ÎÞÓÇ´«Ã½

At the Forefront of the Quantum Revolution

Quantum Computing

Quantum Computing

Quantum algorithms excel in previously intractable problem spaces, potentially accelerating new and emerging analytics pipelines, enabling the design of new materials, and eliminating bottlenecks in critical government and business processes. Quantum computing includes the development of hardware as well as software and algorithms.Ìý

Quantum Communications

Quantum-Safe Communications

Quantum communications encompasses new ways of transmitting and securing information. It includes research on hardening traditional forms of communications against cyberattacks by future quantum computers. Chief among this work is post-quantum cryptography (PQC), the development of classical algorithms designed to resist attackers with access to a classical or quantum computer.

Quantum Sensing

Quantum Sensing

Quantum mechanics can transform sensor resolution and range beyond what is traditionally possible. This technology enables satellite-free navigation, deep space exploration, geological discovery, and more. Quantum sensors are also leveraged for use in quantum computing and communications.

Our report—Understanding the Capabilities of Modern Quantum Computers—provides a plain-language summary of our research into where and how quantum solutions will be truly advantageous.Ìý

Why Is Quantum Strategically Important?

Quantum technologies are expected to propel dramatic leaps in computational capability, important advances in sensor design, and new strategies for accurately communicating quantum information. These increased measurement and processing capabilities would catalyze revolutionary advancements in nearly every industry and discipline—national security, communications, healthcare, materials engineering, manufacturing, and finance sectors all stand to gain.

Through legislation and executive action, theÌýÌýis working to ensure U.S. leadership in QIST and several commercial sectors are responding to the call. across industry are rallying together to test hardware, design software, and support applied research into how quantum will affect their fields. ÎÞÓÇ´«Ã½ is committed to supporting this work. We help our clients understand how quantum technologies will impact their missions and businesses and how early investment can secure future advantages. It is pivotal to begin this planning today to ensure that organizations can leverage the technology to its full potential with a first-mover advantage. We can provide customized quantum support to your organization, federal agency, or national laboratory.Ìý

Advancements in QIST are challenging our understanding of what future computing, communications, and sensing technologies will look like and have compelling potential implications across the government and private sectors. Continued dedication to furthering QIST, as well as proactive moves toward information security in a quantum-enabled world, is key to building the partnerships and knowledge the United States needs to embrace these exciting technologies as they mature.

Our Quantum Services

Explore our dedicated capabilities for Quantum Tech for Positioning, Navigation, and Timing.

Ìý

Hope for the Best, Plan for the Worst: Preparing for the Quantum Cyber Threat

Despite their significant promise, quantum computers also threaten how enterprises secure critical data given their ability to solve the difficult math problems that are the basis for some modern encryption standards.ÌýLuckily, we do not have to wait for a full-scale quantum computer to start protecting critical data from the threat these computers present. PQC uses classical algorithms rooted in math problems that a quantum computer cannot efficiently solve to secure data. Government entities, led by the National Institute of Standards and Technology (NIST), have selected PQC algorithms for future cybersecurity and continue to manage the .

At ÎÞÓÇ´«Ã½, we understand that transitioning to new cybersecurity standards is no easy task so we provide a range of cryptographic services and expertise for transitioning to new cybersecurity standards:

Data Discovery

Identify data sources and business sensitivity levels used across your organization to prioritize transition strategy.

Cryptographic Discovery

Assess the lifecycle of cryptography used, availability of algorithms, and policy governing the cryptographic lifecycle. Create a cryptographic inventory to inform and prioritize PQC adoption.

Application Prototyping

Test PQC candidate algorithms on mission-relevant use cases to assess network and performance impacts and to prepare infrastructure.

PQC Adoption

Ensure all legacy systems and vendors use quantum-safe algorithms and that governance around cryptographic agility is enforced in future deployments.

Quantum Research Papers

ÎÞÓÇ´«Ã½ in the News

Information Week – September 2024
Ìý

insideBIGDATA - December 2021
Ìý
The Washington Post - November 2021
Ìý
NextGovÌý- November 2021
Ìý
Information Week - August 2021
Ìý
NextGov - April 2021
Ìý
Information Week - December 2020
Ìý

The Quantum Daily - February 2020
Ìý
Nextgov - December 2019Ìý
Ìý

Fifth Domain - January 2019

Meet Our People