contrast, integrates these stages, speeding its progress towards applications. Compounding this is a tendency of the Chinese to absorb the advances of others without sharing their own.<\/p>\n<p>This might lead to a scenario where the US dominates scientific quantum research while China dominates commercialization.<\/p>\n<p>On that score, the US Department of Commerce (DOC) last week released <a href=\"https:\/\/www.cio.com\/article\/3509188\/new-quantum-computing-controls-seek-to-advance-efforts-by-the-us-and-its-allies-and-slow-adversaries-production.html\">licensing proposals<\/a> designed to control the export of quantum computers and related technologies from the US and its allies that are probably aimed at China.<\/p>\n<p>ITIF\u2019s authors believe that to maintain its edge, the US government should take a leaf out of the book of countries such as the UK and invest money to speed up commercialization.<\/p>\n<p>In other words, the authors seem to be saying, don\u2019t assume commercialization will happen on its own across enough sectors. The US leads in some, but forgetting others might lead to the country becoming reliant on foreign technology in the same way it did with the development of 5G.<\/p>\n<p>ITIF will <a href=\"https:\/\/itif.org\/events\/2024\/09\/18\/can-china-innovate\/\">host a briefing<\/a> on the topic of China and innovation on Capitol Hill in Washington, District of Columbia on September 18.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>The US leads the world in quantum computing research, but it will need more government investment to maintain its lead over China, an assessment by the Information Technology and Innovation Foundation (ITIF) has argued. Broadly, the ITIF\u2019s latest report, the result of interviews with experts as well as a review of scientific articles and patents, [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":186,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-185","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/185"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=185"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/185\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/186"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=185"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=185"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=185"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}