Paul M. Dooley Tamer Tayea Wenlin Zhou Ian M. Johson Joshua Tarlow

Slides:



Advertisements
Similar presentations
Electrons as Waves Sarah Allison Claire.
Advertisements

QUANTUM MECHANICS Probability & Uncertainty 1.Probability 2.Uncertainty 3.Double-slit photons.
Chien Hsing James Wu David Gottesman Andrew Landahl.
QUANTUM CRYPTOGRAPHY Narayana D Kashyap Security through Uncertainty CS 265 Spring 2003.
Quantum Technology Essential Question:
Quantum Entanglement David Badger Danah Albaum. Some thoughts on entanglement... “Spooky action at a distance.” -Albert Einstein “It is a problem that.
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Quantum computing Alex Karassev. Quantum Computer Quantum computer uses properties of elementary particle that are predicted by quantum mechanics Usual.
By: Mike Neumiller & Brian Yarbrough
Philosophical Interpretations of
Quantum Computing David Dvorak CIS 492. Quantum Computing Overview What is it? How does it work? –The basics –Clarifying with examples Factoring Quantum.
In 1887,when Photoelectric Effect was first introduced by Heinrich Hertz, the experiment was not able to be explained using classical principles.
Quantum Information Jan Guzowski. Universal Quantum Computers are Only Years Away From David’s Deutsch weblog: „For a long time my standard answer to.
By Ryan Deetscreek and Greg Goettner
An Introduction to Quantum Phenomena and their Effect on Computing Peter Shoemaker MSCS Candidate March 7 th, 2003.
Quantum Cryptography. Cryptography  Art of writing messages so that no one other than intended receiver can read it.  Encryption – Performing mathematical.
David Westenberger Lucas Zurek. What’s Happening Now? Silicon-based Computation – Moore’s Law Transistors Physical limitation Then what’s next?
Quantum Computing Basic Concepts and Applications.
Blake Morell Daniel Bowser Trenton Wood. Contents Background Experimental Design & Outcome Implications Future Applications.
A brief introduction to Quantum computer
Quantum Computing by Mathew Ross Jared Davis - Group L -
Wednesday, October 31 Ford Final Chapter (10). Agenda Announce: –Test Wednesday –Office Hours probably busy…better book appt. –Read Chs. 1-3 of Vilekin.
Quantum Mechanics1 Schrodinger’s Cat. Quantum Mechanics2 A particular quantum state, completely described by enough quantum numbers, is called a state.
Quantum Computers By Andreas Stanescu Jay Shaffstall.
Nawaf M Albadia
Quantum computing, teleportation, cryptography Computing Teleportation Cryptography.
Quantum Information Science The size of transistors decreases by half every eighteen months Intel’s 20 and 45 nm transistor Laser MRI Information Theory.
Quantum Mechanics(14/2) Hongki Lee BIOPHOTONICS ENGINEERING LABORATORY School of Electrical and Electronic Engineering, Yonsei University Quantum Computing.
Introduction to Quantum Computing
Quantum Computing Michael Larson. The Quantum Computer Quantum computers, like all computers, are machines that perform calculations upon data. Quantum.
FNI 1H Quantum Mechanics 1 Quantum Mechanics I don't like it, and I'm sorry I ever had anything to do with it. -- Erwin Schrodinger talking about Quantum.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
Principles and Laws that Explain Electron Behavior SC3: Students will use the modern atomic theory to explain the characteristics of atoms.
Quantum Computing Charles Bloomquist CS147 Fall 2009.
An Introduction to Quantum Computation Sandy Irani Department of Computer Science University of California, Irvine.
Quantum Computers By Ryan Orvosh.
Norman Littlejohn COSC480.  Quantum Computing  History  How it works  Usage.
QUANTUM PHYSICS BY- AHRAZ, ABHYUDAI AND AKSHAY LECTURE SECTION-5 GROUP NO. 6.
-SECRECY ENSURED TECHNOLOGYKEY DISTRIBUTUION CLASSICAL CRYPTOGRAPHY QUANTAM CRYPTOGRAPHY WORKING INTRODUCTION SECURITY CONCLUSION ADVANTAGESLIMITATIONS.
15-853Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” Including Quantum Communication Quantum Computing.
The EPR Effect and Quantum Teleportation By Seamus O'Dunn September 24, 2012.
The Quantum Mechanical Model Chemistry Honors. The Bohr model was inadequate.
Sub-fields of computer science. Sub-fields of computer science.
QUANTUM COMPUTING By Sandeep Neeli.
Entangled Electrons.
Quantum Model of the Atom
QUANTUM COMPUTING: Quantum computing is an attempt to unite Quantum mechanics and information science together to achieve next generation computation.
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
J. Miranda University of Ottawa 21 November 2003
Quantum mechanical model of the atom
COMPSCI 290.2: Computer Security
Poomipat Phusayangkul
Quantum Information Promises new insights Anthony J
Introduction to Quantum Computing Lecture 1 of 2
The Bohr Model, Wave Model, and Quantum Model
Quantum Cryptography Quantum Computing
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Possible Impact of quantum computing
Quantum Computers Superposition Interference Entanglement and Quantum Error Correction Lesson 1 By: Professor Lili Saghafi
The Quantum Model of the Atom.
By Nealesh Ragoodial - Security Capstone
Quantum Cryptography Alok.T.J EC 11.
Matter is a Wave Does not apply to large objects
Double Slit Experiment
Cryptography and Quantum Computing
Quantum Technology programme
Spin Many quantum experiments are done with photon polarization instead of electron spin Here is the correspondence between the two And the measurement.
Quantum Computing Hakem Alazmi Jhilakshi Sharma Linda Vu.
Quantum Computing.
Quantum Cryptography Quantum Computing
Presentation transcript:

Paul M. Dooley Tamer Tayea Wenlin Zhou Ian M. Johson Joshua Tarlow Quantum Computing Paul M. Dooley Tamer Tayea Wenlin Zhou Ian M. Johson Joshua Tarlow Explain the technology your team selected (history, trending , current and future application) Analyze the risk associated with this technology, preferred to use samples Key controls that can mitigate risks identified Each team will give 15 min. to present Power Point Slides are preferred

Introduction Radical change how computational processing is performed Uses Quantum Mechanics Market expected to surpass 20 Billion by 2020

Gartner Emerging Technology Hype Cycle Expected adoption is over 10 years away Few if any commercial applications in current use

Quantum Mechanic Principles Superposition Can be in two places simultaneously until measured Schrodinger’s Cat Observation/measurement affects the outcome Outcome does not exist unless the measurement is made Entanglement Maintain connection after interactions Instantaneous interaction not limited by distance Not limited by speed of light Heisenberg Uncertainty Principle: impossible to know both an object's position and velocity -- at the same time

Silicon Valley – Schrodinger’s Cat

What is Quantum Computing? Computation Systems that use quantum mechanics to process data Different than classical computer No transistors or diodes Stores information as either 1,0 in Qubits Quantum superposition of both states Parallelism: can perform multiple computations simultaneously 2 Qubits = 4 Bits 3 Qubits = 8 Bits 4 Qubits = 16 Bits 10 Qubits = 1,024 Bits 30 Qubits = 107,373,568

Applications Encryption Cryptography Artificial Intelligence Teleportation Quantum Communication Big Data Pharmaceuticals

Risk: Encryption Theoretically capable of breaking modern encryption Superposition allows simultaneous attack of different parts of code Current encryption standards are vulnerable Based on prime numbers Large prime numbers difficult to factor Easy to multiply large prime numbers Difficult to reverse for current computers Still over a decade away

Control – Quantum Key Distribution Only known method for transmitting a key long distances proven secure under Quantum Mechanic laws Relies on: Mathematics (Public Key Encryption): Quantum Mechanics (Quantum Cryptography) Randomly generates keys Transmits data through photons (light) “Man-in-the-Middle” attacks impossible Mathematics (Public Key Encryption): computational difficulty of certain hard mathematical problems Quantum Mechanics (Quantum Cryptography): Relies on laws of Quantum Mechanics

Why is Quantum Key Distribution Secure? Heisenberg Uncertainty Principle Alters photons Attempts to re-emit photons introduce unacceptable level of error into communication Entanglement Creation of 3 entangled photons from two Decreases strength of each photon (detection) Impossible re-emit both photons and: Measure entangled photon Disrupt other photon Heisenberg Uncertainty Principle:  The act of measurement is an integral part of quantum mechanics, not just a passive, external process as in classical physics. So it is possible to encode information into some quantum properties of a photon in such a way that any effort to monitor them necessarily disturbs them in some detectable way. The effect arises because in quantum theory, certain pairs of physical properties are complementary in the sense that measuring one property necessarily disturbs the other. This statement is known as the Heisenberg uncertainty principle Entanglement: It is a state of two or more quantum particles, e.g. photons, in which many of their physical properties are strongly correlated. The entangled particles cannot be described by specifying the states of individual particles and they may together share information in a form which cannot be accessed in any experiment performed on either of the particles alone. This happens no matter how far apart the particles may be at the time. Entanglement is crucial for long-distance quantum key distribution.

Questions?