In an insightful Question and Answer session, Ghosh and Upadhyay elaborated on the fundamental workings of quantum computers, the unique security challenges they confront, and the proactive steps developers can and must take to ensure these powerful machines are secure for widespread adoption.
Q: What fundamentally differentiates a quantum computer from a conventional computer?
Ghosh: Traditional computing operates on the principle of bits, which can be visualized as light switches that are either "on" or "off." These states are assigned numerical values of one or zero, respectively. Our programming of computers involves employing algorithms, essentially sophisticated educated guesses, to determine the most efficient solution to a given problem. This solution is then compiled into machine-level instructions—specific directives dictating which bits should be one and which should be zero—which the computer executes to perform a task.
Quantum computers, conversely, are built upon quantum bits, or qubits. Qubits possess a far greater versatility than their classical counterparts. They can represent not only a one or a zero but also a combination of both simultaneously, a phenomenon known as superposition. Furthermore, qubits can be interconnected, a principle known as entanglement. By harnessing superposition and entanglement in their decision-making processes, quantum computers can process exponentially more data than bit-powered systems, even when utilizing an equivalent number of qubits. This enhanced processing capability holds immense promise for optimizing workflows across numerous industries. For instance, in the pharmaceutical sector, quantum computers can rapidly analyze vast datasets and predict the efficacy of potential new drug candidates, thereby dramatically accelerating the research and development lifecycle. This acceleration can translate into substantial savings of billions of dollars and decades of work that would otherwise be spent on research, testing, and fabricating innovative drugs.
Q: Could you outline some of the most significant security vulnerabilities currently affecting quantum computers?
Upadhyay: A pressing challenge at present is the absence of an efficient method for verifying the integrity of the programs and compilers used by quantum computers, especially when these are developed by third parties and deployed at scale. This deficiency leaves users’ sensitive corporate and personal information susceptible to theft, tampering, and reverse engineering.
Many quantum computing algorithms incorporate a company’s intellectual property directly within their underlying circuits, which are specifically designed to process highly specialized problems involving client data and other sensitive information. If these circuits are compromised, attackers could gain access to proprietary algorithms, sensitive financial positions, or critical infrastructure details. Moreover, the very interconnectedness that enables qubits to operate with such remarkable efficiency inadvertently creates a security vulnerability. Unwanted entanglement, often referred to as crosstalk, can inadvertently leak information or disrupt computing functions when multiple users share the same quantum processor.
Q: What measures are current commercial quantum providers implementing to address these security concerns? Are they able to leverage the same security paradigms as traditional computers?
Upadhyay: Classical security methods are largely ineffective because quantum systems exhibit fundamentally different behaviors compared to traditional computers. Consequently, we believe that many companies are currently ill-equipped to address these emergent security flaws. At present, commercial quantum providers are primarily focused on ensuring the reliability and effectiveness of their systems. While optimization efforts can indirectly mitigate some security vulnerabilities, the unique assets of quantum computing—such as circuit topology, encoded data, or hardware-encoded intellectual property systems—generally lack comprehensive end-to-end protection. While the relative novelty of quantum computers means there is currently limited incentive for attackers to target them, as these machines become increasingly integrated into industry and our daily lives, they will undoubtedly become prime targets for malicious actors.
Q: What concrete steps can developers take to bolster security within quantum computers?
Ghosh: A foundational approach is necessary to safeguard quantum computers from the ground up. At the device level, developers must prioritize mitigating crosstalk and other sources of noise—external interference that can lead to information leakage or impede effective data transfer. At the circuit level, employing techniques such as scrambling and sophisticated information encoding is crucial to protect the data embedded within the system. At the system level, robust compartmentalization is essential. This involves partitioning business data into distinct segments, granting users specific access privileges based on their roles, and thereby adding a critical layer of protection to sensitive information. Furthermore, the development of novel software techniques and extensions is imperative for detecting and fortifying quantum programs against evolving security threats.
Our earnest hope is that this research paper will serve as a catalyst, introducing researchers with expertise in mathematics, computer science, engineering, and physics to the critical domain of quantum security. This will empower them to make significant and effective contributions to this rapidly expanding field.
Additional co-authors include Abdullah Ash Saki, who recently completed his doctorate in electrical engineering at Penn State. This vital research was generously supported by the U.S. National Science Foundation and Intel, underscoring the national importance of securing this transformative technology.

