Nawaf M Albadia 427121532.

Slides:



Advertisements
Similar presentations
Quantum t-designs: t-wise independence in the quantum world Andris Ambainis, Joseph Emerson IQC, University of Waterloo.
Advertisements

Quantum Cryptography Nick Papanikolaou Third Year CSE Student
Slide 1 Introduction to Quantum Cryptography Nick Papanikolaou
Use of Time as a Quantum Key By Caleb Parks and Dr. Khalil Dajani.
Quantum Computing and Qbit Cryptography
Implementation of Practically Secure Quantum Bit Commitment Protocol Ariel Danan School of Physics Tel Aviv University September 2008.
Alice and Bob in the Quantum Wonderland. Two Easy Sums 7873 x 6761 = ? 7873 x 6761 = ? ? x ? = ? x ? =
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Quantum Cryptography ( EECS 598 Presentation) by Amit Marathe.
Great Theoretical Ideas in Computer Science.
Quantum Cryptography Qingqing Yuan. Outline No-Cloning Theorem BB84 Cryptography Protocol Quantum Digital Signature.
Superdense coding. How much classical information in n qubits? Observe that 2 n  1 complex numbers apparently needed to describe an arbitrary n -qubit.
CNS2009handout 21 :: quantum cryptography1 ELEC5616 computer and network security matt barrie
A Brief Introduction to Quantum Computation 1 Melanie Mitchell Portland State University 1 This talk is based on the following paper: E. Rieffel & W. Polak,
Quantum Cryptography Marshall Roth March 9, 2007.
Quantum Algorithms I Andrew Chi-Chih Yao Tsinghua University & Chinese U. of Hong Kong.
Quantum Computing Joseph Stelmach.
Princeton University COS 433 Cryptography Fall 2005 Boaz Barak COS 433: Cryptography Princeton University Fall 2005 Boaz Barak Lecture 12: Idiot’s Guide.
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
The Quantum 7 Dwarves Alexandra Kolla Gatis Midrijanis UCB CS
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
CS4600/5600 Biometrics and Cryptography UTC/CSE
Physics is becoming too difficult for physicists. — David Hilbert (mathematician)
Quantum Computing David Dvorak CIS 492. Quantum Computing Overview What is it? How does it work? –The basics –Clarifying with examples Factoring Quantum.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography (III)
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 667 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 2117 Lecture.
Quantum Information Jan Guzowski. Universal Quantum Computers are Only Years Away From David’s Deutsch weblog: „For a long time my standard answer to.
October 1 & 3, Introduction to Quantum Computing Lecture 1 of 2 Introduction to Quantum Computing Lecture 1 of 2
Quantum Cryptography. Cryptography  Art of writing messages so that no one other than intended receiver can read it.  Encryption – Performing mathematical.
Michele Mosca Canada Research Chair in Quantum Computation 27 May 2006 Introduction to quantum technologies: quantum computers, quantum teleporters & cryptography.
Introduction to Quantum Key Distribution
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Quantum Computers by Ran Li.
Introduction to Quantum Computation Andris Ambainis University of Latvia.
Quantum computing, teleportation, cryptography Computing Teleportation Cryptography.
Quanum computing. What is quantum computation? New model of computing based on quantum mechanics. Quantum circuits, quantum Turing machines More powerful.
Quantum Mechanics(14/2) Hongki Lee BIOPHOTONICS ENGINEERING LABORATORY School of Electrical and Electronic Engineering, Yonsei University Quantum Computing.
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
Multipartite Entanglement and its Role in Quantum Algorithms Special Seminar: Ph.D. Lecture by Yishai Shimoni.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Quantum Cryptography Antonio Acín
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
Quantum Cryptography and Quantum Computing. Cryptography is about a)manipulating information b)transmitting information c)storing information.
Quantum Computing Charles Bloomquist CS147 Fall 2009.
An Introduction to Quantum Computation Sandy Irani Department of Computer Science University of California, Irvine.
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
1 An Introduction to Quantum Computing Sabeen Faridi Ph 70 October 23, 2007.
Lecture from Quantum Mechanics. Marek Zrałek Field Theory and Particle Physics Department. Silesian University Lecture 11.
Quantum Computing: An Introduction
Quantum Computing Richard Jozsa Centre for Quantum Information and Foundations DAMTP University of Cambridge.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
-SECRECY ENSURED TECHNOLOGYKEY DISTRIBUTUION CLASSICAL CRYPTOGRAPHY QUANTAM CRYPTOGRAPHY WORKING INTRODUCTION SECURITY CONCLUSION ADVANTAGESLIMITATIONS.
15-853Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” Including Quantum Communication Quantum Computing.
QUANTUM COMPUTING By Sandeep Neeli.
Encryption and Integrity
COMPSCI 290.2: Computer Security
Quantum Information Promises new insights Anthony J
Introduction to Quantum Computing Lecture 1 of 2
Quantum Cryptography Quantum Computing
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Quantum Cryptography Alok.T.J EC 11.
Quantum Cryptography Scott Roberts CSE /01/2001.
Qubit Recycling in Quantum Computation
Quantum Cryptography Quantum Computing
Quantum Cryptography Quantum Computing
Presentation transcript:

Nawaf M Albadia 427121532

Contents Introduction. Quantum Physical Phenomena. Quantum Computing in more details. Quantum Algorithms. Quantum Cryptography. Quantum Communication. Conclusion.

Terminologies Superposition Entanglement Is the state of a qubit when 0 and 1 at the same time. Entanglement Is a quantum mechanical phenomenon in which the quantum states of two or more objects are linked together so that one object cannot be adequately described without full mention of its counterpart. Interference In physics, interference is the addition (superposition) of two or more waves that result in a new wave pattern. Polarization Photon polarization is the quantum mechanical description of the classical polarized sinusoidal plane electromagnetic wave

What’s quantum computing New model of computing based on quantum mechanics. Quantum circuits, quantum Turing machines. More powerful than conventional models.

Physical Experiment Here a light source emits a photon along a path towards a half-silvered mirror. This mirror splits the light, reflecting half vertically toward detector A and transmiting half toward detector B. A photon, however, is a single quantized packet of light and cannot be split, so it is detected with equal probability at either A or B. Intuition would say that the photon randomly leaves the mirror in either the vertical or horizontal direction. However, quantum mechanics predicts that the photon actually travels both paths simultaneously! This is more clearly demonstrated in figure b. In this experiment, the photon first encounters a half-silvered mirror, then a fully silvered mirror, and finally another half-silvered mirror before reaching a detector, where each half-silvered mirror introduces the probability of the photon traveling down one path or the other.  Once a photon strikes the mirror along either of the two paths after the first beam splitter, the arrangement is identical to that in figure a, and so one might hypothesize that the photon will reach either detector A or detector B with equal probability.  However, experiment shows that in reality this arrangement causes detector A to register 100% of the time, and never at detector B!  How can this be?

Why Quantum computing? The demand for computation power is raising, and classical computing has a limit?? Moore’s Low

Why Quantum computing? What happens when we hit the physical limit of Moore’s Law? There are apparently two possibilities: Optical Computers Or Quantum Computers

Classical VS Quantum Classical Computers Quantum Computers Information is in the form of a digital bit, 0 or 1 Information is in the form of a qubit, 0, 1, and any value in between at the same time Also known as superposition 1 1

What are the benefits? Increased computing power Security advances Factoring a number with 400 digits Supercomputers = billions of years Quantum computers = within a year Security advances Keys exchanged in private using “quantum key distribution (QKD)” No eavesdropper can obtain private key

What if I have it and you don’t? What are the Risks? Security problems? What if I have it and you don’t?

Timeline of implementation Quantum computing Some scientists claim that they will begin when Moore’s law ends, 2020 Others say it will be three decades or more Beyond quantum computing Nanomachines. DNA computing.

Quantum Algorithms Factoring: given N=pq, find p and q. (Shor’s algorithm ) Best algorithm n -number of digits. Many cryptosystems based on hardness of factoring. O(log N)3 time quantum algorithm [Shor, 1994] Similar quantum algorithm solves discrete log.

Interesting Shor’s Algorithm In 1994, Peter Shor gave a quantum algorithm for factoring an N-digit number that takes time O(log N)3 Interesting Best known classical algorithm takes So if you had a quantum computer, you could break RSA and other public-key cryptosystems Heart of Shor’s algorithm is a “quantum Fourier transform” that finds the period of an exponentially long periodic sequence

Quantum Algorithms ... 1 x1 x2 x3 xn 1 x1 x2 x3 xn Find if there exists i for which xi=1. Queries: input i, output xi. Classically, n queries. Quantum, O(n) queries [Grover, 1996]. Speeds up exhaustive search.

Quantum cryptography Key distribution: two parties want to create a secret shared key by using a channel that can be eavesdropped. Classically: secure if discrete log hard. Quantum: secure if quantum mechanics valid [Bennett, Brassard, 1984]. No extra assumptions needed.

Eavesdropping Theorem: Impossible to obtain information about non-orthogonal states without disturbing them. In this protocol: Entanglement. No-cloning theorem. Non-locality & uncertainty principle. Indistinguishability of nonorthogonal states

Check for Eavesdropping Alice randomly chooses a fraction of the final string and announces it. Bob counts the number of different bits. If too many different bits, reject (eavesdropper found). If Eve measured many qubits, she gets caught.

Quantum Communication Dense coding: 1 quantum bit can encode 2 classical bits. Teleportation: quantum states can be transmitted by sending classical information. Quantum protocols that send exponentially less bits than classical.

Are there any limits? Can Quantum mechanics solve NP-Complete problems? Answer: No

Conclusion Quantum Computing is very promising. Quantum mechanics are hard to implement. Eavesdropping is almost impossible in case of key distribution. Quantum provide efficient environment for communication. Quantum can’t solve NP-complete problems 

Open Discussion