OIST Quantum/Cyber Security Initiative: The Science, the Opportunities, and the Real-World Challenge (Recap) | Asia Society Skip to main content

Unsupported Browser Detected.
It seems the web browser you're using doesn't support some of the features of this site. For the best experience, we recommend using a modern browser that supports the features of this website. We recommend Google Chrome, Mozilla Firefox, or Microsoft Edge

  • Back to asiasociety.org
  • About
    • About Asia Society Japan
    • Our People
    • Our Committees
    • Asia 21 Japan Chapter
    • Financial Statements
    • Contact Us
  • Programs
  • Events
    • Upcoming Events
    • Past Events
    • Event Recaps
  • News
    • All Posts
    • Event Recaps
  • Video
    • All Japan Videos
    • Arts
    • Policy
    • Asia 21
  • Support Us
Japan
Search
Japan
  • About
    • About Asia Society Japan
    • Our People
    • Our Committees
    • Asia 21 Japan Chapter
    • Financial Statements
    • Contact Us
  • Programs
  • Events
    • Upcoming Events
    • Past Events
    • Event Recaps
  • News
    • All Posts
    • Event Recaps
  • Video
    • All Japan Videos
    • Arts
    • Policy
    • Asia 21
  • Support Us

OIST Quantum/Cyber Security Initiative: The Science, the Opportunities, and the Real-World Challenge (Recap)

Dr. Peter Gruss, President/CEO of OIST, and Mr. Jesper Koll, Asia Society Japan’s policy committee chair, preparing for the session

On June 1, 2021, Asia Society Japan Center and Okinawa Institute of Science and Technology (OIST) held an online seminar on quantum technology and its future impact on information security.

Three of the world’s most renowned quantum scientists led the audience through the world of quantum cryptography and computation and discussed its impact on existing encryption and cyber security:

  • Dr. Artur Ekert, University of Oxford, Centre for Quantum Technologies, Okinawa Institute of Science and Technology Graduate University
  • Dr. Christopher Monroe, Duke University, University of Maryland, and
  • Dr. Michele Mosca, Institute of Quantum Computing, University of Waterloo.

It was moderated by Dr. Kae Nemoto, a professor from the National Institute of Informatics.

Watch the highlight video of the event below or the full session on OIST website.

 

Introduction

Dr. Peter Gruss, President/CEO of Okinawa Institute of Science and Technology Graduate University, gave opening remarks. In our digital age, technology advances are growing exponentially. Technology has the power to inform or misinform our opinions, beliefs, biases and preferences, creating both exciting opportunities and significant challenges. In particular, quantum technologies offer enormous hope for transformative change. Quantum computers are expected to solve complex problems that today’s most powerful supercomputers cannot solve and never will. However, quantum computing may also pose some problems, as cryptographic protocols used today will become insecure once large-scale quantum computers are built. It is high time that we designed the next-generation of cryptographic protocols and organize the transition in our security infrastructure.

Japan is facing a talent shortage in quantum technology. OIST can help Japan become a frontrunner in the field. It seeks to become a focal point for the debate, not only among the science community but also with engineering and business world.

 

Introduction to Quantum Technology and its Impact on Information Security

Dr. Artur Ekert gave an Introduction to Quantum Technology and its Impact on Information Security. He talked about what to expect when we start interacting with quantum world and how it will impact the security of information. Marching toward the quantum world, every 18 months, microprocessors double in speed. In the drive for faster computing, the only way is to make things smaller in order to bring various components in a computing device closer to one another for faster communication. Thus, we are marching toward the level of molecules and atoms — the quantum world.

Quantum uses inherently different physics, and thus allows us not only to compute faster, but to achieve the impossible. He explained the concept of a quantum superposition using an experiment with beam splitters. Quantum superpositions can be a powerful tool, and this technology has been heralded as the second quantum revolution with enormous great impacts on privacy, precision and power.

 

Experimental Progress in Building Quantum Computers — Will they be here any time soon to threaten classical methods of encryption?

Dr. Christopher Monroe talked about Experimental Progress in Building Quantum Computers. Dr. Monroe began by introducing the quantum science and technology pillars: quantum computing, quantum simulation, quantum sensing, and quantum communication. A breakthrough in any pillar will have substantial impact on the other pillars. A quantum computer can factor numbers exponentially faster than classical computers. A quantum computer differs more than a laptop differs from an abacus, as the laws of computing are revolutionarily different. They will also look very different and do not need to be based on solid-state technology.

Various quantum technologies have been introduced to date. Natural platforms will need more control engineering and synthetic platforms will need surface science for maturity. A large amount of quantum bits and quantum gate operations are required to work towards the quantum advantage, which should take more than a decade. Quantum computing will mature in three phases. Three to five years will be spent on error reduction, ten or more years on error correction, and twenty or more years to build modular architecture.

 

What is the timeline for protecting existing cryptosystems from quantum?

Dr. Michele Mosca discussed how we can prepare for quantum technology. There is little we know about quantum computers, and how exponentially disruptive they can be; however, many sectors have begun to prepare themselves for the unpredictable future. One thing we know is that cryptography will be completely broken by hypothetical quantum computers. All of the digital platforms that we use worldwide in our critical infrastructure will be directly or indirectly affected.

Do we have to worry now? We have yet to know when fault-tolerant logical qubits will be available. Deploying conventional quantum-safe cryptography is a first step, which can later be combined with quantum cryptography. As we await national standards to be developed, we should start post-quantum planning and testing. We have seen advancements in developing large scale quantum communication networks. Once these technologies are mature, we will need to think about how to leverage them to make our digital platforms more secure and resilient.

No critical sector is immune from cyberattacks. We need to build greater resilience against cryptanalytic attacks. Quantum threat has motivated us to build a more resilient agile system, adding extra layers of defense, including quantum key distribution (QKD). If we wish to take immediate action, we should begin by putting someone in charge of producing a quantum readiness plan and provide them with broad executive support for the planning exercise. We should also engage other stakeholders, including relevant standards bodies and sectorial and cross-sectorial collaborations, update procurement policies and start engaging  with vendors.

 

Highlight Video

About
  • Mission & History
  • Our People
  • Become a Member
  • Career Opportunities
  • Corporate Involvement
visit us
  • Hong Kong
  • New York
  • Texas
global network
  • Australia
  • France
  • India
  • Japan
  • Korea
  • Northern California
  • Philippines
  • Southern California
  • Switzerland
  • Washington, D.C.
resources
  • Arts
  • Asia Society Magazine
  • ChinaFile
  • Current Affairs
  • Education
  • For Kids
  • Policy
  • Video
shop
  • AsiaStore
initiatives
  • Arts & Museum Summit
  • Asia 21 Young Leaders
  • Asia Arts Game Changer Awards
  • Asia Game Changer Awards
  • Asia Society Museum: The Asia Arts & Museum Network
  • Asia Society Policy Institute
  • Asian Women Empowered
  • Center for Global Education
  • Center on U.S.-China Relations
  • China Learning Initiatives
  • Coal + Ice
  • Creative Voices of Muslim Asia
  • Global Cities Education Network
  • Global Talent Initiatives
  • U.S.-Asia Entertainment Summit
  • U.S.-China Dialogue
  • U.S.-China Museum Summit
Connect
Email Signup For the media
Asia Society logo
©2022 Asia Society | Privacy Statement | Accessibility | Terms & Conditions | Sitemap | Contact

Asia Society takes no institutional position on policy issues and has no affiliation with any government.
The views expressed by Asia Society staff, fellows, experts, report authors, program speakers, board members, and other affiliates are solely their own. Learn more.

 

 

  • Visit Us
  • Hong Kong
  • New York
  • Texas
  • Global Network
  • Australia
  • France
  • India
  • Japan
  • Korea
  • Northern California
  • Philippines
  • Southern California
  • Switzerland
  • Washington, DC