David Westenberger Lucas Zurek. What’s Happening Now? Silicon-based Computation – Moore’s Law Transistors Physical limitation Then what’s next?

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

Slide 1 Introduction to Quantum Cryptography Nick Papanikolaou
Security of Things Kelly Jagers op Akkerhuis
Week three!.  8 groups of 2  6 rounds  Ancient cryptosystems  Newer cryptosystems  Modern cryptosystems  Encryption and decryptions  Math  Security.
Using Cryptography to Protect Data in Computer Networks: case study Vsevolod Ievgiienko National Taras Shevchenko University of Kiev Faculty of Cybernetics.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown and edited by Archana Chidanandan Cryptographic Tools.
FIT5037 Advanced Network Security --- Modern Computing and Security --- Lecture 1.
2008 Technology Advances Winners and Losers IEEE Spectrum January 2009 Issue.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Introduction to Computer and Network Security Iliano Cervesato 26 August 2008 – Modern Cryptography.
ELECTRONIC PAYMENT SYSTEMSFALL 2001COPYRIGHT © 2001 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
Quantum computing Alex Karassev. Quantum Computer Quantum computer uses properties of elementary particle that are predicted by quantum mechanics Usual.
By: Mike Neumiller & Brian Yarbrough
Moore’s Law the number of circuits on a single silicon chip doubles every 18 to 24 months.
Network Security Essentials Fifth Edition by William Stallings Fifth Edition by William Stallings.
Project supported by YESS 2009 Young Engineering Scientist Symposium « Identity Management » Cryptography for the Security of Embedded Systems Ambient.
Quantum Computing David Dvorak CIS 492. Quantum Computing Overview What is it? How does it work? –The basics –Clarifying with examples Factoring Quantum.
Quantum Computing The Next Generation of Computing Devices? by Heiko Frost, Seth Herve and Daniel Matthews.
CS 627 Elliptic Curves and Cryptography Paper by: Aleksandar Jurisic, Alfred J. Menezes Published: January 1998 Presented by: Sagar Chivate.
Cryptography By, Anthony Lonigro & Valentine Mbah.
October 1 & 3, Introduction to Quantum Computing Lecture 1 of 2 Introduction to Quantum Computing Lecture 1 of 2
Basic Elliptic Curve Cryptography 1Lt Peter Hefley 90 OSS Instructor Fall ‘06.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Quantum Computing Basic Concepts and Applications.
1 hardware of quantum computer 1. quantum registers 2. quantum gates.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
By Joseph Szatkowski and Cody Borgschulte. ● Uses phenomenon associated with quantum mechanics instead of electrical circuitry ● Quantum mechanics explains.
Facts about quantum computation & speculation about the human brain Tim Hugo Taminiau Kavli Institute of Nanoscience, Delft University Quantum superposition.
KEY MANAGEMENT; OTHER PUBLIC-KEY CRYPTOSYSTEMS - Chapter 10 KEY MANAGEMENT; OTHER PUBLIC-KEY CRYPTOSYSTEMS - Chapter 10 KEY MANAGEMENT DIFFIE-HELLMAN KEY.
Quantum Computing Paola Cappellaro
Quantum Computers.
Quick starter Which of the emerging techs do you think have the most potential? To make money?
Quantum Computers by Ran Li.
Teleportation Technology of the Future is Here!. Agenda Brief description of transportation process. Teleportation that is being used today. How teleportation.
Nawaf M Albadia
Quantum computing, teleportation, cryptography Computing Teleportation Cryptography.
Quantum Computing and Quantum Programming Language
Quantum Information Science The size of transistors decreases by half every eighteen months Intel’s 20 and 45 nm transistor Laser MRI Information Theory.
Elliptic Curve Cryptography
Prepared by Dr. Lamiaa Elshenawy
Quantum Mechanics(14/2) Hongki Lee BIOPHOTONICS ENGINEERING LABORATORY School of Electrical and Electronic Engineering, Yonsei University Quantum Computing.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
BZUPAGES.COM Cryptography Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized.
Lecture 9 Elliptic Curves. In 1984, Hendrik Lenstra described an ingenious algorithm for factoring integers that relies on properties of elliptic curves.
Formal Verification of Quantum Cryptography Dominique Unruh University of Tartu.
Quantum Cryptography and Quantum Computing. Cryptography is about a)manipulating information b)transmitting information c)storing information.
Quantum Computing Charles Bloomquist CS147 Fall 2009.
An Introduction to Quantum Computation Sandy Irani Department of Computer Science University of California, Irvine.
New Efficient Image Encryption Scheme Based on Partial Encryption Karl Martin Multimedia Lab Dept. of Electrical and Computer Eng. University of Toronto.
KEYNOTE OF THE FUTURE 1: CIARA MOORE CSIT PhD Student QUEEN’S UNIVERSITY BELFAST.
Quantum Computers By Ryan Orvosh.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
Quantum Computing Are We There Yet?
Quantum Computing: An Introduction
Free Computer Antivirus Protection Download Free Antivirus for PC Now Protect your device or your banking details with the.
QUANTUM COMPUTING By Sandeep Neeli.
Paul M. Dooley Tamer Tayea Wenlin Zhou Ian M. Johson Joshua Tarlow
Quantum Circuit Visualization
Poomipat Phusayangkul
Introduction to Quantum Computing Lecture 1 of 2
B. R. Chandavarkar CSE Dept., NITK Surathkal
Limits and Horizon of Computing
Practical Aspects of Modern Cryptography
By Nealesh Ragoodial - Security Capstone
One Time Signature.
Quantum Computing Hakem Alazmi Jhilakshi Sharma Linda Vu.
Hashing Hash are the auxiliary values that are used in cryptography.
Elliptic-Curve Cryptography (ECC)
Presentation transcript:

David Westenberger Lucas Zurek

What’s Happening Now? Silicon-based Computation – Moore’s Law Transistors Physical limitation Then what’s next?

What is Quantum Computing? Quantum Mechanics: – “You don’t understand quantum mechanics – you just get used to it.” – Richard Feynman – Qubits – Superposition – Parallelism – Entanglement

How Does a Quantum Computer Work?

Quantum & Copyright Making an Image: – Copyright Laws: Creator holds copyright – Even if slightly altered – Using a quantum computer to generate images: Find every possible image within given parameters Is this fair? What would happen to copyright laws? Threat to artistic images? Not necessarily just images…

Quantum & Encryption RSA & Elliptic Curve Cryptology (ECC): – Used to secure: – Software updates, , online banking, digital signatures, etc. – Amount of time needed to break a strong 1024-bit RSA code – From billions of years to minutes – But quantum computers don’t have an advantage over every type of cryptography scheme – Any replacement will have some big shoes to fill

What Does a Quantum Computer Look Like? kWw kWw

Sources computers computers