1 Introduction to Quantum Computation and Quantum Information Dr. Raja Nagarajan University of Warwick.

Slides:



Advertisements
Similar presentations
Introduction to Quantum Teleportation
Advertisements

Slide 1 Insert your own content. Slide 2 Insert your own content.
0 - 0.
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Teacher Name Class / Subject Date A:B: Write an answer here #1 Write your question Here C:D: Write an answer here.
Cryptography encryption authentication digital signatures
RSA.
DES The Data Encryption Standard (DES) is a classic symmetric block cipher algorithm. DES was developed in the 1970’s as a US government standard The block.
Public Key Cryptosystem
CS4026 Formal Models of Computation Running Haskell Programs – power.
Quantum Computation and Quantum Information – Lecture 2
Quantum Cryptography Nick Papanikolaou Third Year CSE Student
Slide 1 Introduction to Quantum Cryptography Nick Papanikolaou
Trusted Data Sharing over Untrusted Cloud Storage Provider Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, and Yong Tang Cloud Computing Technology and.
Use of Time as a Quantum Key By Caleb Parks and Dr. Khalil Dajani.
Quantum Computing and Qbit Cryptography
5.9 + = 10 a)3.6 b)4.1 c)5.3 Question 1: Good Answer!! Well Done!! = 10 Question 1:
Past Tense Probe. Past Tense Probe Past Tense Probe – Practice 1.
Addition 1’s to 20.
Test B, 100 Subtraction Facts
Week 1.
Week three!.  8 groups of 2  6 rounds  Ancient cryptosystems  Newer cryptosystems  Modern cryptosystems  Encryption and decryptions  Math  Security.
Quantum Cryptography ( EECS 598 Presentation) by Amit Marathe.
Elliptic curve arithmetic and applications to cryptography By Uros Abaz Supervised by Dr. Shaun Cooper and Dr. Andre Barczak.
Network Security – Part 2 Public Key Cryptography Spring 2007 V.T. Raja, Ph.D., Oregon State University.
Quantum Cryptography Marshall Roth March 9, 2007.
Quantum information: the new frontier Karl Svozil TU Wien/Theoretical Physics
Matthew Guidry. The Fundamentals of Cryptography  One of the fundamentals of cryptography is that keys selected for various protocols that are computationally.
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Single Photon Quantum Encryption Rob Grove April 25, 2005.
Quantum Computation and Quantum Information – Lecture 2 Part 1 of CS406 – Research Directions in Computing Dr. Rajagopal Nagarajan Assistant: Nick Papanikolaou.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
Quantum computing Alex Karassev. Quantum Computer Quantum computer uses properties of elementary particle that are predicted by quantum mechanics Usual.
Tallinn University of Technology Quantum computer impact on public key cryptography Roman Stepanenko.
Cryptography Instructor : Dr. Yanqing Zhang Presented by : Rajapaksage Jayampthi S.
Physics is becoming too difficult for physicists. — David Hilbert (mathematician)
Quantum Information, Communication and Computing Jan Kříž Department of physics, University of Hradec Králové Doppler Institute for mathematical physics.
Midterm Review Cryptography & Network Security
Quantum Cryptography. Cryptography  Art of writing messages so that no one other than intended receiver can read it.  Encryption – Performing mathematical.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Quantum Computing Basic Concepts and Applications.
Quantum Cryptography Zelam Ngo, David McGrogan. Motivation Age of Information Information is valuable Protecting that Information.
Quantum Computing Paola Cappellaro
Introduction to Quantum Key Distribution
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
CRYPTOGRAPHY & NETWORK SECURITY Introduction and Basic Concepts Eng. Wafaa Kanakri Computer Engineering Umm Al-Qura University.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Nawaf M Albadia
Quantum computing, teleportation, cryptography Computing Teleportation Cryptography.
Quantum Mechanics(14/2) Hongki Lee BIOPHOTONICS ENGINEERING LABORATORY School of Electrical and Electronic Engineering, Yonsei University Quantum Computing.
Introduction to Quantum Computing
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
FNI 1H Quantum Mechanics 1 Quantum Mechanics I don't like it, and I'm sorry I ever had anything to do with it. -- Erwin Schrodinger talking about Quantum.
Cryptography issues – elliptic curves Presented by Tom Nykiel.
Basic Q.C. One moose, two moose Red moose, blue moose Live moose, dead moose.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
IPQI-2010-Anu Venugopalan 1 qubits, quantum registers and gates Anu Venugopalan Guru Gobind Singh Indraprastha Univeristy Delhi _______________________________________________.
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
Quantum Cryptography and Quantum Computing. Cryptography is about a)manipulating information b)transmitting information c)storing information.
An Introduction to Quantum Computation Sandy Irani Department of Computer Science University of California, Irvine.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
Beginner’s Guide to Quantum Computing Graduate Seminar Presentation Oct. 5, 2007.
15-853Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” Including Quantum Communication Quantum Computing.
Cybersecurity: Aspects of Cryptography from a Classical and Quantum Perspective (An Ongoing Review) Joseph Spring University of Hertfordshire British Council.
COMPSCI 290.2: Computer Security
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Quantum Cryptography Alok.T.J EC 11.
Cryptography and Quantum Computing
Spin Many quantum experiments are done with photon polarization instead of electron spin Here is the correspondence between the two And the measurement.
Presentation transcript:

1 Introduction to Quantum Computation and Quantum Information Dr. Raja Nagarajan University of Warwick

2 Introduction Quantum Computing uses the theory of quantum physics as a foundation for a radically new approach to information processing.

3 Features of Quantum Computing It allows for large-scale parallelism Gives a tremendous speedup to some kinds of computation Permits perfectly secure transmission of information

4 The Quantum Bit In classical computers, the unit of information is a bit, which can be either 0 or 1. In quantum computers, the unit of information is a qubit, which can be in a superposition of 0 and 1.

5 Photons with a given Horizontal or Vertical Polarization Electrons with a given spin (up or down) The Hydrogen Atom, with its Ground and Excited States Qubits in Nature

6 Measurement In order to find out about a quantum state, we need to make a measurement or observation Measurement collapses states to basis states

7 The No-cloning Principle Unknown Quantum States cannot be copied.

8 Multiplication vs. Factoring 3 5 = 21 = Which of the above two problems is harder in general?

9 Factoring = Factoring is very hard on classical computers But it can be done efficiently on quantum computers

10 The Searching Problem Searching an unordered list containing N items On a classical computer: O(N) On a quantum computer: O( N)

11 Cryptography Normandy Beach Alice Bob qrupdqgb ehdfk

12 Cryptographic Keys Keys can be learned by: searching (DES) factoring (RSA) If quantum computers are built, much of current computer security technology will become invalid.

13 Making Quantum Computers Quantum Computers can be built Prototypes do exist 57 qubits

14 Quantum Cryptography Fortunately, quantum cryptographic techniques have been developed These can be used to encrypt messages and they are secure even against quantum computers!

15 The Answers… Factoring: 127 x 229 = Code: Caesars cipher