SlideShare une entreprise Scribd logo
1  sur  28
PREPARED BY:
FENNY THAKRAR
Quantum information theory is the study of
how to integrate information theory with
quantum mechanics, by studying how
information can be stored with (and
retrieved from) a quantum mechanical
system.
QUANTUM INFORMATION TECHNOLOGY
 IS NOTHING BUT DEALING WITH
 COMPUTERS USING QUANTUM
 PHYSICS…
AND HENCE ITS ALSO CALLED
 QUANTUM COMPUTING…
   Computation with coherent atomic-scale
    dynamics.

   The behavior of a quantum computer is
    governed by the laws of quantum
    mechanics.
 In
   quantum systems possibilities
 count, even if they never happen! -like
 particle theory.


 Eachof exponentially many possibilities
 can be used to perform a part of a
 computation at the same time.
Moore’s Law:
    We hit the quantum level 2010~2020.

  Quantum computation is more powerful
than classical computation.

  More can be computed in less time—the
complexity classes are different!
 Digital
        systems have – bit
 Quantum systems have – qubit
   The primary piece of information in quantum
    information theory is the qubit, an analog to the
    bit (1 or 0) in classical information theory.


 The  two position states of a photon in a
    Mach-Zehnder apparatus is just one
    example of a quantum bit or qubit
 Theparticle can exist in a linear
 combination or superposition of the two
 paths

 This
    concept is applied here using qubits for
 computations.
    Quantum Gates are similar to classical
    gates, but do not have a degenerate output.
    i.e. their original input state can be derived
    from their output state, uniquely. They
    must be reversible.

   This means that a deterministic computation
    can be performed on a quantum computer
    only if it is reversible.
The following quantum physics concepts are
  used in Quantum Computing.
 superposition
 Interference(constructive & destructive)
 Coherence
 Entanglement
 Superposition   is a principle of quantum
 theory

 Theprinciple of superposition claims that
 while we do not know what the state of any
 object is, it is actually in all possible states
 simultaneously.

 Mathematically, it refers to a property of
 solutions to the Schrödinger equation
 In physics, interference is the phenomenon
  in which two waves superpose each other to
  form a resultant wave of greater or lower
  amplitude.
In physics, coherence is a property of waves
 that enables stationary (i.e. temporally and
 spatially constant) interference.
Entanglement is a term used in quantum
theory to describe the way that particles of
energy/matter can become correlated to
predictably interact with each other
regardless of how far apart they are.
CRYPTOGRAPHY:-
 Transmitting information with access
 restricted to the intended recipient even if
 the message is intercepted by others.
The process
• Sender      Plaintext                 Key
Encryption

                                   Secure
              Cryptotext           transmission

 Decryption

Recipient      Plaintext
                                  Key ready for use
        Message encryption
                               Secure key distribution
                             Hard Problem for conventional
                             encryption
 Encryption  algorithm and related key are
  kept secret.
 Breaking the system is hard due to large
  numbers of possible keys.
 For example: for a key 128 bits long there
      128          38
   2          10         are keys to check
  using brute force.
 The fundamental difficulty is key
  distribution to parties
   who want to exchange messages.
   In 1970s the Public Key Cryptography
    emerged.
   Each user has two mutually inverse
    keys.
   The encryption key is published;
   The decryption key is kept secret.
   Eg:- Anybody can send a message to Bob
     but only Bob can read it.
   The most widely used PKC is the RSA algorithm
    based on the difficulty of factoring a product
    of two large primes.
   EASY PROBLEM:- Given two large primes p and
    q and compute
                      n     p    q
   HARD PROBLEM:- Given n compute p and q.
   The best known conventional algorithm
    requires the solution time proportional to:

                               1/ 3                2/3
T (n)        exp[ c (ln n )           (ln ln n )         ]
   For p & q 65 digits long T(n) is approximately
    one month using cluster of workstations
                      and
    For p&q 200 digits long T(n) is astronomical.
   In 1994 Peter Shor from the AT&T Bell
    Laboratory showed that in principle a
    quantum computer could factor a very long
    product of primes in seconds.



Shor’s algorithm time computational complexity
  is                      3
       T (n)     O [(ln n ) ]
 It solved THE KEY DISTRIBUTION problem.
 It unconditionally secured the key
  distribution method proposed by Charles
  Bennett and Gilles Brassard in 1984.
 The method is called BB84.
 This
     makes impossible to intercept message
 without being detected.
    Potential (benign) applications
    - Faster combinatorial search
    - Simulating quantum systems

 ‘Spinoff’in quantum optics, chemistry, etc.
 Makes QM accessible to non-physicists
 Surprising connections between physics and
 CS
 New insight into mysteries of the quantum
    Key technical challenge:
    prevent decoherence , or unwanted
    interaction with environment.

    Approaches: NMR, ion trap, quantum dot,
    Josephson junction, opticals,etc….
Quantum Information Technology

Contenu connexe

Tendances

Tendances (20)

Quantum Information
Quantum InformationQuantum Information
Quantum Information
 
Quantum Cryptography presentation
Quantum Cryptography presentationQuantum Cryptography presentation
Quantum Cryptography presentation
 
Ibm quantum computing
Ibm quantum computingIbm quantum computing
Ibm quantum computing
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Presentation quantum computers
Presentation quantum computersPresentation quantum computers
Presentation quantum computers
 
Quantum Computing: Welcome to the Future
Quantum Computing: Welcome to the FutureQuantum Computing: Welcome to the Future
Quantum Computing: Welcome to the Future
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum computation - Introduction
Quantum computation - IntroductionQuantum computation - Introduction
Quantum computation - Introduction
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum Computing and AI
Quantum Computing and AIQuantum Computing and AI
Quantum Computing and AI
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum Computing Explained
Quantum Computing ExplainedQuantum Computing Explained
Quantum Computing Explained
 
Quantum entanglement (1).pptx
Quantum entanglement (1).pptxQuantum entanglement (1).pptx
Quantum entanglement (1).pptx
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 

Similaire à Quantum Information Technology

Quantum communication and quantum computing
Quantum communication and quantum computingQuantum communication and quantum computing
Quantum communication and quantum computingIOSR Journals
 
Presentation on quantum computers
Presentation on quantum computersPresentation on quantum computers
Presentation on quantum computersNancy Mann
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implicationsInnoTech
 
Cryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptxCryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptxRohanTakke
 
Quantum Information FINAL.pptx
Quantum Information FINAL.pptxQuantum Information FINAL.pptx
Quantum Information FINAL.pptxgitrahekno
 
Quantum computers by Emran
Quantum computers by EmranQuantum computers by Emran
Quantum computers by EmranEmran Hossain
 
An Introduction to Quantum computing
An Introduction to Quantum computingAn Introduction to Quantum computing
An Introduction to Quantum computingJai Sipani
 
Quantum Internet Explained
Quantum Internet ExplainedQuantum Internet Explained
Quantum Internet ExplainedAhmed Banafa
 
The second quantum revolution: the world beyond binary 0 and 1
The second quantum revolution: the world beyond binary 0 and 1The second quantum revolution: the world beyond binary 0 and 1
The second quantum revolution: the world beyond binary 0 and 1Bruno Fedrici, PhD
 
Quantum Implementation of RSA Crypto-algorithm using IBM-QISKIT
Quantum Implementation of RSA Crypto-algorithm using IBM-QISKITQuantum Implementation of RSA Crypto-algorithm using IBM-QISKIT
Quantum Implementation of RSA Crypto-algorithm using IBM-QISKITIRJET Journal
 
osama-quantum-computing and its uses and applications
osama-quantum-computing and its uses and applicationsosama-quantum-computing and its uses and applications
osama-quantum-computing and its uses and applicationsRachitdas2
 
quantumcomputers-090715210946-phpapp01.pdf
quantumcomputers-090715210946-phpapp01.pdfquantumcomputers-090715210946-phpapp01.pdf
quantumcomputers-090715210946-phpapp01.pdfAjayRaj912848
 

Similaire à Quantum Information Technology (20)

Quantum communication and quantum computing
Quantum communication and quantum computingQuantum communication and quantum computing
Quantum communication and quantum computing
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Presentation on quantum computers
Presentation on quantum computersPresentation on quantum computers
Presentation on quantum computers
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implications
 
Cryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptxCryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptx
 
Quantum Information FINAL.pptx
Quantum Information FINAL.pptxQuantum Information FINAL.pptx
Quantum Information FINAL.pptx
 
Quantum computers by Emran
Quantum computers by EmranQuantum computers by Emran
Quantum computers by Emran
 
An Introduction to Quantum computing
An Introduction to Quantum computingAn Introduction to Quantum computing
An Introduction to Quantum computing
 
Quantum Internet Explained
Quantum Internet ExplainedQuantum Internet Explained
Quantum Internet Explained
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
 
The second quantum revolution: the world beyond binary 0 and 1
The second quantum revolution: the world beyond binary 0 and 1The second quantum revolution: the world beyond binary 0 and 1
The second quantum revolution: the world beyond binary 0 and 1
 
osama-quantum-computing.ppt
osama-quantum-computing.pptosama-quantum-computing.ppt
osama-quantum-computing.ppt
 
Quantum & AI in Finance
Quantum & AI in FinanceQuantum & AI in Finance
Quantum & AI in Finance
 
Seminar
SeminarSeminar
Seminar
 
quantum-computing.ppt
quantum-computing.pptquantum-computing.ppt
quantum-computing.ppt
 
Quantum Implementation of RSA Crypto-algorithm using IBM-QISKIT
Quantum Implementation of RSA Crypto-algorithm using IBM-QISKITQuantum Implementation of RSA Crypto-algorithm using IBM-QISKIT
Quantum Implementation of RSA Crypto-algorithm using IBM-QISKIT
 
osama-quantum-computing and its uses and applications
osama-quantum-computing and its uses and applicationsosama-quantum-computing and its uses and applications
osama-quantum-computing and its uses and applications
 
Quantum & AI in Finance
Quantum & AI in FinanceQuantum & AI in Finance
Quantum & AI in Finance
 
quantumcomputers-090715210946-phpapp01.pdf
quantumcomputers-090715210946-phpapp01.pdfquantumcomputers-090715210946-phpapp01.pdf
quantumcomputers-090715210946-phpapp01.pdf
 

Dernier

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Dernier (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

Quantum Information Technology

  • 2. Quantum information theory is the study of how to integrate information theory with quantum mechanics, by studying how information can be stored with (and retrieved from) a quantum mechanical system.
  • 3. QUANTUM INFORMATION TECHNOLOGY IS NOTHING BUT DEALING WITH COMPUTERS USING QUANTUM PHYSICS… AND HENCE ITS ALSO CALLED QUANTUM COMPUTING…
  • 4. Computation with coherent atomic-scale dynamics.  The behavior of a quantum computer is governed by the laws of quantum mechanics.
  • 5.  In quantum systems possibilities count, even if they never happen! -like particle theory.  Eachof exponentially many possibilities can be used to perform a part of a computation at the same time.
  • 6. Moore’s Law: We hit the quantum level 2010~2020.  Quantum computation is more powerful than classical computation.  More can be computed in less time—the complexity classes are different!
  • 7.  Digital systems have – bit  Quantum systems have – qubit  The primary piece of information in quantum information theory is the qubit, an analog to the bit (1 or 0) in classical information theory.  The two position states of a photon in a Mach-Zehnder apparatus is just one example of a quantum bit or qubit
  • 8.  Theparticle can exist in a linear combination or superposition of the two paths  This concept is applied here using qubits for computations.
  • 9. Quantum Gates are similar to classical gates, but do not have a degenerate output. i.e. their original input state can be derived from their output state, uniquely. They must be reversible.  This means that a deterministic computation can be performed on a quantum computer only if it is reversible.
  • 10. The following quantum physics concepts are used in Quantum Computing.  superposition  Interference(constructive & destructive)  Coherence  Entanglement
  • 11.  Superposition is a principle of quantum theory  Theprinciple of superposition claims that while we do not know what the state of any object is, it is actually in all possible states simultaneously.  Mathematically, it refers to a property of solutions to the Schrödinger equation
  • 12.  In physics, interference is the phenomenon in which two waves superpose each other to form a resultant wave of greater or lower amplitude.
  • 13. In physics, coherence is a property of waves that enables stationary (i.e. temporally and spatially constant) interference.
  • 14. Entanglement is a term used in quantum theory to describe the way that particles of energy/matter can become correlated to predictably interact with each other regardless of how far apart they are.
  • 15.
  • 16. CRYPTOGRAPHY:- Transmitting information with access restricted to the intended recipient even if the message is intercepted by others.
  • 17. The process • Sender Plaintext Key Encryption Secure Cryptotext transmission Decryption Recipient Plaintext Key ready for use Message encryption Secure key distribution Hard Problem for conventional encryption
  • 18.  Encryption algorithm and related key are kept secret.  Breaking the system is hard due to large numbers of possible keys.  For example: for a key 128 bits long there 128 38 2 10 are keys to check using brute force.  The fundamental difficulty is key distribution to parties who want to exchange messages.
  • 19. In 1970s the Public Key Cryptography emerged.  Each user has two mutually inverse keys.  The encryption key is published;  The decryption key is kept secret.  Eg:- Anybody can send a message to Bob but only Bob can read it.
  • 20. The most widely used PKC is the RSA algorithm based on the difficulty of factoring a product of two large primes.  EASY PROBLEM:- Given two large primes p and q and compute n p q  HARD PROBLEM:- Given n compute p and q.
  • 21. The best known conventional algorithm requires the solution time proportional to: 1/ 3 2/3 T (n) exp[ c (ln n ) (ln ln n ) ]  For p & q 65 digits long T(n) is approximately one month using cluster of workstations and For p&q 200 digits long T(n) is astronomical.
  • 22. In 1994 Peter Shor from the AT&T Bell Laboratory showed that in principle a quantum computer could factor a very long product of primes in seconds. Shor’s algorithm time computational complexity is 3 T (n) O [(ln n ) ]
  • 23.  It solved THE KEY DISTRIBUTION problem.  It unconditionally secured the key distribution method proposed by Charles Bennett and Gilles Brassard in 1984.  The method is called BB84.
  • 24.
  • 25.  This makes impossible to intercept message without being detected.
  • 26. Potential (benign) applications - Faster combinatorial search - Simulating quantum systems  ‘Spinoff’in quantum optics, chemistry, etc.  Makes QM accessible to non-physicists  Surprising connections between physics and CS  New insight into mysteries of the quantum
  • 27. Key technical challenge: prevent decoherence , or unwanted interaction with environment.  Approaches: NMR, ion trap, quantum dot, Josephson junction, opticals,etc….