Unbreakable? Researchers warn quantum computers have serious security flaws
Quantum computers could revolutionize everything from drug discovery to business analytics—but their incredible power also makes them surprisingly vulnerable. New research from Penn State warns that today’s quantum machines are not just futuristic tools, but potential gold mines for hackers. The study reveals that weaknesses can exist not only in software, but deep within the physical hardware itself, where valuable algorithms and sensitive data may be exposed.
Quantum computers are expected to deliver extraordinary speed and computing power, with the potential to transform scientific research and business operations. That same power also makes them especially appealing targets for cyberattacks, said Swaroop Ghosh, a professor of computer science and electrical engineering at the Penn State School of Electrical Engineering and Computer Science.
Ghosh and Suryansh Upadhyay, who recently earned his doctorate in electrical engineering from Penn State, coauthored a research paper that outlines several serious security weaknesses affecting today's quantum computing systems. Published online in the Proceedings of the Institute of Electrical and Electronics Engineers (IEEE), the study argues that protecting quantum computers requires more than securing software alone. The physical hardware that runs these systems must also be part of any serious defense strategy.
In a Question and Answer discussion, Ghosh and Upadhyay explained how quantum computers work, why they face unique security challenges, and what steps developers can take to prepare these machines for wider use.
Q: What makes a quantum computer different from a traditional computer?
Ghosh: Traditional computing works using units of information called bits, which you can picture as a light switch in the "on" or "off" position. These positions are assigned values of one or zero, with one representing on and zero representing off. We program computers by using algorithms or educated guesses to develop the best possible solution for a problem, compiling this solution to generate machine-level instructions -- directions specifying which bits need to equal one and which bits need to equal zero -- that the computer follows to execute a task.
Quantum computers are built on quantum bits, or qubits. These qubits are much more versatile than standard bits, capable of effectively representing one, zero or both at the same time, otherwise known as a superposition. These qubits can also be linked to one another, known as entanglement. By incorporating superpositions and entanglement into decision making, quantum computers can process exponentially more data than bit-powered computing systems, while using an equivalent number of qubits.
This is useful for improving workflows in many industries, since quantum computers can process information much faster than traditional computers. One example is the pharmaceutical industry, where quantum computing can quickly process data and predict the efficacy of potential new drugs, significantly streamlining the research and development process. This can save companies billions of dollars and decades spent researching, testing and fabricating innovative drugs.
Q: What are some of the main security vulnerabilities facing quantum computers right now?
Upadhyay: Currently, there is no efficient way to verify the integrity of programs and compilers -- many of which are developed by third parties -- used by quantum computers at scale, which can leave users' sensitive corporate and personal information open to theft, tampering and reverse engineering.
Many quantum computing algorithms have businesses' intellectual property integrated directly in their circuits, which are used to process highly specific problems involving client data and other sensitive information. If these circuits are exposed, attackers can extract company-created algorithms, financial positions or critical infrastructure details. Additionally, the interconnectedness that allows qubits to operate so efficiently inadvertently creates a security vulnerability -- unwanted entanglement, known as crosstalk, can leak information or disrupt computing functions when multiple people use the same quantum processor.
Q: What are current commercial quantum providers doing to address the security concerns? Can they use the same security methods implemented in traditional computers?
Upadhyay: Classical security methods cannot be used because quantum systems behave fundamentally differently from traditional computers, so we believe companies are largely unprepared to address these security faults. Currently, commercial quantum providers are focused on ensuring their systems work reliably and effectively. While optimization can indirectly address some security vulnerabilities, the assets unique to quantum computing, such as circuit topology, encoded data or hardware coded intellectual property systems generally lack end-to-end protection. Since quantum computers are still a relatively new technology, there is not much incentive for attackers to target them, but as the computers are integrated into industry and our day-to-day life, they will become a prime target.
Q: How can developers improve security in quantum computers?
Ghosh: Quantum computers need to be safeguarded from ground up. At the device level, developers should focus on mitigating crosstalk and other sources of noise -- external interference -- that may leak information or impede effective information transfer. At the circuit level, techniques like scrambling and information encoding must be used to protect the data built into the system. At the system level, hardware needs to be compartmentalized by dividing business data into different groups, granting users specific access based on their roles and adding a layer of protection to the information. New software techniques and extensions need to be developed to detect and fortify quantum programs against security threats.
Our hope is that this paper will introduce researchers with expertise in mathematics, computer science, engineering and physics to the topic of quantum security so they can effectively contribute to this growing field.
Other co-authors include Abdullah Ash Saki, who recently received his doctorate in electrical engineering from Penn State. This work was supported by the U.S. National Science Foundation and Intel.
Sign in to highlight and annotate this article

Conversation starters
Daily AI Digest
Get the top 5 AI stories delivered to your inbox every morning.
More about
studyresearch![[P] GPU friendly lossless 12-bit BF16 format with 0.03% escape rate and 1 integer ADD decode works for AMD & NVIDIA](https://preview.redd.it/qbx94xeeo2tg1.png?width=140&height=93&auto=webp&s=39ed7f02dad84ccf081f932903c016c7983d4fcd)
[P] GPU friendly lossless 12-bit BF16 format with 0.03% escape rate and 1 integer ADD decode works for AMD & NVIDIA
Hi everyone, I am from Australia : ) I just released a new research prototype It’s a lossless BF16 compression format that stores weights in 12 bits by replacing the 8-bit exponent with a 4-bit group code . For 99.97% of weights , decoding is just one integer ADD . Byte-aligned split storage: true 12-bit per weight, no 16-bit padding waste, and zero HBM read amplification. Yes 12 bit not 11 bit !! The main idea was not just “compress weights more”, but to make the format GPU-friendly enough to use directly during inference : sign + mantissa: exactly 1 byte per element group: two nibbles packed into exactly 1 byte too https://preview.redd.it/qbx94xeeo2tg1.png?width=1536 format=png auto=webp s=831da49f6b1729bd0a0e2d1f075786274e5a7398 1.33x smaller than BF16 Fixed-rate 12-bit per weight , no

Quoting Greg Kroah-Hartman
Months ago, we were getting what we called 'AI slop,' AI-generated security reports that were obviously wrong or low quality. It was kind of funny. It didn't really worry us. Something happened a month ago, and the world switched. Now we have real reports. All open source projects have real reports that are made with AI, but they're good, and they're real. Greg Kroah-Hartman , Linux kernel maintainer ( bio ), in conversation with Steven J. Vaughan-Nichols Tags: security , linux , generative-ai , ai , llms , ai-security-research
Knowledge Map
Connected Articles — Knowledge Graph
This article is connected to other articles through shared AI topics and tags.
More in Research Papers

Development and multi-center evaluation of domain-adapted speech recognition for human-AI teaming in real-world gastrointestinal endoscopy
Automatic speech recognition (ASR) is a critical interface for human-AI interaction in gastrointestinal endoscopy, yet its reliability in real-world clinical settings is limited by domain-specific terminology and complex acoustic conditions. Here, we present EndoASR, a domain-adapted ASR system designed for real-time deployment in endoscopic workflows. We develop a two-stage adaptation strategy based on synthetic endoscopy reports, targeting domain-specific language modeling and noise robustness. In retrospective evaluation across six endoscopists, EndoASR substantially improves both transcrip — Ruijie Yang, Yan Zhu, Peiyao Fu

Memory in the LLM Era: Modular Architectures and Strategies in a Unified Framework
Memory emerges as the core module in the large language model (LLM)-based agents for long-horizon complex tasks (e.g., multi-turn dialogue, game playing, scientific discovery), where memory can enable knowledge accumulation, iterative reasoning and self-evolution. A number of memory methods have been proposed in the literature. However, these methods have not been systematically and comprehensively compared under the same experimental settings. In this paper, we first summarize a unified framework that incorporates all the existing agent memory methods from a high-level perspective. We then ex — Yanchen Wu, Tenghui Lin, Yingli Zhou

Human-Guided Reasoning with Large Language Models for Vietnamese Speech Emotion Recognition
Vietnamese Speech Emotion Recognition (SER) remains challenging due to ambiguous acoustic patterns and the lack of reliable annotated data, especially in real-world conditions where emotional boundaries are not clearly separable. To address this problem, this paper proposes a human-machine collaborative framework that integrates human knowledge into the learning process rather than relying solely on data-driven models. The proposed framework is centered around LLM-based reasoning, where acoustic feature-based models are used to provide auxiliary signals such as confidence and feature-level evi — Truc Nguyen, Then Tran, Binh Truong



Discussion
Sign in to join the discussion
No comments yet — be the first to share your thoughts!