Is This the Dawn of the Quantum Information Age? Discovering Physics, Nov. 5, 2003.

Slides:



Advertisements
Similar presentations
Quantum Computing and Qbit Cryptography
Advertisements

Quantum Computing Uf H Nick Bonesteel
Introduction to Cryptography and Security Mechanisms: Unit 5 Theoretical v Practical Security Dr Keith Martin McCrea
QUANTUM CRYPTOGRAPHY Narayana D Kashyap Security through Uncertainty CS 265 Spring 2003.
CNS2009handout 21 :: quantum cryptography1 ELEC5616 computer and network security matt barrie
Quantum Computing CPSC 321 Andreas Klappenecker. Plan T November 16: Multithreading R November 18: Quantum Computing T November 23: QC + Exam prep R November.
Quantum Technology Essential Question:
Matthew Guidry. The Fundamentals of Cryptography  One of the fundamentals of cryptography is that keys selected for various protocols that are computationally.
Quantum Computing Joseph Stelmach.
Princeton University COS 433 Cryptography Fall 2005 Boaz Barak COS 433: Cryptography Princeton University Fall 2005 Boaz Barak Lecture 12: Idiot’s Guide.
Quantum Computers Todd A. Brun Communication Sciences Institute USC.
Quantum Information Processing
Tallinn University of Technology Quantum computer impact on public key cryptography Roman Stepanenko.
MA-250 Probability and Statistics Nazar Khan PUCIT Lecture 10.
Presented by: Erik Cox, Shannon Hintzman, Mike Miller, Jacquie Otto, Adam Serdar, Lacie Zimmerman.
Dark Matter Masses of Galaxies Gravity and Light Black Holes What is Dark Matter?
Quantum Information, Communication and Computing Jan Kříž Department of physics, University of Hradec Králové Doppler Institute for mathematical physics.
Institute of Technical Physics Entanglement – Beamen – Quantum cryptography The weird quantum world Bernd Hüttner CPhys FInstP DLR Stuttgart.
Quantum Computing David Dvorak CIS 492. Quantum Computing Overview What is it? How does it work? –The basics –Clarifying with examples Factoring Quantum.
Quantum Computing The Next Generation of Computing Devices? by Heiko Frost, Seth Herve and Daniel Matthews.
In 1887,when Photoelectric Effect was first introduced by Heinrich Hertz, the experiment was not able to be explained using classical principles.
What is RAM? Nick Sims.
Quantum Computers. Overview Brief History Computing – (generations) Current technology Limitations Theory of Quantum Computing How it Works? Applications.
Have you ever wanted to hide something from: Your friends? Your family? The Government?
Security in Computing Chapter 12, Cryptography Explained Part 7 Summary created by Kirk Scott 1.
Quantum Information Jan Guzowski. Universal Quantum Computers are Only Years Away From David’s Deutsch weblog: „For a long time my standard answer to.
Limits and Horizon of Computing Post silicon computing.
1 3/10 Day 16: Questions? Hidden Variables Local Realism & EPR “ The problems of language here are really serious. We wish to speak in some way about the.
An Introduction to Quantum Phenomena and their Effect on Computing Peter Shoemaker MSCS Candidate March 7 th, 2003.
1-1 Copyright © 2015, 2010, 2007 Pearson Education, Inc. Chapter 10, Slide 1 Chapter 10 Understanding Randomness.
1 Simple and Unbreakable: The Mathematics of Internet Security Dr. Monica Nevins Department of Mathematics and Statistics University of Ottawa University.
PRESENTED BY MIDHUN.T - EC 3 - S 61 TOPIC – QUANTUM TELEPORTATION Presented by - MIDHUN T EC 3, S 6 ROLL NO. 20 Reg no
Facts about quantum computation & speculation about the human brain Tim Hugo Taminiau Kavli Institute of Nanoscience, Delft University Quantum superposition.
Integrated electronic optical switches in future chip ion trap Shu, Gang 5/24/2006.
Quantum Computing Paola Cappellaro
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Quantum mechanical phenomena. The study between quanta and elementary particles. Quanta – an indivisible entity of a quantity that has the same value.
CRYPTOGRAPHY. WHAT IS PUBLIC-KEY ENCRYPTION? Encryption is the key to information security The main idea- by using only public information, a sender can.
Wednesday, October 31 Ford Final Chapter (10). Agenda Announce: –Test Wednesday –Office Hours probably busy…better book appt. –Read Chs. 1-3 of Vilekin.
Quantum Mechanics1 Schrodinger’s Cat. Quantum Mechanics2 A particular quantum state, completely described by enough quantum numbers, is called a state.
Quantum Computers By Andreas Stanescu Jay Shaffstall.
Nawaf M Albadia
Emergence of Modern Science NS 1300 Dr. Hoge. What is a quantum computer, and do I want one?
Quantum computing, teleportation, cryptography Computing Teleportation Cryptography.
Quantum Theory By: Brian Williams. Blackbody Radiation Around the turn of the 20 th century, physicists were studying the total energy carried by all.
Niels Bohr Based his studies on Hydrogen Proposed energy levels
FNI 1H Quantum Mechanics 1 Quantum Mechanics I don't like it, and I'm sorry I ever had anything to do with it. -- Erwin Schrodinger talking about Quantum.
Chapter 5: Electrons in Atoms
Chapter 10 Understanding Randomness. Why Be Random? What is it about chance outcomes being random that makes random selection seem fair? Two things: –
Schrödinger’s Telephone A faster-than-light telephone for interstellar distances!
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
Quantum Cryptography and Quantum Computing. Cryptography is about a)manipulating information b)transmitting information c)storing information.
An Introduction to Quantum Computation Sandy Irani Department of Computer Science University of California, Irvine.
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
The expected value The value of a variable one would “expect” to get. It is also called the (mathematical) expectation, or the mean.
Quantum Mechanics. Electromagnetic Spectrum Visible Spectrum.
The Law of Averages. What does the law of average say? We know that, from the definition of probability, in the long run the frequency of some event will.
Quantum Teleportation What does the future hold?.
Using Principles of Quantum Mechanics for Separating Mixed Signals Issues to discuss ■ What is quantum mechanics (QM)? ■ Why QM framework is useful for.
QUANTUM PHYSICS BY- AHRAZ, ABHYUDAI AND AKSHAY LECTURE SECTION-5 GROUP NO. 6.
Quantum Computing: An Introduction
15-853Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” Including Quantum Communication Quantum Computing.
Entangled Electrons.
UNIT 1: Structure and properties wave mechanical model
Paul M. Dooley Tamer Tayea Wenlin Zhou Ian M. Johson Joshua Tarlow
Quantum Information Promises new insights Anthony J
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Limits and Horizon of Computing
Quantum Cryptography Alok.T.J EC 11.
Quantum Cryptography Scott Roberts CSE /01/2001.
Presentation transcript:

Is This the Dawn of the Quantum Information Age? Discovering Physics, Nov. 5, 2003

Quantum Theory In the 1920s, Bohr, Heisenberg, Schrodinger, Dirac and others developed a radically new kind of physics to understand the strange world of the atom: Quantum Theory. In quantum theory randomness and uncertainty play a fundamental role. Although strange and counterintuitive, quantum theory is arguably the most successful theory in physics.

“God does not play dice with the universe!” – Albert Einstein “Stop telling God what do to!” – Niels Bohr

The student begins by learning the tricks of the trade. He learns how to make calculations in quantum mechanics and get the right answers...to learn the mathematics of the subject and to learn how to use it takes about six months. This is the first stage in learning quantum mechanics, and it is comparatively easy and painless. The second stage comes when the student begins to worry because he does not understand what he has been doing. He worries because he has no clear physical picture in his head. He gets confused in trying to arrive at a physical explanation for each of the mathematical tricks he has been taught. He works very hard and gets discouraged because he does not seem able to think clearly. This second stage often lasts six months or longer, and it is strenuous and unpleasant. Then, quite unexpectedly, the third stage begins. The student suddenly says to himself, "I understand quantum mechanics," or rather he says, "I understand now that there really isn't anything to be understood." Learning Quantum Mechanics Freeman Dyson

Information Theory In 1948 Claude Shannon introduces the concept of the bit as the fundamental unit of information. Using the fact that all information can be represented by bits, Shannon and others develop the Mathematical Theory of Information. This theory is the basis of modern information technology. BIT = 0, 1 Pentium Chip

Information is Physical! In practice, bits are always represented by the state of some physical system. At its most fundamental level, the physical world is described by quantum theory. Does quantum theory change our understanding of information theory? Recent discoveries over the past 10 years say the answer is YES!

C The Classical Bit = 1 = 0 The Classical Box C C

Q The Quantum Box Q Q QQ

Q Q Q QQ

Q Q QQ If I know what’s in Door #1 There is a 50% chance I will find a red ball behind Door #2 And a 50% chance I will find a black ball behind Door #2. Q

The Quantum Box Q Q QQ If I know what’s in Door #2 There is a 50% chance I will find a red ball behind Door #1 And a 50% chance I will find a black ball behind Door #1 Q

What’s Inside the Box? A two-level quantum system. Simple example: Quantum mechanical Spin. Opening Door #1 = measuring spin along z-axis. z Up =Down =

What’s Inside the Box? A two-level quantum system. Simple example: Quantum mechanical Spin. Opening Door #2 = measuring spin along x-axis. Right = Left = x

Two Perspectives The glass is half empty (pessimistic). Nature has shortchanged us. Uncertainty is built into the laws of nature. We can’t ever know everything about what’s inside the box. The glass is half full (optimistic). Nature has given us a gift. Uncertainty is built into the laws of nature. Maybe we can use it!

Message: Random Key: Sending a Secret Message A B E Message: Random Key: ?

CCCC Classical Key Distribution CCC C CCCC A

CCCC B

CCCC Classical Key Distribution CCC C CCCC A

CCCC E

CCCC B Bond has no way of knowing if Dr. Evil has intercepted the key.

Quantum Key Distribution QQQQ A

B QQQQ After Bond receives the boxes, Austin calls to tell him which doors to open.

Quantum Key Distribution QQQQ A

QQQ E Dr. Evil doesn’t know which doors to open. He can only guess. Q

B QQQQ Bond can tell if Dr. Evil has looked in the boxes by comparing some fraction of the key with Austin.

Charles BennettGilles Brassard The first quantum key distribution device (1989)

Exploiting Quantum "Spookiness" to Encrypt an Image Jennewein et al., Physical Review Letters (2000)

“Classical” Technology C The Transistor – a “switch” which can be either “on” or “off”

The Integrated Circuit Pentium Processor

Moore’s Law

“Quantum” Technology? Q The Quantum Dot – an artificial structure which traps a single electron which can either be spin “up” or spin “down”

The Quantum Dot Computer

Prime Factorization Given two prime numbers p and q, p x q = C Easy C p, q Hard Best known factoring algorithm scales as time = exp(Number of Digits) Mathematical Basis for Public Key Cryptography.

Quantum Factorization In 1994 Peter Shor showed that a Quantum Computer in which C-bits are replaced with Q- bits could factor an integer exponentially faster than a classical computer! time = (Number of Digits) Shor’s algorithm exploits something called Massive Quantum Parallelism. 3

Q Q QQ QQ QQQQ Q-bitsNumber of C-bits

QQQQQ Q-bitsNumber of C-bits # of atoms in the universe

The Real Mystery: Entanglement Why does it take so many C-bits to specify the state of a small number of Q-bits? Q-bits can be correlated in ways which have no analog in the classical world. They can be “entangled.” When factoring a large integer, a quantum computer will be in a highly entangled state.

Other Uses of Entanglement Entanglement can be used to transmit a Q-bit from one place to another without actually moving the box! Quantum Teleportation Entanglement can be used to protect Q- bits from error. Quantum Error Correction

Conclusions On paper, a qualitatively new kind of technology based on the weird behavior of the quantum world appears to be possible. It is a problem for the current generation of scientists (i.e. us!) to find out whether this is possible in practice.

Is This the Dawn of the Quantum Information Age? Discovering Physics, Nov. 5, 2003