Quantum Computing Michael Larson. The Quantum Computer Quantum computers, like all computers, are machines that perform calculations upon data. Quantum.

Slides:



Advertisements
Similar presentations
Department of Computer Science & Engineering University of Washington
Advertisements

Puzzle Twin primes are two prime numbers whose difference is two.
Cryptography and Network Security
Quantum Computing Uf H Nick Bonesteel
Integer Factorization By: Josh Tuggle & Kyle Johnson.
Cove: A Practical Quantum Computer Programming Framework Matt Purkeypile Fall 2008.
Umesh V. Vazirani U. C. Berkeley Quantum Algorithms: a survey.
Quantum Error Correction Joshua Kretchmer Gautam Wilkins Eric Zhou.
Quantum Error Correction SOURCES: Michele Mosca Daniel Gottesman Richard Spillman Andrew Landahl.
Chien Hsing James Wu David Gottesman Andrew Landahl.
Department of Computer Science & Engineering University of Washington
1 Quantum Computing: What’s It Good For? Scott Aaronson Computer Science Department, UC Berkeley January 10,  John.
Quantum Computation and Error Correction Ali Soleimani.
Matthew Guidry. The Fundamentals of Cryptography  One of the fundamentals of cryptography is that keys selected for various protocols that are computationally.
Quantum Computing Joseph Stelmach.
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Shor’s Algorithm Osama Awwad Department of Computer Science Western Michigan University July 12, 2015.
Chapter 18 Superposition and Standing Waves. Waves vs. Particles Waves are very different from particles. Particles have zero size.Waves have a characteristic.
Quantum computing Alex Karassev. Quantum Computer Quantum computer uses properties of elementary particle that are predicted by quantum mechanics Usual.
By: Mike Neumiller & Brian Yarbrough
Tallinn University of Technology Quantum computer impact on public key cryptography Roman Stepanenko.
Presented by: Erik Cox, Shannon Hintzman, Mike Miller, Jacquie Otto, Adam Serdar, Lacie Zimmerman.
Quantum Algorithms for Neural Networks Daniel Shumow.
Quantum Error Correction Jian-Wei Pan Lecture Note 9.
Information Security and Management 4. Finite Fields 8
Cove: A Practical Quantum Computer Programming Framework Matt Purkeypile Doctorate of Computer Science Dissertation Defense June 26, 2009.
Discrete Mathematical Structures (Counting Principles)
Quantum Information Jan Guzowski. Universal Quantum Computers are Only Years Away From David’s Deutsch weblog: „For a long time my standard answer to.
Small-Depth Quantum Circuits Frederic Green Department of Math/CS Clark University Worcester, MA.
Lecture note 8: Quantum Algorithms
October 1 & 3, Introduction to Quantum Computing Lecture 1 of 2 Introduction to Quantum Computing Lecture 1 of 2
An Introduction to Quantum Phenomena and their Effect on Computing Peter Shoemaker MSCS Candidate March 7 th, 2003.
Short course on quantum computing Andris Ambainis University of Latvia.
Quantum Factoring Michele Mosca The Fifth Canadian Summer School on Quantum Information August 3, 2005.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Quantum Cryptoanalysis and Quantum Cryptography (An introduction)
Quantum Computing Basic Concepts and Applications.
1 Lecture 16 Quantum computing Ubiquitous Internet Services The client server paradigm DNS Electronic Mail World Wide Web.
Quantum Computing Paola Cappellaro
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Lecture Nine: Interference of Light Waves: I
Quantum computing, teleportation, cryptography Computing Teleportation Cryptography.
Quantum Computing and Quantum Programming Language
MS310 Quantum Physical Chemistry
Cove: A Practical Quantum Computer Programming Framework Matt Purkeypile (DCS3) Winter 2009.
Quantum Mechanics(14/2) Hongki Lee BIOPHOTONICS ENGINEERING LABORATORY School of Electrical and Electronic Engineering, Yonsei University Quantum Computing.
Introduction to Quantum Computing
Quantum Corby Ziesman Computing. Future of Computing? Transistor-based Computing –Move towards parallel architectures Biological Computing –DNA computing.
A SEMINAR ON Q UANTUM C OMPUTING Institute Of Engineering & Management (CSE 3 rd year batch) Submitted to- Submitted by- Mr. D.P.S. Rathor Sudhir.
Quantum Computing & Algorithms
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
Quantum Computing: An Introduction Khalid Muhammad 1 History of Quantum Computing Bits and Qubits Problems with the Quantum Machine.
An Introduction to Quantum Computation Sandy Irani Department of Computer Science University of California, Irvine.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 667 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 2117 Lecture.
Quantum Computers By Ryan Orvosh.
1 An Introduction to Quantum Computing Sabeen Faridi Ph 70 October 23, 2007.
Quantum Computing: An Introduction
Beginner’s Guide to Quantum Computing Graduate Seminar Presentation Oct. 5, 2007.
COMPSCI 290.2: Computer Security
Introduction to Quantum Computing Lecture 1 of 2
Quantum Cryptography Quantum Computing
For computer scientists
A Ridiculously Brief Overview
Qubit Recycling in Quantum Computation
Quantum Computing Hakem Alazmi Jhilakshi Sharma Linda Vu.
Quantum Computing Joseph Stelmach.
Quantum Cryptography Quantum Computing
Quantum Cryptography Quantum Computing
Presentation transcript:

Quantum Computing Michael Larson

The Quantum Computer Quantum computers, like all computers, are machines that perform calculations upon data. Quantum computers use the principles of superposition and entanglement from the field of quantum mechanics to aid in the performance of these calculations

Superpositioning Superpositioning is a fundamental principle of quantum mechanics Combinations of valid quantum states are themselves valid quantum states An unobserved particle that is capable of being measured in one of two states exists as a superposition of those states

Measurement and Decoherence Superpositioning only occurs while the system is not being measured When a system is measured, it’s superposition collapses to a well defined state. A superposition can be described as the sum of the probabilities that a measurement will find a system in a certain state. Accidental “measurement” of the quantum state leads to unintended collapse of the superposition.

Quantum Entanglement Quantum entanglement occurs when a group of quantum particles cannot be described independently. For quantum computers this means that modification of a quantum bit or register will project changes onto their entangled bits or registers For example, assume “The sum of these two bits is always 1” is a known fact. 1010

The Quantum Bit In a regular computer a bit exists in one of two states, either 0 or 1. In a quantum computer a quantum bit, or qubit exists as a superposition of these two states The creation and manipulation of these quantum bits is the objective of quantum computing

Registers of Qubits A register containing n qubits can be expressed mathematically as a superposition of 2 n quantum states. These states can be described with a 2 n dimensional vector with complex coefficients representing the probability of the represented state. The sum of squares of the magnitude of these coefficients must be equal to 1. Superpositioning and subsequent collapse upon measurement means that quantum computing is nondeterministic. Many samples should be taken to build a probability distribution when calculating an answer

Example 3-Qubit Register StateCoefficientProbability 000a|a| 2 001b|b| 2 010c|c| 2 011d|d| 2 100e|e| 2 101f|f| 2 110g|g| 2 111h|h| 2 Sum of Probabilities |a| 2 + |b| 2 + |c| 2 + |d| 2 + |e| 2 + |f| 2 + |g| 2 + |h| 2 = 1

Shor’s Algorithm The objective of Shor’s algorithm is find a factor of a large number N. Repeatedly finding factors and dividing will result in finding all factors of N. The proposed quantum algorithm works much faster than the best classical algorithm for integer factorization Difficulty and time complexity of large integer factorization is the basis of many security schemes.

Classical View of Shor’s Algorithm 1. Pick a random number a<N and see if it shares a greatest common denominator with N. 2. If the GCD is greater than 1, that GCD is a factor and we are done 3. Use the quantum portion of Shor’s algorithm to find the period of f(x) = a x mod N 4. After finding the smallest period r such that f(x)= f(x+r), this period can be used to generate a r/2 +1 and a r/2 -1, both of which are likely to have a greatest common denominator with N. 5. If not go back to step 1. Step 3 is the quantum portion of this algorithm

Shor’s Period Finding Subroutine Classically we need to calculate a x mod N for every x<N, then analyze the pattern produced to find the period r. For very large N, this very computationally and memory intensive from a classical standpoint. Writing the algorithm as a quantum algorithm that takes advantage of the principles of entanglement and superposition would allow for massive reduction in data and computational cost

Shor’s Period Finding Subroutine(cont) With sufficient qubits, we can initialize a register as a superposition of every 0<=x <= N. The calculation a x mod N can be performed using quantum gates, projecting this distribution onto the second register. Due to effects of constructive and destructive interference in quantum algorithms, certain values of x that seperated by distance r tend to interfere constructively, while others tend to interfere destructively. This leads to one state in the 2nd register having a much higher probability of being measured than any other.

Shor’s Period Finding Subroutine(cont) Due to the principles of quantum entanglement, each time a result is measured in the second register, the first register collapses to a state congruent with that state. If a x mod N is measured to be 1, the probability will be evenly distributed in the first register among x’s such that a x mod N = 1. Given enough sampling, a set of states separated by r would be most commonly measured in register 1 after running the algorithm and collapsing register 2

Shor’s Period Finding Algorithm Example xaxax a x mod N = m x (cont)a x (cont)a x mod N =m (cont)

Shor’s Period Finding Algorithm Example Suppose that measuring the second register most commonly collapses to m = 8. Entanglement with the x register then collapses the register like so (x states not shown have 0 probability) xaxax a x mod N = m

Results Repeated experiments and measuring of the X register will lead to a distribution of elements that are multiples of 4 apart from each other Thus r = 4 N = 15, a = 2 a r/2 + 1 = 5, a r/2 - 1 = 3, both of which are supposed share a greatest common denominator with N=15. In fact 3 and 5 are verifiably the only 2 factors of 15.

Relevance to Parallelism Shor’s algorithm shows that with enough quantum bits and the right algorithm a quantum computer can run massively parallel code by superpositioning various possible initial states and collapsing them with measurement. Every quantum bit effectively doubles parallelism of quantum code because it doubles the number of superpositioned states.

Questions?* *answered only to the best of my understanding.