Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Math Supercomputing

JPMorgan Says Quantum Experiment Generated Truly Random Numbers (financialpost.com) 110

JPMorgan Chase used a quantum computer from Honeywell's Quantinuum to generate and mathematically certify truly random numbers -- an advancement that could significantly enhance encryption, security, and financial applications. The breakthrough was validated with help from U.S. national laboratories and has been published in the journal Nature. From a report: Between May 2023 and May 2024, cryptographers at JPMorgan wrote an algorithm for a quantum computer to generate random numbers, which they ran on Quantinuum's machine. The US Department of Energy's supercomputers were then used to test whether the output was truly random. "It's a breakthrough result," project lead and Head of Global Technology Applied Research at JPMorgan, Marco Pistoia told Bloomberg in an interview. "The next step will be to understand where we can apply it."

Applications could ultimately include more energy-efficient cryptocurrency, online gambling, and any other activity hinging on complete randomness, such as deciding which precincts to audit in elections.

JPMorgan Says Quantum Experiment Generated Truly Random Numbers

Comments Filter:
  • So what? (Score:5, Insightful)

    by nichogenius1 ( 9413819 ) on Wednesday March 26, 2025 @09:34PM (#65261869)
    I can do the same thing with a web cam and a wall of lava lamps.
    • Re:So what? (Score:5, Informative)

      by rta ( 559125 ) on Wednesday March 26, 2025 @10:06PM (#65261919)

      TFA is bad article, but it seems they did do something:

      As deterministic systems, classical computers cannot create true randomness on demand. As a result, to offer true randomness in classical computing, we often resort to specialized hardware that harvests entropy from unpredictable physical sources, for instance, by looking at mouse movements, observing fluctuations in temperature, monitoring the movement of lava lamps or, in extreme cases, detecting cosmic radiation. These measures are unwieldy, difficult to scale and lack rigorous guarantees, limiting our ability to verify whether their outputs are truly random.

      Compounding the challenge is the fact that there exists no way to test if a sequence of bits is truly random. Given the difficulties in sourcing and verifying randomness, we resort to trust: we simply must trust that the hardware generates fresh randomness.

      The requirement of trust, however, becomes an issue when randomness is used to make decisions among parties distrustful of each other, such as when competitors resort to a coin toss to settle a dispute. Who gets to toss the coin? If the parties are participating remotely, how can one verify that there was a coin toss at all?

      An ideal solution would be a kind of randomness with the following three characteristics:

              It comes from a verifiably trusted source.
              It comes with rigorous mathematical guarantees.
              It could not have been manipulated by a malicious adversary.

      This kind of randomness is called Certified Randomness.

      One possible way of verifying that a sequence of numbers truly came from a random source is by demanding some kind of signature or proof, perhaps embedded in those numbers itself, that could not have been faked using predictable sources. You could, for example, ask that your randomness provider only draw numbers from a specific probability distribution that is challenging to imitate using non-random sources. You could then verify that the numbers you receive came from your chosen distribution and therefore must have been truly random.

      As it turns out, such a protocol is impossible to realize using conventional computers but can be accomplished using a quantum computer. ...
      From our demonstration, we verify that at least 71,313 bits of entropy are secure against an experimental malicious adversary at least four times more powerful than the world’s largest supercomputer. Crucially, we are guaranteed randomness even if the quantum computer was acting maliciously, compromised by a third party or impersonated. The randomness our protocol generates, therefore, does not require trusting any external entity. ...

      (from https://www.jpmorgan.com/techn... [jpmorgan.com] where the description of what they did is included.)

      there's a link to their paper in Nature https://www.nature.com/article... [nature.com]

      • by rta ( 559125 )

        err... maybe should've just posted the abstract of said paper "Certified randomness using a trapped-ion quantum processor"

        Abstract

        Although quantum computers can perform a wide range of practically important tasks beyond the abilities of classical computers1,2, realizing this potential remains a challenge. An example is to use an untrusted remote device to generate random bits that can be certified to contain a certain amount of entropy3. Certified randomness has many applications but is impossible to achieve solely by classical computation. Here we demonstrate the generation of certifiably random bits using the 56-qubit Quantinuum H2-1 trapped-ion quantum computer accessed over the Internet. Our protocol leverages the classical hardness of recent random circuit sampling demonstrations4,5: a client generates quantum ‘challenge’ circuits using a small randomness seed, sends them to an untrusted quantum server to execute and verifies the results of the server. We analyse the security of our protocol against a restricted class of realistic near-term adversaries. Using classical verification with measured combined sustained performance of 1.1×1018 floating-point operations per second across multiple supercomputers, we certify 71,313 bits of entropy under this restricted adversary and additional assumptions. Our results demonstrate a step towards the practical applicability of present-day quantum computers.

      • True randomness sounds like chasing perfection to me.

        • Re:So what? (Score:4, Informative)

          by gweihir ( 88907 ) on Thursday March 27, 2025 @08:25AM (#65262559)

          It is bullshit anyways. Harvesting quantum-tunneling noise has been done for half a century and it is easy, cheap and reliable. This is just another attempt to pretend somethign useful can be done with quantum computing mechanisms. It is just one more lie to that effect.

          Inciodetnally, there is nothing "certified" about it. That is just another lie. That some quantum effects are "true random" is an _assumption_, and that assumption is unproven.

          • by sls1j ( 580823 )
            Totally agree, don't need a quantum computer to do this. Worked with a company in 2000 which built a random number generator with a laser, a mirror, and a photon detector, we also certified it's results. Not a big deal, been done for decades.
            • Totally agree, don't need a quantum computer to do this. Worked with a company in 2000 which built a random number generator with a laser, a mirror, and a photon detector, we also certified it's results. Not a big deal, been done for decades.

              Even more to the point, the main CPU in every laptop, desktop and mobile device being sold today has a noisy diode-based TRNG embedded in it. Not only can true randomness be generated easily and cheaply, it is done, and at massive scale.

              • by gweihir ( 88907 )

                Unfortunately, no. Intel CPUs have a backdoored deterministic generator that just pretends to be secure.

                • Unfortunately, no. Intel CPUs have a backdoored deterministic generator that just pretends to be secure.

                  RDRAND is deterministic but it's seeded from a quantum-based entropy source. Yes, there were reports that the NSA had attempted to backdoor the deterministic part. Intel claims to have fixed it. Take from that what you will.

            • by sjames ( 1099 )

              And I'll bet that device cost a hell of a lot less and was far more reliable than any quantum computer likely to exist in the next 10 years.

              • by gweihir ( 88907 )

                Indeed. And the PN-junction generator was available for a while with dual source and conditioner in an USB stick for $50 or so. I cannot currently find it, apparently there was not enough demand.

                Using QCs to generate random numbers is a pure act of desperation intended to gloss over the fact that they are currently still not useful for anything and that this may never change.

                • by sjames ( 1099 )

                  Probably because so many CPUs and microcontrollers have built-in random number support now.

                  I would put quantum computers somewhere near Babbage's nightmare on the development timeline.

      • TFA is bad article, but it seems they did do something:

        As deterministic systems, classical computers cannot create true randomness on demand.

        Except that most of them already do this. Every major CPU on the market includes a true random number generator, implemented with a noisy diode. The result is true, quantum-mechanics derived, randomness. The output is biased, but that's okay, I imagine this quantum computer's output is also biased. But bias is very easy to correct for with any of many "whitening" techniques, the simplest of which is just to run the data through a good cryptographic hash function, feeding n bits of noise into the hash fun

        • by ceoyoyo ( 59147 )

          Except that most of them already do this.

          They don't. The paper is correct, you can't use a deterministic computer to generate random numbers. You can *measure* something random though, and you can stick that measuring apparatus on a die with a CPU.

          If you want to be rigorous, I think that's what the quantum computer is doing too. There's no randomness in the quantum computation, but there is in the measurement at the end.

          The key here seems to be that you can use the quantum computation + measurement combo to

          • You're technically correct, of course, but my point is that anyone trying to argue that this research is useful in practice is clueless about how true random numbers are generated every day on real devices, billions of them. Probably tens of billions.
            • by ceoyoyo ( 59147 )

              Nobody is clueless about how random numbers are generated, except probably some commenters here.

              The paper is pretty clear about what they're proposing. It is not "generating random numbers." It is generating random numbers with very specific properties. That is scientifically interesting. Whether it's practically interesting depends on the situation. They've proposed some fairly silly ones, like lotteries. There might be some more practical ones.

      • by ceoyoyo ( 59147 )

        These measures are unwieldy, difficult to scale and lack rigorous guarantees

        They've addressed the "rigorous guarantees" part. It's less trivial than the summary sounds, but it still seems like pounding in a nail with an aircraft carrier.

    • by sjames ( 1099 )

      Intel and AMD processors as well as many microcontrollers have a built in RNG. I know a number of Intel flash chips used to include a RNG as a sort of bonus feature.

    • Ah yes, but does your RNG include the word "quantum" so it gets press coverage and investment?
  • Complete bullshit (Score:5, Insightful)

    by gweihir ( 88907 ) on Wednesday March 26, 2025 @09:40PM (#65261877)

    Reverse a PN-junction, apply about 20V via a resistor and you get something like 50% quantum noise. Crypto-hash together generously, and what you get is no worse than the "breakthough" lie here claims. Cost? Say $20 + computer.

    Incidentally, you do not need random numbers for cryptography. All you need is numbers an attacker cannot predict.

    • Tundra's RBG1210 module was said to use a reverse biased diode, and generated around 20 kbits/sec. The 1/0 output still required de-biasing.
      • by gweihir ( 88907 )

        Any kind of physical mechanism has bias. This "quantum experiment" needs it too. It is however very easy to do.

        As to bandwith, here is an application note from 2004 to get 100MHz high-quality zener noise for cheap:
        https://www.analog.com/en/reso... [analog.com]

        The only thing you need to know is that the sweet-spot for maximum quantum noise is 5.6V. Not that it really matters, thermal noise is more than good enough for even long-term crypto key generation.

    • You have demonstrated clearly that TF is useless as a scientific breakthrough if they can't articulate a real, new use case.

    • Really all you need it a resistor, great source of white noise

      • by gweihir ( 88907 )

        Teachnically, that is not quantum noise, so not "true random". In actual reality, the resistor is complex and unstable enough to produce high-quality "secure" noise basically forever. And remember, it does not need to be "true random" anyways. That is just marketing bullshit.

        • by sinij ( 911942 )
          The key difference between IID (~true random) and non-IID (~pseudorandom) is that for non-IID there exists theoretical amount of compute that can be used to break it. The appeal of using true random, if it is even possible, is that it will be future-proof into heat death of universe.
    • Exactly. I was going to say a Zener diode also works well, and that some early cpus offered junction RND breakdown noise, until Intel and the like moved to black boxes. And that OpenBSD has some OS tricks to make replay attacks real hard.
      • by gweihir ( 88907 )

        A Zener diode is just a reversed PN junction with a selected drop voltage and that makes the design a lot simpler. But a Zener diode is not designed for low capacity of that reversed junction. Hence what approach you want to use depends. For high bandwidth (GHz), you may want to put a lot of current though this and a Zener diode is designed for that (and for cooling that junction specifically), while a NPN transistor EB-junction is not and is operated out of spec.

        But it really is not hard to do and the nois

    • Reverse a PN-junction, apply about 20V via a resistor and you get something like 50% quantum noise. Crypto-hash together generously, and what you get is no worse than the "breakthough" lie here claims. Cost? Say $20 + computer.

      That's a lot of text written just to tell us you didn't read or understand what they did or why they did it. Hint: Your solution doesn't meet any of the requirements they were going for.

      But hey you were quick to post, and quick to ignorantly shit on other people's work so your job is done right?

      • If your local random number consumer is physically compromised, you're screwed regardless. If it isn't, circuitry to provide any amount of random numbers is trivial.

        A certified remote RNG is a solution looking for a problem which doesn't exist.

        • by Anonymous Coward
          Have you never heard of a lottery? The way we do lotteries now is we have a bunch of balls bouncing around in a chamber and they are picked one by one and they have an accountant standing by to affirm that the machine is actually making random numbers. How do you know it's happening live? Because your local TV station is showing the feed and you're trusting that they're being honest and not showing you something taped a few hours ago. That sortof works but it's putting a lot of trust into human factors, AND
        • Tell us you don't know about cryptography without telling us. Certified randomness has been an area of study for a while now. You not knowing what problems it solves doesn't make the problem disappear.

      • by gweihir ( 88907 )

        As usual, you are without insight and aggressive about it. Does that work out for you in life?

        1. Generating noise with a QC mechanism is totally insane. That PN-junction process has been known for half a centory, it is reliable, well researched, well tested and very cheap and easy made redundant.
        2. Remote randomness generation ia about the most stupid thing you can do. It adds a ton of attack vectors. And suddenly you have to authenticate and encrypt the transfer of random data which you are going to use fo

      • Tell us more about how amazing it is that they have managed to create an exquisitely more expensive solution than the very well working solutions we already have, which are numerous.

        • by gweihir ( 88907 )

          And that nicely sums it it.

        • Oh please tell us what numerous solutions we have for certified randomness? Because up until this point it's been a theoretical concept. Let me guess, you also don't understand what the article is talking about and are instead thinking about true randomness, which isn't the same thing. Hint: This isn't a story about generating random numbers, any idiot can do that. Go read the links in the summary.

    • by AmiMoJo ( 196126 )

      It's not the generator that is novel, it's the fact that they can mathematically prove that the output is truly random and resilient against known attacks.

      • by gweihir ( 88907 )

        The "mathematical proof" goes a bit like this: Assume we have a process generating true randomness, we can proof that we can build a process on tiop of that that can generatre true randomness". Or in other words, complete bullshit. Incidentally, the same "mathemtical proof" can be built for that reversed PN junction, which happens to be an approach that is about half a centiory old and very well understood and very cheap to implement.

        • by AmiMoJo ( 196126 )

          So why don't you prove that your PN junction is resistant to known attacks and rake in the cash? You can't because, as you pointed out, it's not pure quantum noise.

          • by gweihir ( 88907 )

            Ah, do you know how randomness and entropy works? Because it seems to me you do not. Quantum noise is not special. If you have 50%, hash two bits together with any modern crypto hash and you have as close to 100% that the difference is meaningles. Yes, you have the thermal noise in there in addition, but 100% unpredictable is 100% unpredictable and this is not a case where adding anything can _degrade_ the quality. It is a bit special and non-intuitive in that.

            Anybody with some actual clue is using that PN

            • by AmiMoJo ( 196126 )

              If only it was that simple. Poorly designed PN junction based systems will fail tests like Diehard and the NIST suite.

              • by gweihir ( 88907 )

                Nobody sane uses the raw data. It is not intended to be used that way at all. Using it wrong will obviously result in undesirable effects.

                • by AmiMoJo ( 196126 )

                  Even the conditioned output can experience bias with PN junctions. But that's missing the point - can you mathematically prove that *your* PN junction design and whitening is truly random? You can't, it's impossible because it depends on the physical properties of the circuit, and outside influences.

                  • by gweihir ( 88907 )

                    That is just nonsense. Properly conditioned output does not have bias. Period. This has been a solved problem for a few decades now.

                    And the point is not that I cannot "mathematically" prove that a PN junction design generates "true" randomness. (Incidentally, I never claimed I could...) The point is that _nobody_ can prove any such thing for any physical design, including the one from the story. People can lie about that though and that has happened here.

                    • by AmiMoJo ( 196126 )

                      You think it doesn't have bias, but you can't mathematically prove it.

                      There is a reason why PN junction and most other hardware RNGs have a monitoring system - they are known to fail and introduce non-randomness, so that condition must be checked for.

                    • by gweihir ( 88907 )

                      Please stop torturing the facts. They will not start to agree with you. You are dead wrong here.

        • by ceoyoyo ( 59147 )

          That's not the proof they appear to be talking about.

          If I hand you a bunch of numbers you can't prove they're random. I might have generated them with a diode, or by measuring the spontaneous emission of alpha particles from my smoke detector, or by carefully generating them in a known pattern.

          The thing quantum computers are good at is sampling from controllable distributions. Distributions that are extremely difficult to produce any other way. So by giving you numbers that are so distributed you can verify

          • by gweihir ( 88907 )

            So by giving you numbers that are so distributed you can verify that I did in fact use a quantum computer to produce them and they are therefore genuinely random.

            No. You cannot. Incidentally, you just said as much yoruself. You cannot from any numbers verify that they match any distribution. You cannot from any numbers verify they were generated in a specific way. What you need to do here is ensure security (or distribution) by construction. And you do that yourself, not from some bizarre over-the-net service.

            In actual reality, you just start with an unform distribution and then approximate whatever distribution you want to the precision you want it.

    • by sinij ( 911942 )

      Incidentally, you do not need random numbers for cryptography. All you need is numbers an attacker cannot predict.

      You just described security by obscurity. One of the consequence of Kerckhoffs's principle [wikipedia.org] is that only random numbers can be unpredictable.

    • There's a company in Cambridge, UK that says that normal random numbers top out at 0.5 on some scale or other (I forget the details). They have a 'quantum' solution that can run on an ordinary computer, which produces numbers more 0.99 randomness. These guys getting 0.99999 or even 1.0 seems like it's a theoretical win, rather than an actual one.

      • by gweihir ( 88907 )

        That is complete nonsense. You cannot get more than 1 bit/bit in entropy. If you have less, just hash a few bots together using any modern crypto-hash and you get the max or as good as.

    • Isn't the point of this that the generated numbers are mathematically verified to be unpredictable by the person requesting them? Given that we've seen tons of predictable "random" numbers used in processes leading to all kinds of vulnerabilities, the ability of a 3rd party to mathematically verify they are actually unpredictable seems very valuable.
      • by gweihir ( 88907 )

        No. That marketing-nonsense. You _cannot_ "mathematically" verify any property of physical reality. Not possible. Whenever somebody tells you their product is "mathematically proven to xyz", they are lying to you to make their product sound better than it is.

        Incidentally, what you need is "unpredictable" for possible attackers. Also, even simple thermal noise (just read from a soundcard and hash, say, 100:1) is unpredictable in practice for anybody, even the person recording it. And no, we do not have seen

  • You can create quantum rng by shining a lazer on an angled peice of glass. The photon has a chance to go reflect and chance to refract. You can even buy these as PCIE cards that can produce hundreds of megabits per second for a few hundred $$$. This is what poker gaming sites etc use.
    • by OrangAsm ( 678078 ) on Thursday March 27, 2025 @12:29AM (#65262107)

      Why do you hate cats?

    • Exactly.

      IDQ for example has been offering photon-based quantum cryptography devices commercially for...a little over 20 years now.
      https://en.wikipedia.org/wiki/... [wikipedia.org]

      So TFA boils down to nothing but marketing BS. "Look, this is a breakthrough since it is the first time WE did it!"

    • by gweihir ( 88907 )

      Too much effort and too unreliable. The Zener-Effect is about half quantum tunneling noise at 5.6V. Cheap, reliable, easy. Here is a circuit for >100Mhz at https://www.analog.com/en/reso...

      • by lurcher ( 88082 )

        The problem that comes to mind is you will need some way to guarantee that the signal is not being influenced by an external EM field.

        • The problem that comes to mind is you will need some way to guarantee that the signal is not being influenced by an external EM field.

          Interesting. Noisy diode-based TRNGs are found in approximately all modern CPUs. Has any researcher been able to demonstrate the ability to alter the output by applying EM fields?

          • by gweihir ( 88907 )

            Interesting. Noisy diode-based TRNGs are found in approximately all modern CPUs. Has any researcher been able to demonstrate the ability to alter the output by applying EM fields?

            Not true. These generators are typically oscillator-based. These may be susceptible to a very expensive, very tricky and very obvious EMI attack. Or not.

            • Interesting. Noisy diode-based TRNGs are found in approximately all modern CPUs. Has any researcher been able to demonstrate the ability to alter the output by applying EM fields?

              Not true. These generators are typically oscillator-based. These may be susceptible to a very expensive, very tricky and very obvious EMI attack. Or not.

              Cite?

              I've had conversations with CPU security engineers at most of the major SoC vendors for ARM (and now RISCV) chips, and they disagree with you.

        • by gweihir ( 88907 )

          Actually, you do not. You just generously overestimate the randomness input when hash-compressing it. An externel EMI cannot "drone out" the tunneling noise. This is a randomness source, not an oscillator.

  • What do a bunch of fatcat investment bankers know about quantum computing?
  • Thanks for including the link to the research paper in the summary!

  • Feel free to use as appropriate.

    There are no "truly random" numbers, in quantum or anywhere.

    The act of observation entagles the observed quantity to the rest of the universe. Whatever number the rng spits out is thus by definition correlated to something else somewhere else.

    • by gweihir ( 88907 )

      There are no "truly random" numbers, in quantum or anywhere.

      The act of observation entagles the observed quantity to the rest of the universe. Whatever number the rng spits out is thus by definition correlated to something else somewhere else.

      Possibly. At the very least this effect would have to be disproven to make any claims of "true" randomness. To the best of my knowledge, quantum physics glosses over this little detail at this time. Or rather when you ask an actual expert, the "true" vanishes and they say "unpredictable" and that is a whole different thing. Also, for all known applications, "unpredictable" is just fine.

  • Random (Score:5, Funny)

    by RitchCraft ( 6454710 ) on Wednesday March 26, 2025 @10:45PM (#65261989)

    Whenever I want a random number I just add up the number of working ice cream machines at McDonalds as shown at McBroken.com. That number is truly random at any given point! No quantum this or that needed.

    • Ahhh and you've punked yourself. There's nothing random about the ice cream machines at McDonalds. In fact you'll find they only ever generate quite high numbers. You can't even achieve binary randomness with one. If I compare my local McDonalds to a coin toss one would assume they only compare if I had a double-headed coin. :-)

    • by Snard ( 61584 )
      It doesn't seem to me that an integer between 0 and 2 has enough range for most applications.
  • Their accounting can certify that for a 3 year time you can math. Then pay again and get the certificate renewed, cause you know information rots and gets sucked into black hole in your backyard when you offwork too much. Math does not certify anybody. Math proves, verifies. But proving something truly random would be a neverending process. It is probable that their level of randomness is more random than something else, but we need some numbers. No numbers provided. And the applications are laughable, ther
    • by gweihir ( 88907 )

      Actyally, it is worse: They claim they can mathematically prove some property of a physical object. That happens to be impossible. With some mental judo, you can turn that "imopossible" into "meaningless" instead.

  • Just measure the quantum foam on a cappuccino. (What's that?) I mean, in a vacuum. A very cool, I mean, a very cold qu-bit computer is not required.

    Quantum random numbers [anu.edu.au]

  • xkcd [xkcd.com] already solved this problem.
  • As usual TFA is not mentioning the important information: which numbers were generated? Was 4 part of them? I have heard it was a true random number, I'd really like a confirmation!

  • ...certified xkcd [xkcd.com] random numers generator.
  • People used Geiger counters to generate random numbers decades ago, and sensing radiation is based on quantum effects.
  • An algorithm for random numbers? Isn't that an oxymoron?
  • Back in the early 2000's they had a "photon splitter" PCI or PCI-E card that just sent photons left or right. It was verified to be 100% random.
  • Poe's law notwithstanding:

    Don't you believe it! They are not "truly random." The universe was created by "Intelligent Design." God has a plan.

    It's a trap! The "devil" is in the details.

  • and it's rather worthless. In a nutshell, they can prove that a quantum computer was used to generate a specific set of random numbers. No problem with that. But, there is no guarantee that those random numbers weren't copied and sent to another party. So, for crypto purposes, the resulting random numbers are worthless.

  • So...everything up to now was a lie?
  • I have kinda thought about a similar idea where to validate randomness, you simply take longer and longer sequences that become harder to correctly fake.

    If you have a "real" vs "fake" coin flipper that tells you the results of flips, you can detect which is random somewhat easily over time.

    The real random will not have statistically significant groups when you start counting occurrences of groups. Such as how many times you see "heads heads tails" and all the combinatorics of 3-flip occurrences. The real fl

  • ...ask me if I give a shit.
  • Maybe this is a first for a quantum computer, but true random quantum-generated numbers are not new. idquantique makes quantum random number generators that fit in a PCIe slot. I own one.

Is it possible that software is not like anything else, that it is meant to be discarded: that the whole point is to always see it as a soap bubble?

Working...