Main Topics from : A Shortcut Through Time. Supercomputers.

Slides:



Advertisements
Similar presentations
RSA COSC 201 ST. MARY’S COLLEGE OF MARYLAND FALL 2012 RSA.
Advertisements

10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Lab 10 : Arithmetic Systems : Adder System Layout: Slide #2 Slide #3 Slide #4 Slide #5 Arithmetic Overflow: 2’s Complement Conversions: 8 Bit Adder/Subtractor.
Code-Breaking with a Quantum Computer Credit for ideas and examples: Prof. N. D. Mermin’s class Phys 681 / Comp Sci 483 “Quantum Computation” (A good class)
©Brooks/Cole, 2003 Chapter 4 Operations on Bits. ©Brooks/Cole, 2003 Apply arithmetic operations on bits when the integer is represented in two’s complement.
Digital Fundamentals Floyd Chapter 2 Tenth Edition
1 Applications of Computers Lecture-3 2 E-Commerce 4 Almost all major companies have their homes on the web, mainly for advertising 4 Companies were.
Quantum Computation and Error Correction Ali Soleimani.
Long distance communication Multiplexing  Allow multiple signals to travel through one medium  Types Frequency division multiplexing Synchronous time.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
7/2/2015Errors1 Transmission errors are a way of life. In the digital world an error means that a bit value is flipped. An error can be isolated to a single.
Unit 1 Protocols Learning Objectives: Understand the need to detect and correct errors in data transmission.
Chapter 2: Algorithm Discovery and Design
Tallinn University of Technology Quantum computer impact on public key cryptography Roman Stepanenko.
Cryptography and Network Security Chapter 11 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
© GCSE Computing Candidates should be able to:  convert positive denary whole numbers (0-255) into 8-bit binary numbers and vice versa  add two 8-bit.
Chapter 3 Digital Logic Structures. Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 3-2 Building Functions.
David Froot.  How do we transmit information and data, especially over the internet, in a way that is secure and unreadable by anyone but the sender.
Binary Addition Addition Rules: = = = = = carry 1 1 carry 1 Example 1: Example 2:
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
The RSA Algorithm Rocky K. C. Chang, March
Number Systems Part 2 Numerical Overflow Right and Left Shifts Storage Methods Subtraction Ranges.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
Chapter 8 Problems Prof. Sin-Min Lee Department of Mathematics and Computer Science.
Quantum Information Jan Guzowski. Universal Quantum Computers are Only Years Away From David’s Deutsch weblog: „For a long time my standard answer to.
An Introduction to Quantum Phenomena and their Effect on Computing Peter Shoemaker MSCS Candidate March 7 th, 2003.
The Binary Number System Part 4 - Multiplication.
Hashing Algorithms: Basic Concepts and SHA-2 CSCI 5857: Encoding and Encryption.
Unit 5 Lecture 2 Error Control Error Detection & Error Correction.
Network Security – Special Topic on Skype Security.
Number Systems Revision of conversations What is a register Addition Complementation.
Computer Science Binary. Binary Code Remember the power supply that is inside your computer and how it sends electricity to all of the components? That.
Lecture 2: Introduction to Cryptography
Quantum Computing by Mathew Ross Jared Davis - Group L -
CRYPTOGRAPHY. WHAT IS PUBLIC-KEY ENCRYPTION? Encryption is the key to information security The main idea- by using only public information, a sender can.
Quantum computing, teleportation, cryptography Computing Teleportation Cryptography.
Quantum Computing and Quantum Programming Language
VLSI AND INTELLIGENT SYTEMS LABORATORY 12 Bit Hamming Code Error Detector/Corrector December 2nd, 2003 Department of Electrical and Computer Engineering.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Digital Logic Structures: Chapter 3 COMP 2610 Dr. James Money COMP
Cryptography and Its Algorithms Scott Chappell. What is Cryptography?  Definition: the art of writing or solving codes.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 PART III: DATA LINK LAYER ERROR DETECTION AND CORRECTION 7.1 Chapter 10.
Chapter 1: Binary Systems
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
As if computers weren’t fast enough already…
The Path to the Quantum Computer By George Johnson Adam Meyer December 8 th, 2008 CS 110.
ECE 101 An Introduction to Information Technology Information Coding.
An Introduction to Quantum Computation Sandy Irani Department of Computer Science University of California, Irvine.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Computer Arthmetic Chapter Four P&H. Data Representation Why do we not encode numbers as strings of ASCII digits inside computers? What is overflow when.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
09/06/ Data Representation ASCII, Binary Denary Conversion, Integer & Boolean data types.
Information and Computer Security CPIS 312 Lab 6 & 7 1 TRIGUI Mohamed Salim Symmetric key cryptography.
Quantum Computing: An Introduction
15-853Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” Including Quantum Communication Quantum Computing.
Hamming Codes The Hamming Code is a Forward Error-correcting Code (FEC) that uses redundant bits to correct a single bit error For 4 bit codes, 3 redundant.
ERROR DETECTION AND CORRECTION
COMPSCI 290.2: Computer Security
Binary Addition and Subtraction
Even/odd parity (1) Computers can sometimes make errors when they transmit data. Even/odd parity: is basic method for detecting if an odd number of bits.
Part III Datalink Layer 10.
User input We’ve seen how to use the standard output buffer
MAT 105 Spring 2008 Chapter 17: Binary Codes.
Quantum Teleportation
Quantum Cryptography Alok.T.J EC 11.
Sequential circuits and Digital System Reliability
Dr. Clincy Professor of CS
Error Detection and Correction
Presentation transcript:

Main Topics from : A Shortcut Through Time

Supercomputers

Traditional Computing Bit – holds a binary digit of 1 or 0. All the parts are made of more than one atom

Quantum computer Uses single atoms Holds 0, 1, or 0 and 1 These types of computer s are special because they can store 2^x different numbers where x is the number of atoms. The drive for wanting these types of computers is that they can test all the different numbers from input or output simultaneously With this type of computer they plan to solve large factoring problems, this would decrease security( covered in a later slide) They would also require And and Not gates. These gates have been proven as plausible by people like Cirac and Zoller. You can not check the digits that are being held until the end otherwise the atoms holding a 0 and 1 will randomly become a 1 or 0.

Making a Computer

The atom and Quantum Computing Atoms can spin up(counterclockwise) Atoms can spin down(clockwise) Atoms can also spin up and down simultaneously Because of this they are perfect for use in quantum computing, they can be effected by lasers and set up to effect each other. By having the atoms effect one another you are able to actually “program” how you want the information to change.

Security Problems caused by Quantum Computers According to Shor’s algorithm, a quantum computer could be used to break extremely large numbers into their primes, something that would previously could take millions of years. The problem with being able to speedily factor large numbers is that most of the encrypted information has been influenced by the prime of a number a company picked, this number is publicly available.

Different approaches to making a Quantum Computer Cavity QED – uses photons NMR – uses molecules, causing the nuclei to spin to represent 0, 1, and 0 and 1.

Checking your information Many errors occur through quantum computing as the atoms get affected by their environment and are no longer both 0 and 1. To fix errors many different approaches have been taken, like adding a 0 if the number of 1s is even and adding a 1 if the number is odd, or by using multiple atoms to store the same bit so that they will all say 1 displaying 1111 so that you know if one is incorrect. The most used way is to add 3 atoms after every four with the rule where the atoms have 1 for odd number of 1s or 0 for even number and the 3 atoms cover the 4 by having the first cover atoms 1,2,3 the second cover 2,3,4 and the third cover 1,2,4.

Encoding data With quantum computers causing data to no longer be safely protected in its current form new way of encoding it needs to be made. The current idea of how to do this uses protons. One proton at a time is sent through a line to the other side with someone on both sides of the line. The person on the sending side randomly turns a block vertically and horizontally and so does the person on the other end. When the person on the other ends scanner reads the proton they write how they were holding the block and the direction the proton was spinning. If it was - / it was 0 if it was I \ it was 1. Then they call each other and the receiver says which way they were holding the block. They keep the data for the points where they both held the block the same way and discard the rest. They can check their data by selecting a small portion of it and comparing. This compared portion is then discarded. Then the binary made from the 1s and 0s is the number that is their new key.