Professional Documents
Culture Documents
Student’s Name:
Institutional Affiliation:
Instructor’s Name:
Conventional silicon-based computers use binary bits to represent states labeled 0 and 1
to manipulate information. Depending on the number of processor cores, these computers can
solve one or several problems. Comparatively, an incoming array of technologies called quantum
computers are based on the quantum mechanics concept of superposition (Mosca, 2015). The
concept presupposes the simultaneous existence of a particle in multiple states, which when
in quantum bits (qubits). Due to this foundational distinctiveness, quantum computers will
operate at lightning speeds, compared with standard computers. For instance, a one-qubit
quantum computer can perform two operations at once, with increasing qubits responsible for an
exponential increase in simultaneous operations at the rate of the base two raised to the number
of qubits (n) thus, 2n. Therefore, the promptness of operations and productivity will be the two
particular, the reactive nature of the technology to snooping offers advantages to data
management companies and suppliers such as Amazon Web Services (AWS). The company is a
subsidiary of Amazon, the giant online retailer, and it is made up of a collection of remote
computing products providing virtual server services (cloud computing) to diverse customers.
Cloud computing companies are emerging as new vectors for cyberattacks, probably due to the
malicious cyber activity based on its inherent nature to changeonce subjected to disturbances
such ascyber intrusions. Besides, modern cryptography works on the mathematical principles of
factorization to create primes with many digits that make decipherment of the encryption through
3
brute force almost impossible (Kirsch, 2015; Mosca, 2015). However, other sophisticated forms
unprecedented level of vulnerability in many systems. Backed by frightening speeds that enable
the creation of highly complex algorithms, quantum technology offers enhanced cryptography
crucial to privacy and data integrity (Mosca, 2017). Therefore, quantum computers will
significantly improve the cybersecurity capabilities of AWS to identify, protect, detect, respond,
However, quantum computing is poorly understood at the moment, with little progress in
ensuring the future security of computer systems. Specifically, the superposition characteristics
of quantum computers offer a growing challenge to AWS. Due to its high speeds, quantum
is secure – safe for some scattered instances, quantum computing is a whole new technology
whose threat cannot be covered by the usual quick-software patch-ups. Instead, a new form of
quantum cryptography is required with the super high speeds and other emerging infrastructure
of the new computers. Nonetheless, new cryptography systems take years to create.According to
quantum computer will increase significantly in the next two decades. If quantum cryptography
would not have developed at the time, the entire human society is at risk. Over the years,
technology has become an essential tool for human life across different spheres, including
financial, communication, business, and security. Encryption is at the base of these functions,
and thus, disruptions are inevitable once cryptography is compromised (Mosca, 2017). To AWS,
such a disruption would cause a total collapse of the company’s information systems from the
4
References
YouTube. https://www.youtube.com/watch?v=eqLcGpGc9pE&feature=youtu.be