Download presentation

Presentation is loading. Please wait.

Published byShirley Satter Modified over 2 years ago

1
**An Introduction to Quantum Computing Cryptography and Information**

The Next Generation of Computing Devices? A brief review Meysam Madani Sharif University of Technology

2
**Quantum Mechanic A Review**

Quantum Computation Quantum Algorithms and its Implementations Quantum Cryptography Quantum Information Meysam Madani- Meysam Madani - An Introduction to Quantum Computing Cryptography and Information

3
**Quantum Mechanic Review**

Quantum Computation Quantum Algorithms and Implementations Quantum Cryptography Quantum Information Meysam Madani- Meysam Madani - An Introduction to Quantum Computing Cryptography and Information

4
Quantum Mechanics Quantum mechanics is the body of scientific principles that explains the behaviour of matter and its interactions with energy on the scale of atoms and subatomic particles. Classical physics explains matter and energy at the macroscopic level of the scale familiar to human experience On the other hand, at the end of the 19th century scientists discovered phenomena in both the large (macro) and the small (micro) worlds that classical physics could not explain. Coming to terms with these limitations led to the development of quantum mechanics, a major revolution in physics. Meysam Madani - An Introduction to Quantum Computing Cryptography and Information

5
Quantum Mechanic Ludwig Eduard Boltzmann suggested in 1877 that the energy levels of a physical system, such as a molecule, could be discrete. In 1900, the German physicist Max Planck reluctantly introduced the idea that energy is quantized in order to derive a formula for the observed frequency dependence of the energy emitted by a black body, called Planck's Law, I(ν,T) is the energy per unit time , h is the Planck constant; c is the speed of light in a vacuum; k is the Boltzmann constant; ν is the frequency of the electromagnetic radiation Ludwig Eduard Boltzmann Max Planck Meysam Madani - An Introduction to Quantum Computing Cryptography and Information

6
Quantum Mechanic Ștefan Procopiu in 1911—1913, and subsequently Niels Bohr in 1913, calculate the magnetic moment of the electron, which was later called the "magneton"; Subsequently made possible for both the magnetic moments of the proton and the neutron . In 1905, Einstein explained the photoelectric effect by postulating that light, or more generally all electromagnetic radiation, can be divided into a finite number of "energy quanta" that are localized points in space. These energy quanta later came to be called "photons“ It effectively solved the problem of black body radiation attaining infinite energy, Niels Bohr Albert Einstein Meysam Madani - An Introduction to Quantum Computing Cryptography and Information

7
Quantum Mechanic In 1924, Louis de Broglie put forward his theory of matter waves by stating that particles can exhibit wave characteristics and vice versa. In 1925, when the German physicists Werner Heisenberg and Adam Jonathon Davis developed matrix mechanics Erwin Schrödinger invented wave mechanics and the non- relativistic Schrödinger equation as an approximation to the generalized case of de Broglie's theory. Schrödinger subsequently showed that the two approaches were equivalent. Heisenberg formulated his uncertainty principle in 1927, Werner Heisenberg Erwin Schrödinger Meysam Madani - An Introduction to Quantum Computing Cryptography and Information

8
Quantum Mechanic Paul Dirac began the process of unifying quantum mechanics with special relativity by proposing the Dirac equation for the electron. The Dirac equation achieves the relativistic description of the wavefunction of an electron that Schrödinger failed to obtain. It predicts electron spin and led Dirac to predict the existence of the positron. He also pioneered the use of operator theory, including the influential bra-ket notation. John von Neumann formulated the mathematical basis for quantum mechanics as the theory of linear operators on Hilbert spaces Paul Dirac John von Neumann Meysam Madani - An Introduction to Quantum Computing Cryptography and Information

9
Photons Albert suggested that quantization was not just a mathematical trick: the energy in a beam of light occurs in individual packets, which are now called photons. The energy of a single photon is given by its frequency multiplied by Planck's constant: For centuries, scientists had debated between two possible theories of light: was it a wave or did it instead comprise a stream of tiny particles? The photoelectric effect puzzling wave theory. Meysam Madani - An Introduction to Quantum Computing Cryptography and Information

10
**The photoelectric effect**

In 1887 Heinrich Hertz observed that light can eject electrons from metal. In 1902 Philipp Lenard discovered that the maximum possible energy of an ejected electron is related to the frequency of the light, not to its intensity. Meysam Madani - An Introduction to Quantum Computing Cryptography and Information

11
**Quantum Mechanics Measurement**

Let 𝜑(𝑥,𝑡) be the wave function where |𝜑 𝑥,𝑡 | 2 be the probability with particle is in position 𝑥 at time 𝑡. Where is the particle at time 𝑡−𝑒? Meysam Madani - An Introduction to Quantum Computing Cryptography and Information

12
**Heisenberg - Quantum Mechanics**

𝝈 𝒙 𝝈 𝒑 ≥ 𝒉 𝟐 Position or velocity: ? =2 Position: 5 =? Meysam Madani - An Introduction to Quantum Computing Cryptography and Information

13
**Young Double Slit Interference**

Meysam Madani - An Introduction to Quantum Computing Cryptography and Information

14
**Young Double Slit Interference**

Meysam Madani - An Introduction to Quantum Computing Cryptography and Information

15
**Young Double Slit Interference**

Meysam Madani - An Introduction to Quantum Computing Cryptography and Information

16
Photon Meysam Madani - An Introduction to Quantum Computing Cryptography and Information

17
Photon Meysam Madani - An Introduction to Quantum Computing Cryptography and Information

18
Photon Meysam Madani - An Introduction to Quantum Computing Cryptography and Information

19
Photon Meysam Madani - An Introduction to Quantum Computing Cryptography and Information

20
Photon Meysam Madani - An Introduction to Quantum Computing Cryptography and Information

21
**Photon Output B.NOT.B=Id B Input NOT B**

Meysam Madani - An Introduction to Quantum Computing Cryptography and Information

22
**Quantum Mechanic Review**

Quantum Computation Quantum Algorithms and Implementations Quantum Cryptography Quantum Information Meysam Madani - An Introduction to Quantum Computing Cryptography and Information

23
Models of Computation Richard Feynman was the first to suggest, in a talk in 1981, that quantum-mechanical systems might be more powerful than classical computers. Feynman asked what kind of computer could simulate physics and then argued that only a quantum computer could simulate quantum physics efficiently. He focused on quantum physics rather than classical physics because, as he colorfully put it, nature isn't classical, dammit, and if you want to make a simulation of nature, you'd better make it quantum mechanical Around the same time, in “Quantum mechanical models of Turing machines that dissipate no energy“ Paul Benio demonstrated that quantum-mechanical systems could model Turing machines. In other words, he proved that quantum computation is at least as powerful as classical computation. But is quantum computation more powerful than classical computation? Meysam Madani - An Introduction to Quantum Computing Cryptography and Information

24
Models of Computation David Deutsch explored this question and more in his 1985 paper “Quantum theory, the Church Turing principle and the universal quantum computer“ First, he introduced quantum counterparts to both the Turing machine and the universal Turing machine. He then demonstrated that the universal quantum computer can do things that the universal Turing machine cannot, including generate genuinely random numbers perform some parallel calculations in a single register Perfectly simulate physical systems with finite dimensional state spaces. In 1989, in “Quantum computational networks", Deutsch described a second model for quantum computation: quantum circuits. Meysam Madani - An Introduction to Quantum Computing Cryptography and Information

25
Models of Computation Deutsch demonstrated that quantum gates can be combined to achieve quantum computation in the same way that Boolean gates can be combined to achieve classical computation. He then showed that quantum circuits can compute anything that the universal quantum computer can compute, and vice versa. Andrew Chi-Chih Yao picked up where Deutsch left off and addressed the complexity of quantum computation in his 1993 paper “Quantum circuit complexity“ Specifically, he showed that any function that can be computed in polynomial time by a quantum Turing machine can also be computed by a quantum circuit of polynomial size. This finding allowed researchers to focus on quantum circuits, which are easier than quantum Turing machines. David Deutsch Andrew Chi-Chih Meysam Madani - An Introduction to Quantum Computing Cryptography and Information

26
Models of Computation Also in 1993, Ethan Bernstein and Umesh Vazirani presented ”Quantum complexity theory", in which they described a universal quantum Turing machine that can eficiently simulate any quantum Turing machine. Umesh Vazirani Ethan Bernstein Peter Shor Meysam Madani - An Introduction to Quantum Computing Cryptography and Information

27
**Quantum Algorithms and Implementations**

Quantum Mechanic Review Quantum Computation Quantum Algorithms and Implementations Quantum Cryptography Quantum Information Meysam Madani - An Introduction to Quantum Computing Cryptography and Information

28
Quantum Gates In 1995, a cluster of articles examined which sets of quantum gates are adequate for quantum computation so that is, which sets of gates are sufficient for creating any given quantum circuit. Adriano Barenco et al. “Elementary gates for quantum computation“, showed that any quantum circuit can be constructed using nothing more than quantum gates on one qubit and controlled exclusive-OR gates on two qubits. David DiVincenzo, “Two-bit gates are universal for quantum computation“ proved that two-qubit quantum gates are adequate. Adriano Barenco, David Deutsch, and Artur Ekert showed that quantum controlled-NOT gates and one-qubit gates are together adequate; Artur Ekert David DiVincenzo Meysam Madani - An Introduction to Quantum Computing Cryptography and Information

29
**Quantum Algorithms and Implementations**

In 1992, David Deutsch and Richard Jozsa coauthored “Rapid solution of problems by quantum computation". They presented an algorithm that determines whether a function f is constant over all inputs or balanced. The Deutsch-Jozsa algorithm was the first quantum algorithm to run faster than its classical counterparts. L. Chuang et al. detailed how they used bulk nuclear magnetic resonance techniques to implement a simplifed version of the Deutsch-Jozsa algorithm. In Quantum complexity theory“, Bernstein and Vazirani were the first to identify a problem that can be solved in polynomial time by a quantum algorithm but requires superpolynomial time classically. Daniel R. Simon introduced a problem that a quantum algorithm can solve exponentially faster than any known classical algorithm. Richard Jozsa Meysam Madani - An Introduction to Quantum Computing Cryptography and Information

30
**Quantum Algorithms and Implementations**

This research inspired Peter W. Shor, who then invented two quantum algorithms that outshone all others: polynomial-time algorithms for finding prime factors and discrete logarithms, problems widely believed to require exponential time on classical computers. Simon and Shor both presented their discoveries at the 1994, “Algorithms for quantum computation: Discrete logarithms and factoring“. Shor's factorization algorithm in particular heightened excitement and even generated anxiety about the power and promise of quantum computing. To pose a practical threat to RSA cryptography, Shor's algorithm must be implemented on quantum computers that can hold and manipulate large numbers, and these do not exist yet. Isaac L. Chuang and his research team made headlines when they factored the number 15 on a quantum computer with seven qubits. Isaac L. Chuang Meysam Madani - An Introduction to Quantum Computing Cryptography and Information

31
**PSPACE NP P BQP BPP BQP, BPP, Pspace, P, NP and …. Factoring Problem**

Quantum Polynomial Algorithms P Meysam Madani - An Introduction to Quantum Computing Cryptography and Information

32
**Quantum Algorithms and Implementations**

Lov K. Grover's algorithm for searching an unordered list, described in both “A fast quantum mechanical algorithm for database search" and “Quantum mechanics helps in searching for a needle in a haystack“, Unlike Shor's algorithm, Grover's algorithm solves a problem for which there are polynomial-time classical algorithms; however, Grover's algorithm does it quadratically faster than classical algorithms can. In 2003, Peter W. Shor addressed this stagnation in a short article called “Why haven't more quantum algorithms been found?“Shor oered several possible explanations, The possibility that computer scientists have not yet developed intuitions for quantum behavior. The article should be required reading for all computer science students, whose intuitionsare still being formed. Lov K. Grover Meysam Madani - An Introduction to Quantum Computing Cryptography and Information

33
**Candidates for Quantum Computers**

Superconductor-based quantum computers (including SQUID-based quantum computers) Ion trap-based quantum computers "Nuclear magnetic resonance on molecules in solution"-based “Quantum dot on surface"-based “Laser acting on floating ions (in vacuum)"-based (Ion trapping) "Cavity quantum electrodynamics" (CQED)-based Molecular magnet-based Fullerene-based ESR quantum computer Solid state NMR Kane quantum computer Meysam Madani - An Introduction to Quantum Computing Cryptography and Information

34
**Meysam Madani - An Introduction to Quantum Computing Cryptography and Information**

35
**Meysam Madani - An Introduction to Quantum Computing Cryptography and Information**

36
**Quantum Computing Problems**

Current technology ≈ 40 Qubit operating machine needed to rival current classical equivalents. 2. Errors Decoherence - the tendency of a quantum computer to decay from a given quantum state into an incoherent state as it interacts with the environment. Interactions are unavoidable and induce breakdown of information stored in the quantum computer resulting in computation errors. Error rates are typically proportional to the ratio of operating time to decoherence time operations must be completed much quicker than the decoherence time. Meysam Madani - An Introduction to Quantum Computing Cryptography and Information

37
**Quantum Mechanic Review**

Quantum Computation Quantum Algorithms and Implementations Quantum Cryptography Quantum Information Meysam Madani - An Introduction to Quantum Computing Cryptography and Information

38
Quantum Cryptography Shor's factorization algorithm has yet to be implemented on more than a few qubits. But if the efficient factorization of large numbers becomes possible, RSA cryptography will need to be replaced by a new form of cryptography, The cryptographic method in question is quantum key distribution, which was introduced in 1984 by Charles H. Bennett and Gilles Brassard in “Quantum cryptography: Public key distribution and coin tossing“ called BB84. In short, quantum key distribution is secure not because messages are encrypted in some difficult-to-decrypt way but rather because eavesdroppers cannot intercept messages undetected, regardless of computational resources. Gilles Brassard Charles H. Bennett Meysam Madani - An Introduction to Quantum Computing Cryptography and Information

39
Quantum Cryptography Quantum cryptography describes the use of quantum mechanical effects (in particular quantum communication and quantum computation) to perform cryptographic tasks or to break cryptographic systems. quantum key distribution and (hypothetical) use of quantum computers, For example, quantum mechanics guarantees that measuring quantum data disturbs that data; this can be used to detect eavesdropping in quantum key distribution. Position-based quantum cryptography Quantum commitment Quantum key distribution Post-quantum cryptography Meysam Madani - An Introduction to Quantum Computing Cryptography and Information

40
**Post-quantum cryptography**

In a predictive sense, quantum computers may become a technological reality; it is therefore important to study cryptographic schemes that are (supposedly) secure even against adversaries with access to a quantum computer. The need for post-quantum cryptography arises from the fact that many popular encryption and signature schemes RSA and its variants, and schemes based on elliptic curves, can be broken using Shor's algorithm for factoring and computing discrete logarithms on a quantum computer. Examples for schemes that are, as of today's knowledge, secure against quantum adversaries are McEliece schemes Lattice-based schemes Meysam Madani - An Introduction to Quantum Computing Cryptography and Information

41
**Quantum key distribution**

The most well known and developed application of quantum cryptography is quantum key distribution (QKD) QKD describes the process of using quantum communication to establish a shared key between two parties (usually called Alice and Bob) without a third party (Eve) learning anything about that key, even if Eve can eavesdrop on all communication between Alice and Bob. This is achieved by Alice encoding the bits of the key as quantum data and sending them to Bob, If Eve tries to learn these bits, the messages will be disturbed and Alice and Bob will notice. The security of QKD can be proven mathematically without imposing any restrictions on the abilities of an eavesdropper, something not possible with classical key distribution. Eve should not be able to impersonate Alice or Bob as otherwise a man-in-the-middle attack would be possible. Meysam Madani - An Introduction to Quantum Computing Cryptography and Information

42
**Quantum key Distribution Networks**

In 2004, the world's first bank transfer using quantum key distribution was carried in Vienna, Austria. Swiss company Id Quantique was used in the Swiss canton (state) of Geneva to transmit ballot results to the capitol in the national election occurring on October 21, 2007 The DARPA Quantum network, a 10-node quantum key distribution network, has been running since 2004 in Massachusetts, USA. The world's first computer network protected by quantum key distribution was implemented in October 2008, at a scientific conference in Vienna. SECOQC (Secure Communication Based on Quantum Cryptography) used 200 km of standard fibre optic cable to interconnect six locations across Vienna and the town of St Poelten located 69 km to the west. SwissQuantum network, installed in the Geneva metropolitan area in March 2009, was to validate the reliability and robustness of QKD in continuous operation over a long time period in a field environment. ran stably for nearly 2 years until the completion of the project in January 2011, confirming the viability of QKD as a commercial encryption technology. Tokyo QKD Network, UQCC2010, the network involves an international collaboration between 7 partners: NEC, Mitsubishi Electric, NTT and NICT from Japan, Toshiba (UK), Id Quantique (Switzerland) Meysam Madani - An Introduction to Quantum Computing Cryptography and Information

43
Quantum commitment Following the discovery of quantum key distribution and its unconditional security, researchers tried to achieve other cryptographic tasks with unconditional security. A commitment scheme allows a party Alice to fix a certain value (to "commit") in such a way that Alice cannot change that value while at the same time ensuring that the recipient Bob cannot learn anything about that value until Alice decides to reveal it. In the quantum setting, they would be particularly useful Crépeau and Kilian showed that from a commitment and a quantum channel, one can construct an unconditionally secure protocol for performing so-called oblivious transfer. Unfortunately, early quantum commitment protocols were shown to be flawed. In fact, Mayers showed that (unconditionally secure) quantum commitment is impossible: a computationally unlimited attacker can break any quantum commitment protocol. Meysam Madani - An Introduction to Quantum Computing Cryptography and Information

44
**Position-based quantum cryptography**

The goal of position-based quantum cryptography is to use the geographical location of a player as its (only) credential. For example, one wants to send a message to a player at a specified position with the guarantee that it can only be read if the receiving party is located at that particular position. It has been shown by Chandran et al. that position-verification using classical protocols is impossible against colluding adversaries(who control all positions except the prover's claimed position). Under the name of 'quantum tagging', the first position-based quantum schemes have been investigated in 2002 by Kent. A US-patent. After several other quantum protocols for position verification have been suggested in 2010. Buhrman et al. were able to show a general impossibility result:: using an enormous amount of quantum entanglement, colluding adversaries are always able to make it look to the verifiers as if they were at the claimed position. However, this result does not exclude the possibility of practical schemes in the bounded- or noisy-quantum-storage model (see above). Meysam Madani - An Introduction to Quantum Computing Cryptography and Information

45
**Quantum Cryptography manufacturers**

MagiQ Technologies id Quantique (http://www.idquantique.com/), Smart Quantum (http://www.smartquantum.com/). Meysam Madani - An Introduction to Quantum Computing Cryptography and Information

46
Stempunk BB84 C. Bennett, F. Bessette, G. Brassard, L. Savail, J. Smolin J. Cryptology 5, 3 (1992) Meysam Madani - An Introduction to Quantum Computing Cryptography and Information

47
Larger distances (up to 144km demonstrated) to test for satellite – earth links Munich/Vienna/Bristol: T. Schmitt-Manderbach et al., Phys. Rev. Lett. 98, (2007) Larger key rates: VCSEL lasers, detectors with better timing resolution, high clock rate ~Mbit/sec key rate (detector limited) NIST Gaithersburg: J.C. Bienfang et al. Optics Express 12, 2011 (2004 Quantum Cryptography Meysam Madani - An Introduction to Quantum Computing Cryptography and Information

48
**Quantum Mechanic Review**

Quantum Computation Quantum Algorithms and Implementations Quantum Cryptography Quantum Information Meysam Madani - An Introduction to Quantum Computing Cryptography and Information

49
Quantum Information Secure channels of communication are of course crucial, but security is not the only consideration in the transfer of information. Accordingly, quantum cryptography is just one of several topics in the burgeoning field of quantum information. Other topics include quantum error correction, fault-tolerant quantum computation, quantum data compression, and quantum teleportation. Information needs to be protected not just from eavesdroppers but also from errors caused by channel noise, implementation flaws, and, in the quantum case, decoherence. Peter W. Shor, a trailblazer not just of quantum algorithms but also of quantum error correction and fault-tolerant quantum computation, was the first to describe a quantum error-correcting method. In his 1995 article “Scheme for reducing decoherence in quantum computer memory“ he demonstrated that encoding each qubit of information into nine qubits could provide some protection against decoherence. Meysam Madani - An Introduction to Quantum Computing Cryptography and Information

50
Quantum Information At almost the same time but without knowledge of Shor's article, Andrew M. Steane wrote “Error correcting codes in quantum theory“which achieved similar results. Very shortly thereafter, Shor and A.R. Calderbank presented improved results in “Good quantum error-correcting codes exist“ Error is not the only thing information theorists strive to reduce; they also seek to reduce the space required to represent information. In this 1948 paper, Shannon showed that it is possible, up to a certain limit, to compress data without loss of information. Almost 50 years later, Benjamin Schumacher developed a quantum version of Shannon's theorem. Andrew M. Steane Benjamin Schumacher Meysam Madani - An Introduction to Quantum Computing Cryptography and Information

51
Quantum Information Not everything in quantum information theory has a precedent in classical information theory. In 1993, Charles H. Bennett et al. dazzled the scientific c community and delighted science fiction fans by showing that quantum teleportation is theoretically possible. They described how an unknown quantum state could be disassembled and then reconstructed perfectly in another location. The first researchers to verify this method of teleportation experimentally were Dik Bouwmeester et al., who reported their achievement in 1997 in “Experimental quantum teleportation" Dirk Bouwmeester Meysam Madani - An Introduction to Quantum Computing Cryptography and Information Claude E. Shannon

52
References Historical Bibliography of Quantum Computing, Jill Cirasella, Brooklyn College Library. Timeline of quantum computing, Wikipedia, Quantum cryptography, Wikipedia, Quantum key distribution, Wikipedia, MagiQ Technologies, Practical Quantum cryptography and possible attacks, Alex Ling, et. Al, NUS,. Meysam Madani - An Introduction to Quantum Computing Cryptography and Information

Similar presentations

OK

Development of renewable energy sources in Germany in 2011

Development of renewable energy sources in Germany in 2011

© 2017 SlidePlayer.com Inc.

All rights reserved.

Ads by Google

Ppt on l&t finance jobs Ppt on question tags sentence Differential display ppt online Ppt on fdi in india Pdf to ppt online converter free Stereoscopic image display ppt online Ppt on maintaining good health Upload and view ppt online templates Ppt on nature and scope of human resource management Ppt on interchange of sentences for kids