LmCast :: Stay tuned in

The IBM scientist who rewrote the rules of information just won a Turing Award

Recorded: March 22, 2026, 10 p.m.

Original Summarized

The IBM scientist who rewrote the rules of information just won computing’s highest prize

Quantum

Compute and servers

Research





The IBM scientist who rewrote the rules of information just won computing’s highest prize

By

Sascha Brodsky

Published 19 March 2026

One afternoon in October 1979, Gilles Brassard was swimming outside a beachfront hotel in San Juan, Puerto Rico, when a stranger swam up to him and changed the course of his career.
Without so much as an introduction, the man began describing a way to create currency that could not be forged, based on the laws of quantum physics. “I was trapped, so I listened politely,” Brassard later recalled.
The stranger was Charles H. Bennett, a physicist from IBM Research. The idea he pitched in that ocean would eventually become the only practical method for sharing encryption keys with security guaranteed not by mathematical complexity but by the laws of physics itself.
As governments and banks race to harden their cryptosystems as we enter the quantum age, the method Bennett proposed is looking less like a theoretical curiosity and more like a necessity. The two continued to build some of the underpinnings of quantum computing, and nearly half a century after that swim, the Association for Computing Machinery has named Bennett a co-recipient of the 2025 A.M. Turing Award, considered the Nobel Prize of computer science, together with Brassard, now a professor at the Université de Montréal. The USD 1 million prize marks the first time the Turing Award has recognized quantum research.
“Most of the applications,” Bennett told IBM in an interview, “are probably yet to be discovered.”
The field Bennett helped build rests on the idea that information follows physical rules —and that can include quantum physics. For most of the 20th century, as Bennett has described it, scientists treated information as abstract, a pattern independent of whatever physical medium carried it. Rolf Landauer, an IBM physicist who would recruit Bennett to the company, challenged that in a provocative 1961 paper, arguing that information is fundamentally physical and obeys the laws of thermodynamics.
Building on that work, Bennett showed in a 1973 paper that computation could in principle be carried out reversibly, run forward and then backward without any net energy cost, revealing a deep connection between physics and information that most scientists had not seen.

Research newsletter

Never miss a tech breakthrough

Discover emerging research in AI, quantum, hybrid cloud, and more from IBM’s experts with the monthly Future Forward newsletter. See the IBM Privacy Statement.

Thank you! You are subscribed.

Your subscription will be delivered in English. You will find an unsubscribe link in every newsletter. You can manage your subscriptions or unsubscribe here. Refer to our IBM Privacy Statement for more information.

The dream you can’t describe

One strange property of quantum information is that it cannot be copied.
Classical information can be duplicated perfectly and infinitely. Copy a file, and you have two identical files. At the quantum level, this is false. A quantum state is disturbed the moment you try to measure or copy it. Bennett has a way of explaining this that tends to stop people cold.
“Quantum information,” he  said to IBM, is “ like the information in a dream. As soon as you start trying to tell somebody about your dream, you begin to forget the dream, and you only remember what you said about it. The public version can be copied, but it’s not the same as the dream.”
What Bennett and his collaborators grasped was that this limitation was actually a tool. If quantum information cannot be copied, it cannot be secretly copied either. An eavesdropper who intercepts a quantum-encoded message necessarily disturbs it, leaving a trace. That is the premise behind quantum cryptography, which is theoretically unbreakable regardless of the computing power brought against it.
As Bennett later recalled it, that conversation was where the premise became a collaboration.
“Imagine my surprise when this complete stranger swims up to me and starts telling me, without apparent provocation on my part, about Wiesner’s quantum banknotes,” Brassard later wrote. “This was probably the most bizarre, and certainly the most magical, moment in my professional life.”
By 1984, the two had published the BB84 protocol. Alice and Bob, as cryptographers call the communicating parties, could establish a secret key by exchanging single photons, the smallest possible units of light. Any eavesdropper who intercepted them would inevitably disturb the photons, triggering an alert.
Digital security, as Bennett and Brassard wrote, held “even against an opponent with superior technology and unlimited computing power.” BB84 attracted little notice at first. The internet was emerging simultaneously, and the mathematical systems securing it seemed, for the moment, sufficient.
That changed in 1994, when mathematician Peter Shor, then at Bell Labs, showed that a quantum computer could crack the mathematical locks protecting most internet communications. Suddenly the method Bennett and Brassard had developed, by then used experimentally over distances of up to 1,200 kilometers between a satellite and Earth, according to Britannica, looked urgent.
The first working demonstration had come years earlier. In 1989, according to IBM, Bennett built the first quantum cryptography machine in his office at IBM, a two-meter-long device assembled from mirrors, polarizers and photon detectors, with software written by Brassard and his students. Four years after that came a paper introducing quantum teleportation: not the science-fiction kind, but the transfer of a quantum state from one location to another using entanglement, a phenomenon in which measuring one particle instantly affects another regardless of the distance between them.
Still keeping an office at IBM, where Landauer recruited him more than 50 years ago, Bennett is the seventh IBM-affiliated researcher to receive the Turing honor.
Jay Gambetta, Director of IBM Research and an IBM Fellow, said the legacy of that early work runs directly into what the company’s quantum teams are building now.
“When many researchers saw quantum mechanics as a problem to solve for shrinking electronic components rather than a tool to be developed, he recognized the same physics could become a powerful new way to process and transmit information,” Gambetta said. “That insight, and the decades of work that followed, helped lay the intellectual foundation for one of the most important scientific and technological frontiers of our time.”

Sascha Brodsky

Staff Writer
IBM

Link copied

eBook

Transitioning to Quantum-Safe Cryptography: A Practical Guide

Get an in-depth look at quantum cryptography challenges and how enterprises can prepare today. This IBM Redbook explores the risks posed by quantum computing and provides step-by-step guidance on deploying quantum-safe cryptographic techniques on IBM Z.

Read the ebook

Related

IBM releases a blueprint for quantum-centric supercomputing




Resources

IBV Report

The enterprise in 2030: Engineered for perpetual innovation

Discover our five predictions about what will define the most successful enterprises in 2030, and the steps leaders can take to gain an AI-first advantage.

Read the report

Insights

Roadmap to the quantum future

Explore IBM's quantum computing roadmap, which charts advancements in quantum processors, software and scaling technologies. See how quantum breakthroughs today are driving the future of computation, from cutting-edge research to scalable commercial applications.

Explore quantum technologies

Case studies

IBM Quantum case studies: Solving industry challenges with quantum computing

Explore how leading companies such as Boeing, Mercedes-Benz, ExxonMobil and CERN are using IBM Quantum® technology to tackle complex problems. Discover real-world applications that are shaping the future of industries with quantum technology.

Read the case studies

Webinar

The future of cryptography: How to prepare for the quantum era

Watch this on-demand webinar to explore the evolving cryptography landscape, learn about crypto-agility and see how IBM is helping enterprises protect sensitive data against quantum threats.

Watch on demand

Insight

Quantum workflows on Red Hat OpenShift

Learn how to integrate quantum computing with Red Hat® OpenShift® and Qiskit® for cutting-edge workflows. Watch our demos and discover how IBM Quantum and Kubernetes can transform your development environment.

Read the insight

Insight

Explore the latest quantum advancements and tools

Discover groundbreaking quantum metrics, tools such as the Qiskit Code Assistant, and dive into the future of quantum computing with Europe’s first IBM Quantum Data Center and more.

Read the insight



Related solutions




Quantum-safe on IBM Z

Quantum-safe security for IBM Z uses cryptographic methods to protect data from quantum computer threats.

Explore IBM Quantum Cryptography





IBM Quantum computing solutions

Bringing useful quantum computing to the world through Qiskit Runtime and IBM Quantum Safe.

Explore Quantum computing solutions





IBM Quantum Safe services

Safeguard your enterprise against post-quantum cryptography risks with IBM Quantum Safe transformation services.

Explore Quantum cryptography services


Take the next step

Strengthen your cryptographic defenses against future quantum threats with IBM’s quantum-safe solutions.

Explore Quantum-Safe Cryptography

Discover IBM Quantum Technology

Charles H. Bennett, alongside Gilles Brassard, has been awarded computing’s highest honor, the A.M. Turing Award, marking the first time the prize has recognized quantum research. This recognition stems from Bennett’s pioneering work in quantum information theory and cryptography, beginning with a chance encounter in 1979 when he discussed a novel approach to creating unforgeable currency with IBM physicist Charles H. Bennett. This initial conversation led to the development of the BB84 protocol, a method for securely exchanging encryption keys based on the principles of quantum physics rather than complex mathematical calculations. Bennett’s research, often in collaboration with figures like Rolf Landauer and Peter Shor, fundamentally shifted the understanding of information, demonstrating that it is intrinsically linked to physical reality and subject to the laws of thermodynamics. This challenged the preceding view that information was an abstract concept independent of its carrier. The BB84 protocol, developed in 1984, established a foundational cryptographic method that remains relevant in the face of emerging threats posed by quantum computing. Subsequently, Bennett’s work led to the creation of the first quantum cryptography machine in 1989, and further developed quantum teleportation, which utilizes entanglement to transfer quantum states. The significance of these developments became increasingly apparent in 1994 when Shor’s work demonstrated the potential for a quantum computer to break existing cryptographic algorithms, highlighting the urgency of quantum-resistant solutions. Bennett’s contributions have laid the groundwork for “quantum-safe” cryptography, a field crucial to mitigating the risks posed by powerful quantum computers. Jay Gambetta, Director of IBM Research, emphasizes Bennett’s insight in recognizing quantum mechanics as a tool for information processing, a perspective that has directly influenced IBM’s current endeavors in quantum computing. The recognition of Bennett and Brassard reflects a pivotal moment in the history of computing, transforming the landscape of information security and establishing a crucial foundation for future advancements in quantum technology.