A team of researchers, including JP Morgan Chase, Quantinuum, and others, have shown that Quantum Computers can generate “proof-of-random” numbers, which could improve the way they secure everything from banks to voting systems.
You can see that the random numbers used by some computer programs are not that random.
Encryption (for example, the underlying technology of two-factor authentication and passkeys) generates random numbers to protect the system from hackers. However, traditional computers usually use algorithms that mimic only randomness, and are actually based on algorithmic formulas, so it is possible that they can be hacked if someone understands the pattern.
“Imagine having a list that starts with ‘Ace of Diamond’ and then ends 53 items in the Joker later. To shuffle this on a computer, you might use the well-known algorithm, Knuth shuffle. The problem is, when you run the algorithm on an ordered deck, it resumes the same ‘seed’. Protegrity said Decryption.
Breakthrough published in Naturedemonstrated that the team was able to achieve certified randomness. In other words, the numbers were obviously random and could not be deciphered.
Using Quantinuum’s 56-kit trap-ion computer, the research team generated over 70,000 certified random bits in a process just per second to create, while four of the four top supercomputers work non-stop.
The numbers were later verified by a group of supercomputers, which could prove that no mathematical algorithms were involved in that generation.
This achievement illustrates meaningful steps beyond previous quantum computing claims, which often involve unnatural tasks with little real-world value. This time, this application tackles the fundamental challenges of cybersecurity. This creates a fair and unpredictable random number.
“Traditional random number generation faces two major challenges: the possibility of manipulation or predictability of an entropy source and the weaknesses of the algorithms used by pseudo-random number generators to expand their entropy.” Decryption. “Quantum randomness introduces a radically different source of entropy rooted in the inherent unpredictability of quantum mechanical processes.”
The ability to generate true randomness depends on the unique world of quantum mechanics. Quantum computers use qubits rather than binary bits, so they can exist in multiple states simultaneously thanks to a phenomenon known as superposition.
When measured, these qubits produce truly random results, not because of lack of information, but because nature itself does not determine the outcome until an observation occurs. In other words, a cat only lives or dies when someone opens the box.
(TL;DR: Quantum computers are excellent at generating random numbers, quantum mechanics is truly excellent Basically uncertain– Whereas Classic Computers are A deterministic machine pretending to be random. )
This protocol works through a clever front and back between quantum and classical computing. First, quantum computers perform so-called random circuit sampling, a method used in quantum computing to demonstrate quantum computing, a method used in quantum computing. This means you can perform tasks faster on quantum computers than a known classic computer can.
Each produced an output in about 2 seconds. The classic supercomputers of Argonne and Oak Ridge National Laboratories spent 18 hours verifying these outputs using a technique called cross-entropy benchmarks.

This verification process ensures that no one is manipulating the random numbers. It is not a manufacturer of quantum computers. This has not been achieved previously and is marked when a general general-purpose quantum computer was first used to generate publicly available and certified quantum randomness at scale.
There is a high interest in getting the randomness right. Duncan Jones, cybersecurity director at Quantinuum, one of the labs involved in the research alongside JP Morgan, offers some dramatic examples of what happens when randomness fails.
“In 2010, Sony’s PlayStation violation occurred because developers were unable to use strong random number generation, allowing attackers to expose their private encryption keys,” Jones said. Decryption. “More recently, Polynonce Attack (2014-2023) has exploited the randomness of weak Bitcoin wallets, leading to the theft of 140 Bitcoins (~$10 million).
Felix Xu, CEO of ARPA Network, highlighted another costly incident. “A notorious example is the 2013 Android Securandom vulnerability where weak entropy in Bitcoin wallet applications allows attackers to steal private keys and release millions of Bitcoin dollars.”
“Similarly, in 2019, the flawed implementation of deterministic random bit generation in Yubikey’s FIPS certified hardware tokens exposes the encrypted key for potential compromises,” Xu pointed out.
This meaning extends across digital security and allows doors to be opened for real users of quantum computers. An improved random number means that everything from online banking to government applications, messaging apps, and social media is strong. It can also make digital signature systems a safer and more secure crypto wallet, preventing data tampering, for example.
One particular use case of certified randomness is the unreliable random beacon. This is a public service that regularly emits true random numbers, like the Universal 2FA Code Generator, that is not predicted, manipulated or fake, and that no one can do it in a way that anyone can verify.
“In the case of blockchain, the randomness of quantum certification can enhance truly fair and tamper-proof consensus algorithms, and can greatly enhance platforms like Ethereum and Solana for operations,” Xu said. Decryption.
“Where a smart contract or consensus mechanism relies on random numbers, you can improve by ‘calling’ quantum random numbers,” said Konstantinos Karagiannis, director of quantum computing services at Protiviti. Decryption.
Public lottery, gambling sites, banking, A/B testing marketing companies, and Bioresearch companies are one of the businesses that can benefit greatly from using true random number generation.
Despite its promise, this technique is not yet suitable for everyday use. The verification phase requires the supercomputing power that most organizations currently lack. In other words, it’s not a hassle to implement it now.
However, Quantinuum’s Jones suggests that other players are working on a more sustainable pass, and that the technology is already heading towards accessibility.
“The JPMC study required supercomputers to be certified, but quantum origins take a different approach,” he said. “Utilize Bell Testing on a quantum computer to generate quantum seeds (strong seeds). Once a quantum seeds are generated (a one-time process), they can be embedded in the software and upgraded local random sources at random “quantum” randomly. ”
The path to mainstream adoption looks promising. First experts believe Quantum Computing may have actual bulk applications in the short term.
“Chipscales will probably continue to be cheaper (and hopefully more resistant to noise). It may be possible to add them to almost every device within the last decade,” Karagiannis said. Decryption. It’s a vision that Xu will share.
“For applications in the cloud, the numbers generated by real quantum computers are readily available as part of the workload,” Karagiannis added. “We can one day add a Quantum Processing Unit (QPU) to some features, including random numbers.”
If he is right, if this technique is successful, it could ultimately move towards the internet. There, spoofing attacks become mathematically impossible, not difficult, and create a fundamentally secure digital world built on the strange habits of quantum physics.
Edited by Andrew Hayward
Discover more from Earlybirds Invest
Subscribe to get the latest posts sent to your email.