Oh gawd, more nonsense passed off as game changing.
1st, let's start with this. There is one, and only one difference between electron/transistor computing and light/quantum computing - efficiency. At the end of the day, you can't do anything with a quantum computer that you couldn't do with a punch card computer - the only difference is how efficiently you could do it.
In short, transistors have 2 states. In a quantum computer, each transistor-like element could have more than two states. Ergo, you need many fewer transistor-like elements in a quantum computer than you would in a regular computer.
So, no need to get too excited - efficiency will go up and you'll be able to do . . . whatever . . . more quickly.
Have a need to have instant-on computers? They'll be here.
No lag in your photoshop? Done.
And so on.
Regarding encryption, there is only one thing that the non-cryptologist needs to get his arms around to understand the power of encryption.
There is a practical limit to cracking a password - that limit exists because it takes energy to "guess" at a password.
So, while it is theoretically true that a quantum computer operating at 100 times the speed of a Pentium 5 COULD be used to guess a 30 character password in a 1024 bit RSA system, how much energy will that consume?
Point is, at some point of encryption, even if each "guess" only takes a bit of energy, the amount of energy required to guess the password is more than can be allocated.
Keeping it in perspective, energy required to crack a password increases exponentially as you add encryption bits.
For example - if you have a one digit code, it will require 10 guesses to crack, maximum (0-9). But if you have a two digit code, then it's 100. Three digits is a 1,000, and so on. Add enough digits, and you become, within practical limits, unbreakable.
To conclude, unless they figure out how to perform computations using no energy, encryption technology will become bulletproof in the near future, and I'd argue that some applications are, for practical purposes, already bulletproof, notwithstanding any gains in computing efficiency.
See, for example, this link (FBI couldn't break encryption after 18 months of trying - gotta figure they'll make encryption illegal soon):
http://www.theregister.co.uk/2010/06/28 ... _lock_out/