Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cs3102: Theory of Computation Class 27: NP-Complete Desserts (DNA, RSA, BQP, NSA) Spring 2010 University of Virginia David Evans.

Similar presentations


Presentation on theme: "Cs3102: Theory of Computation Class 27: NP-Complete Desserts (DNA, RSA, BQP, NSA) Spring 2010 University of Virginia David Evans."— Presentation transcript:

1 cs3102: Theory of Computation Class 27: NP-Complete Desserts (DNA, RSA, BQP, NSA) Spring 2010 University of Virginia David Evans

2 Reminders Tuesday: PS7 Due Optional Presentation. If you would like to present or perform your artifact in class on May 4, send me an email by 5:00pm on Monday, May 3 explaining what you would like to do and how much time you think you need for this. You’ll get a handout that will help you prepare for the final Tuesday. Check your scores are recorded correctly in Collab

3 Cost of Synthesizing 1990: Human Genome Project starts, estimate $3B to sequence one genome ($0.50/base) 2000: Human Genome Project declared success, cost ~$300M June 2010: Complete Genomics will start offering full-genome sequencing for $5000 ($0.00000083/base) Last class Today

4 Genomes Computing

5 Solving HAMPATH with DNA Make up a two random k -nucleotide sequences for each node: (for example, k = 4 ) Based on Fred Hapgood’s notes on Adelman’s talk A:A 1 = ACTT A 2 = gcag B:B 1 = TCGG B 2 = actg C:C 1 = GGCT C 2 = atgt D:D 1 = GATC D 2 = tcca A B C D Upper and lowercase letters are the same, just written this way for clarity.

6 Encoding the Problem A: A 1 = ACTTA 2 = gcag B: B 1 = TCGGB 2 = actg C: C 1 = GGCTC 2 = atgt D: D 1 = GATCD 2 = tcca If there is a link between two nodes ( X  Y ), create a nucleotide sequence: X 2 Y 1 A B C D For each node, create a complement sequence X 1 X 2 (replace A  T, G  C):

7 Encoding the Problem A: A 1 = ACTTA 2 = gcag B: B 1 = TCGGB 2 = actg C: C 1 = GGCTC 2 = atgt D: D 1 = GATCD 2 = tcca If there is a link between two nodes ( X  Y ), create a nucleotide sequence: X 2 Y 1 A B C D A  B gcagTCGG A  C gcagGGCT B  C actgGGCT B  D actgGATC C  D atgtGATC For each node, create a complement sequence X 1 X 2 (replace A  T, G  C): A’ TGAAcgtc B’ AGCCtgac C’ CCGAtaca D’ CTAGaggt

8 Solving The Problem Mix up all the link and complement DNA strands A  B gcagTCGG A  C gcagGGCT B  C actgGGCT B  D actgGATC C  D atgtGATC A’ TGAAcgtc B’ AGCCtgac C’ CCGAtaca D’ CTAGaggt TGAAcgtc AGCCtgac gcagGGCT TGAAcgtc actgGGCT CTAGaggtCCGAtaca actgGATC atgtGATC

9 Shake it Up! TGAAcgtc AGCCtgac gcagGGCT TGAAcgtc actgGGCT CTAGaggt CCGAtaca actgGATC atgtGATC

10 Path Binding A B C D ACTTgcag TCGGactg GATCtcca GGCTatgt A’ TGAAcgtc gcagGGCT A  B B’ CCGAtaca atgtTCGG B  C C’ AGCCtgac D’ CTAGaggt actgGATC C  D

11 Getting the Solution Shake up all the DNA to get it to bind Extract strands that start with A and end with D Can do this with chemical binding on start/end tags: remove all strands that do not start with A, and then remove all strands that do not end with D Weigh remaining strands to find ones with the right weight (7 * 8 nucleotides) Select one of these and read its sequence

12 Is Church-Turing Thesis Wrong?!? Time to solve problem with DNA computer doesn’t scale with input size – Can shake up any amount of DNA in the same amount of time! Can DNA computers solve undecidable problems? Is TM model robust enough for P to be the same for DNA computer? No (at least not like this). Can simulate everything (including mixing) with TM. No: DNA computer can solve NP-Hard problems in constant time! Volume of DNA needed grows exponentially with input size.

13 DNA-Enhanced PC To solve HAMPATH for 45 vertices, you need ~20M gallons

14 Conclusions. For thousands of years, humans have tried to enhance their inherent computational abilities using manufactured devices. Mechanical devices such as the abacus, the adding machine, and the tabulating machine were important advances. But it was only with the advent of electronic devices and, in particular, the electronic computer some 60 years ago that a qualitative threshold seems to have been passed and problems of considerable difficulty could be solved. It appears that a molecular device has now been used to pass this qualitative threshold for a second time. Len Adleman

15 “A Breakthrough of Gaussian Proportions” Worth A+++++ on PS7!

16 What Sneakers is really about... If P = NP all* cryptography is (in theory) broken! *Not quite all. All cryptography where there are less key bits than total message bits. Information-theoretic crypto (one-time pad) is still perfectly secure. what would happen if P = NP.

17 Cryptosystem Encryption Decryption For security, it should be hard to invert c without k d. For efficiency, it should be easy to invert c with k d.

18 Cryptosystem For security, it should be hard to invert c without k d. For efficiency, it should be easy to invert c with k d.

19 Is BREAK in NP? So, what if P = NP?

20 Would this really mean all cryptography is broken?

21 Moore’s/Kurzweil’s/Tyson’s lawTyson Science’s Endless Golden AgeScience’s Endless Golden Age by Neil DeGrasse (Almost) everything improves exponentially

22

23

24 In practice, if P=NP and computing power continues to improve exponentially, all cryptosystems are eventually broken! In practice, if P=NP and computing power continues to improve exponentially, all cryptosystems are eventually broken! Point where Excel blows up

25 What about actual cryptosystems? “There’s an unwritten rule in astrophysics: your computer simulation must end before you die.” Neil deGrasse Tyson “There’s an unwritten rule in astrophysics: your computer simulation must end before you die.” Neil deGrasse Tyson

26 RSA Public-Key Cryptosystem 1978 Ron Rivest Len Adelman Adi Shamir

27 RSA [Rivest, Shamir, Adelman 78]

28 CS588 Spring 200528 RSA in Perl print pack"C*", split/\D+/, `echo "16iII*o\U@{$/=$z; [(pop,pop,unpack"H*",<>)]} \EsMsKsN0[lN*1lK[d2%Sa2/d0 <X+d*lMLa^*lN%0]dsXx++lMlN /dsM0<J]dsJxp"|dc` (by Adam Back) Until 1997 – Illegal to show this slide to non- US citizens! Until Jan 2000: can export RSA, but only with 512 bit keys Now: can export RSA except to embargoed destinations

29 RSA E(M) = M e mod n D(C) = C d mod n n = pqp, q are prime d is relatively prime to (p – 1)(q – 1) ed  1 (mod (p – 1)(q – 1)) Key property: if you know p and q, it is easy to compute d. Public key: (e, n) Private key: (d, n)

30 Security of RSA Given n, how much work is it to find p and q where n = pq ? Largest challenge factored so far (Jan 2010): b=768 (232 digits) RSA-768RSA-768 2000-computing years General Number Field Sieve (fastest known factoring algorithm) is in

31 Factoring Might Be Hard P P NP NP-Complete Assuming P  NP Factoring? Known to be in NP Not known to be in P Not known to be NP-C Known to be in BQP

32 Complexity Class BQP P = Polynomial time: languages that can be decided by a deterministic TM in  (N k ) steps. NP = Nondeterministic Polynomial time: languages that can be decided by a nondeterministic TM in  (N k ) steps. BQP = Bounded Quantum Polynomial time: languages that can be decided by a quantum TM in  (N k ) steps with at most 1/3 probability of error

33 Quantum Physics for Dummies Light behaves like both a wave and a particle at the same time A single photon is in many states at once but can’t “observe” its state without forcing it into one state Schrödinger’s Cat Put a live cat in a box with cyanide vial that opens depending on quantum state Cat is both dead and alive at the same time until you open the box

34 Quantum Computing Regular bit: either a 0 or a 1 7 bits can represent any one of 2 7 different states Quantum bit (qubit): in 2 possible states at once 7 qubits represent 2 7 different states (at once!) Computation on qubits: try all possible values at once! Richard Feynman, 1982 If you could do regular TM operations with a Quantum TM, this would make QP = NP. But you can’t! Actual operations are strange.

35 What is Known Today What is Unknown Today NP BQP NP BQP NP BQP Any of these could be true!

36 Most “Likely” Universe NP P P BQP NP-Complete

37 Quantum Computers Today Handful of quantum algorithms Shor’s algorithm: factoring in P using a quantum computer Grover’s algorithm: searching N unsorted entries in O(  N) 15 (= 5 * 3) Actual quantum computers 5-qubit computer built by IBM (2001) Implemented Shor’s algorithm to factor 15 (probably 5 * 3) Los Alamos: 7-qubit computer To exceed practical normal computing need > 30 qubits Adding another qubit is more than twice as hard

38 Charge Our P and NP complexity classes are robust – But, not to very strange definitions of a “step” – DNA and Quantum Computers can modify an unbounded amount of state in one time step The universe is a very strange place indeed If BQP=NP it is an even stranger strange place!


Download ppt "Cs3102: Theory of Computation Class 27: NP-Complete Desserts (DNA, RSA, BQP, NSA) Spring 2010 University of Virginia David Evans."

Similar presentations


Ads by Google