Quantum computing, teleportation, cryptography Computing Teleportation Cryptography.

Slides:



Advertisements
Similar presentations
Introduction to Quantum Teleportation
Advertisements

Week three!.  8 groups of 2  6 rounds  Ancient cryptosystems  Newer cryptosystems  Modern cryptosystems  Encryption and decryptions  Math  Security.
Quantum Communication, Teleportation, and Maxwell’s Demon
Modern Physics 5/10/11 Spring 2011 Ben Miller, Alexander DeCarli, Kevin Shaw.
CNS2009handout 21 :: quantum cryptography1 ELEC5616 computer and network security matt barrie
A Brief Introduction to Quantum Computation 1 Melanie Mitchell Portland State University 1 This talk is based on the following paper: E. Rieffel & W. Polak,
Quantum Technology Essential Question:
Deterministic teleportation of electrons in a quantum dot nanostructure Deics III, 28 February 2006 Richard de Visser David DiVincenzo (IBM, Yorktown Heights)
Memory Hierarchies for Quantum Data Dean Copsey, Mark Oskin, Frederic T. Chong, Isaac Chaung and Khaled Abdel-Ghaffar Presented by Greg Gerou.
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Quantum Computing Lecture 1 Michele Mosca. l Course Outline
Quantum Computation and Quantum Information – Lecture 2 Part 1 of CS406 – Research Directions in Computing Dr. Rajagopal Nagarajan Assistant: Nick Papanikolaou.
CRYPTOGRAPHY Lecture 10 Quantum Cryptography. Quantum Computers for Cryptanalysis Nobody understands quantum theory. - Richard Feynman, Nobel prize-winning.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
Quantum computing Alex Karassev. Quantum Computer Quantum computer uses properties of elementary particle that are predicted by quantum mechanics Usual.
By: Mike Neumiller & Brian Yarbrough
Tallinn University of Technology Quantum computer impact on public key cryptography Roman Stepanenko.
CS4600/5600 Biometrics and Cryptography UTC/CSE
Cryptography Instructor : Dr. Yanqing Zhang Presented by : Rajapaksage Jayampthi S.
Dominique Unruh 3 September 2012 Quantum Cryptography Dominique Unruh.
Physics is becoming too difficult for physicists. — David Hilbert (mathematician)
Quantum Computing David Dvorak CIS 492. Quantum Computing Overview What is it? How does it work? –The basics –Clarifying with examples Factoring Quantum.
Quantum Computing The Next Generation of Computing Devices? by Heiko Frost, Seth Herve and Daniel Matthews.
Quantum Information Jan Guzowski. Universal Quantum Computers are Only Years Away From David’s Deutsch weblog: „For a long time my standard answer to.
An Introduction to Quantum Phenomena and their Effect on Computing Peter Shoemaker MSCS Candidate March 7 th, 2003.
David Westenberger Lucas Zurek. What’s Happening Now? Silicon-based Computation – Moore’s Law Transistors Physical limitation Then what’s next?
PRESENTED BY MIDHUN.T - EC 3 - S 61 TOPIC – QUANTUM TELEPORTATION Presented by - MIDHUN T EC 3, S 6 ROLL NO. 20 Reg no
Quantum Computing Basic Concepts and Applications.
CHEMISTRY 2000 Topics of Interest #2: Quantum Computers.
Facts about quantum computation & speculation about the human brain Tim Hugo Taminiau Kavli Institute of Nanoscience, Delft University Quantum superposition.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
QUANTUM COMPUTING What is it ? Jean V. Bellissard Georgia Institute of Technology & Institut Universitaire de France.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Quantum Computers by Ran Li.
Quantum Mechanics1 Schrodinger’s Cat. Quantum Mechanics2 A particular quantum state, completely described by enough quantum numbers, is called a state.
Quantum Computers By Andreas Stanescu Jay Shaffstall.
Nawaf M Albadia
Quantum Mechanics(14/2) Hongki Lee BIOPHOTONICS ENGINEERING LABORATORY School of Electrical and Electronic Engineering, Yonsei University Quantum Computing.
Introduction to Quantum Computing
Quantum Computing Michael Larson. The Quantum Computer Quantum computers, like all computers, are machines that perform calculations upon data. Quantum.
A SEMINAR ON Q UANTUM C OMPUTING Institute Of Engineering & Management (CSE 3 rd year batch) Submitted to- Submitted by- Mr. D.P.S. Rathor Sudhir.
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
FNI 1H Quantum Mechanics 1 Quantum Mechanics I don't like it, and I'm sorry I ever had anything to do with it. -- Erwin Schrodinger talking about Quantum.
Lecture 9 Elliptic Curves. In 1984, Hendrik Lenstra described an ingenious algorithm for factoring integers that relies on properties of elliptic curves.
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
As if computers weren’t fast enough already…
IPQI-2010-Anu Venugopalan 1 qubits, quantum registers and gates Anu Venugopalan Guru Gobind Singh Indraprastha Univeristy Delhi _______________________________________________.
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
Quantum Computing
Quantum Computing: An Introduction Khalid Muhammad 1 History of Quantum Computing Bits and Qubits Problems with the Quantum Machine.
Our Proposed Technique
An Introduction to Quantum Computation Sandy Irani Department of Computer Science University of California, Irvine.
QUANTUM COMPUTERS, COMPUTING AND INFORMATION ALAN DURNEV, PHYSICS.
Quantum Computers By Ryan Orvosh.
Norman Littlejohn COSC480.  Quantum Computing  History  How it works  Usage.
Quantum Teleportation What does the future hold?.
QUANTUM PHYSICS BY- AHRAZ, ABHYUDAI AND AKSHAY LECTURE SECTION-5 GROUP NO. 6.
Christopher Monroe Joint Quantum Institute and Department of Physics NIST and University of Maryland Quantum Computation and Simulation.
Quantum Computing: An Introduction
Quantum Computing Richard Jozsa Centre for Quantum Information and Foundations DAMTP University of Cambridge.
Non-locality and quantum games Dmitry Kravchenko University of Latvia Theory days at Jõulumäe, 2008.
15-853Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” Including Quantum Communication Quantum Computing.
The EPR Effect and Quantum Teleportation By Seamus O'Dunn September 24, 2012.
QUANTUM COMPUTING By Sandeep Neeli.
COMPSCI 290.2: Computer Security
Paul M. Dooley Tamer Tayea Wenlin Zhou Ian M. Johson Joshua Tarlow
Poomipat Phusayangkul
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Quantum Cryptography Scott Roberts CSE /01/2001.
Presentation transcript:

Quantum computing, teleportation, cryptography Computing Teleportation Cryptography

Quantum computing Quantum computing studies theoretical computation systems (quantum computers) that make direct use of quantum-mechanical phenomena, such as superposition and entanglement, to perform operations on data. Quantum computers are different from digital computers based on transistors. computationquantum-mechanical phenomenasuperposition entanglementoperationsdatatransistors

Quantum computing (continued) Whereas digital computers require data to be encoded into binary digits (bits), each of which is always in one of two definite states (0 or 1), quantum computation uses qubits (quantum bits), which can be in superpositions of states.bitsqubitssuperpositions

Quantum computing (continued) A theoretical model is the quantum Turing machine, also known as the universal quantum computer. Quantum computers share theoretical similarities with non-deterministic and probabilistic computers; one example is the ability to be in more than one state simultaneously.quantum Turing machinenon-deterministicprobabilistic computers

Quantum computing (continued) The field of quantum computing was first introduced by Yuri Manin in 1980 and Richard Feynman in A quantum computer with spins as quantum bits was also formulated for use as a quantum space–time in 1968.Yuri ManinRichard Feynmanspace–time

Quantum computing (continued) As of 2015, the development of actual quantum computers is still in its infancy, but experiments have been carried out in which quantum computational operations were executed on a very small number of qubits.

Quantum computing (continued) Both practical and theoretical research continues, and many national governments and military funding agencies support quantum computing research to develop quantum computers for civilian, business, trade, gaming and national security purposes, such as cryptanalysis. computers cryptanalysis

Quantum computing (continued) Large-scale quantum computers will be able to solve certain problems much more quickly than any classical computer using the best currently known algorithms, like integer factorization using Shor's algorithm or the simulation of quantum many-body systems.algorithmsinteger factorizationShor's algorithmsimulation of quantum many-body systems

Quantum computing (continued) There exist quantum algorithms, such as Simon's algorithm, that run faster than any possible probabilistic classical algorithm. Given sufficient computational resources, however, a classical computer could be made to simulate any quantum algorithm, as quantum computation does not violate the Church–Turing thesis.quantum algorithmsSimon's algorithmChurch–Turing thesis

Quantum computing (continued)

Quantum teleportation Quantum teleportation is a process by which quantum information (e.g. the exact state of an atom or photon) can be transmitted (exactly, in principle) from one location to another, with the help of classical communication and previously shared quantum entanglement between the sending and receiving location.classical communicationquantum entanglement

Quantum teleportation (continued) Because it depends on classical communication, which can proceed no faster than the speed of light, it cannot be used for superluminal transport or communication of classical bits. It also cannot be used to make copies of a system, as this violates the no-cloning theorem.superluminalno-cloning theorem

Quantum teleportation (continued) Although the name is inspired by the teleportation commonly used in fiction, current technology provides no possibility of anything resembling the fictional form of teleportation. teleportationfiction

Quantum teleportation (continued) While it is possible to teleport one or more qubits of information between two (entangled) atoms, this has not yet been achieved between molecules or anything larger. qubits

Quantum teleportation (continued) One may think of teleportation either as a kind of transportation, or as a kind of communication; it provides a way of transporting a qubit from one location to another, without having to move a physical particle along with it.

Quantum teleportation (continued) The seminal paper first expounding the idea was published by C. H. Bennett, G. Brassard, C. Crépeau, R. Jozsa, A. Peres and W. K. Wootters in 1993.C. H. BennettG. BrassardC. CrépeauR. JozsaA. PeresW. K. Wootters

Quantum teleportation (continued) Since then, quantum teleportation has been realized in various physical systems. Presently, the record distance for quantum teleportation is 143 km (89 mi) with photons, and 21 m with material systems.

Quantum teleportation (continued) In August 2013, the achievement of "fully deterministic" quantum teleportation, using a hybrid technique, was reported.

Quantum teleportation (continued) On 29 May 2014, scientists announced a reliable way of transferring data by quantum teleportation. Quantum teleportation of data had been done before but with highly unreliable methods.

Quantum teleportation (continued)

Quantum cryptography Quantum cryptography describes the use of quantum mechanical effects (in particular quantum communication and quantum computation) to perform cryptographic tasks or to break cryptographic systems. quantum mechanical quantum communicationquantum computationcryptographic

Quantum cryptography (continued) Well-known examples of quantum cryptography are the use of quantum communication to exchange a key securely (quantum key distribution) and the hypothetical use of quantum computers that would allow the breaking of various popular public-key encryption and signature schemes (e.g., RSA and ElGamal).quantum key distribution breakingpublic-key encryptionsignatureRSA ElGamal

Quantum cryptography (continued) The advantage of quantum cryptography lies in the fact that it allows the completion of various cryptographic tasks that are proven or conjectured to be impossible using only classical (i.e. non-quantum) communication (see below for examples). For example, quantum mechanics guarantees that measuring quantum data disturbs that data; this can be used to detect eavesdropping in quantum key distribution.

Quantum cryptography (continued)