SlideShare une entreprise Scribd logo
1  sur  28
PREPARED BY:
FENNY THAKRAR
Quantum information theory is the study of
how to integrate information theory with
quantum mechanics, by studying how
information can be stored with (and
retrieved from) a quantum mechanical
system.
QUANTUM INFORMATION TECHNOLOGY
 IS NOTHING BUT DEALING WITH
 COMPUTERS USING QUANTUM
 PHYSICS…
AND HENCE ITS ALSO CALLED
 QUANTUM COMPUTING…
   Computation with coherent atomic-scale
    dynamics.

   The behavior of a quantum computer is
    governed by the laws of quantum
    mechanics.
 In
   quantum systems possibilities
 count, even if they never happen! -like
 particle theory.


 Eachof exponentially many possibilities
 can be used to perform a part of a
 computation at the same time.
Moore’s Law:
    We hit the quantum level 2010~2020.

  Quantum computation is more powerful
than classical computation.

  More can be computed in less time—the
complexity classes are different!
 Digital
        systems have – bit
 Quantum systems have – qubit
   The primary piece of information in quantum
    information theory is the qubit, an analog to the
    bit (1 or 0) in classical information theory.


 The  two position states of a photon in a
    Mach-Zehnder apparatus is just one
    example of a quantum bit or qubit
 Theparticle can exist in a linear
 combination or superposition of the two
 paths

 This
    concept is applied here using qubits for
 computations.
    Quantum Gates are similar to classical
    gates, but do not have a degenerate output.
    i.e. their original input state can be derived
    from their output state, uniquely. They
    must be reversible.

   This means that a deterministic computation
    can be performed on a quantum computer
    only if it is reversible.
The following quantum physics concepts are
  used in Quantum Computing.
 superposition
 Interference(constructive & destructive)
 Coherence
 Entanglement
 Superposition   is a principle of quantum
 theory

 Theprinciple of superposition claims that
 while we do not know what the state of any
 object is, it is actually in all possible states
 simultaneously.

 Mathematically, it refers to a property of
 solutions to the Schrödinger equation
 In physics, interference is the phenomenon
  in which two waves superpose each other to
  form a resultant wave of greater or lower
  amplitude.
In physics, coherence is a property of waves
 that enables stationary (i.e. temporally and
 spatially constant) interference.
Entanglement is a term used in quantum
theory to describe the way that particles of
energy/matter can become correlated to
predictably interact with each other
regardless of how far apart they are.
CRYPTOGRAPHY:-
 Transmitting information with access
 restricted to the intended recipient even if
 the message is intercepted by others.
The process
• Sender      Plaintext                 Key
Encryption

                                   Secure
              Cryptotext           transmission

 Decryption

Recipient      Plaintext
                                  Key ready for use
        Message encryption
                               Secure key distribution
                             Hard Problem for conventional
                             encryption
 Encryption  algorithm and related key are
  kept secret.
 Breaking the system is hard due to large
  numbers of possible keys.
 For example: for a key 128 bits long there
      128          38
   2          10         are keys to check
  using brute force.
 The fundamental difficulty is key
  distribution to parties
   who want to exchange messages.
   In 1970s the Public Key Cryptography
    emerged.
   Each user has two mutually inverse
    keys.
   The encryption key is published;
   The decryption key is kept secret.
   Eg:- Anybody can send a message to Bob
     but only Bob can read it.
   The most widely used PKC is the RSA algorithm
    based on the difficulty of factoring a product
    of two large primes.
   EASY PROBLEM:- Given two large primes p and
    q and compute
                      n     p    q
   HARD PROBLEM:- Given n compute p and q.
   The best known conventional algorithm
    requires the solution time proportional to:

                               1/ 3                2/3
T (n)        exp[ c (ln n )           (ln ln n )         ]
   For p & q 65 digits long T(n) is approximately
    one month using cluster of workstations
                      and
    For p&q 200 digits long T(n) is astronomical.
   In 1994 Peter Shor from the AT&T Bell
    Laboratory showed that in principle a
    quantum computer could factor a very long
    product of primes in seconds.



Shor’s algorithm time computational complexity
  is                      3
       T (n)     O [(ln n ) ]
 It solved THE KEY DISTRIBUTION problem.
 It unconditionally secured the key
  distribution method proposed by Charles
  Bennett and Gilles Brassard in 1984.
 The method is called BB84.
 This
     makes impossible to intercept message
 without being detected.
    Potential (benign) applications
    - Faster combinatorial search
    - Simulating quantum systems

 ‘Spinoff’in quantum optics, chemistry, etc.
 Makes QM accessible to non-physicists
 Surprising connections between physics and
 CS
 New insight into mysteries of the quantum
    Key technical challenge:
    prevent decoherence , or unwanted
    interaction with environment.

    Approaches: NMR, ion trap, quantum dot,
    Josephson junction, opticals,etc….
Quantum Information Technology

Contenu connexe

Tendances

Tendances (20)

6G Technology
6G Technology6G Technology
6G Technology
 
Quantum Computing: Welcome to the Future
Quantum Computing: Welcome to the FutureQuantum Computing: Welcome to the Future
Quantum Computing: Welcome to the Future
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Quantum teleportation
Quantum teleportationQuantum teleportation
Quantum teleportation
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
What is quantum computing
What is quantum computingWhat is quantum computing
What is quantum computing
 
Diamond chip
Diamond chipDiamond chip
Diamond chip
 
Overview of quantum computing and it's application in artificial intelligence
Overview of quantum computing and it's application in artificial intelligenceOverview of quantum computing and it's application in artificial intelligence
Overview of quantum computing and it's application in artificial intelligence
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
SMART DUST
SMART DUSTSMART DUST
SMART DUST
 
Nano computing.
Nano computing.Nano computing.
Nano computing.
 
Quantum computing - Introduction
Quantum computing - IntroductionQuantum computing - Introduction
Quantum computing - Introduction
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Quantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportQuantum Cryptography - Seminar report
Quantum Cryptography - Seminar report
 
Wireless Sensor Networks ppt
Wireless Sensor Networks pptWireless Sensor Networks ppt
Wireless Sensor Networks ppt
 
5G Wireless Technology
5G Wireless Technology5G Wireless Technology
5G Wireless Technology
 
quantum computing and Quantum Communications
quantum computing and Quantum Communicationsquantum computing and Quantum Communications
quantum computing and Quantum Communications
 
BRAIN CHIP TECHNOLOGY
BRAIN CHIP TECHNOLOGYBRAIN CHIP TECHNOLOGY
BRAIN CHIP TECHNOLOGY
 

Similaire à Quantum Information Technology

Quantum communication and quantum computing
Quantum communication and quantum computingQuantum communication and quantum computing
Quantum communication and quantum computing
IOSR Journals
 

Similaire à Quantum Information Technology (20)

Quantum Information
Quantum InformationQuantum Information
Quantum Information
 
Quantum communication and quantum computing
Quantum communication and quantum computingQuantum communication and quantum computing
Quantum communication and quantum computing
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Presentation on quantum computers
Presentation on quantum computersPresentation on quantum computers
Presentation on quantum computers
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implications
 
Cryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptxCryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptx
 
Ibm quantum computing
Ibm quantum computingIbm quantum computing
Ibm quantum computing
 
Quantum Information FINAL.pptx
Quantum Information FINAL.pptxQuantum Information FINAL.pptx
Quantum Information FINAL.pptx
 
Quantum computers by Emran
Quantum computers by EmranQuantum computers by Emran
Quantum computers by Emran
 
An Introduction to Quantum computing
An Introduction to Quantum computingAn Introduction to Quantum computing
An Introduction to Quantum computing
 
Quantum Internet Explained
Quantum Internet ExplainedQuantum Internet Explained
Quantum Internet Explained
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
 
The second quantum revolution: the world beyond binary 0 and 1
The second quantum revolution: the world beyond binary 0 and 1The second quantum revolution: the world beyond binary 0 and 1
The second quantum revolution: the world beyond binary 0 and 1
 
osama-quantum-computing.ppt
osama-quantum-computing.pptosama-quantum-computing.ppt
osama-quantum-computing.ppt
 
Quantum & AI in Finance
Quantum & AI in FinanceQuantum & AI in Finance
Quantum & AI in Finance
 
Seminar
SeminarSeminar
Seminar
 
quantum-computing.ppt
quantum-computing.pptquantum-computing.ppt
quantum-computing.ppt
 
Quantum Implementation of RSA Crypto-algorithm using IBM-QISKIT
Quantum Implementation of RSA Crypto-algorithm using IBM-QISKITQuantum Implementation of RSA Crypto-algorithm using IBM-QISKIT
Quantum Implementation of RSA Crypto-algorithm using IBM-QISKIT
 
osama-quantum-computing and its uses and applications
osama-quantum-computing and its uses and applicationsosama-quantum-computing and its uses and applications
osama-quantum-computing and its uses and applications
 
Quantum & AI in Finance
Quantum & AI in FinanceQuantum & AI in Finance
Quantum & AI in Finance
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Quantum Information Technology

  • 2. Quantum information theory is the study of how to integrate information theory with quantum mechanics, by studying how information can be stored with (and retrieved from) a quantum mechanical system.
  • 3. QUANTUM INFORMATION TECHNOLOGY IS NOTHING BUT DEALING WITH COMPUTERS USING QUANTUM PHYSICS… AND HENCE ITS ALSO CALLED QUANTUM COMPUTING…
  • 4. Computation with coherent atomic-scale dynamics.  The behavior of a quantum computer is governed by the laws of quantum mechanics.
  • 5.  In quantum systems possibilities count, even if they never happen! -like particle theory.  Eachof exponentially many possibilities can be used to perform a part of a computation at the same time.
  • 6. Moore’s Law: We hit the quantum level 2010~2020.  Quantum computation is more powerful than classical computation.  More can be computed in less time—the complexity classes are different!
  • 7.  Digital systems have – bit  Quantum systems have – qubit  The primary piece of information in quantum information theory is the qubit, an analog to the bit (1 or 0) in classical information theory.  The two position states of a photon in a Mach-Zehnder apparatus is just one example of a quantum bit or qubit
  • 8.  Theparticle can exist in a linear combination or superposition of the two paths  This concept is applied here using qubits for computations.
  • 9. Quantum Gates are similar to classical gates, but do not have a degenerate output. i.e. their original input state can be derived from their output state, uniquely. They must be reversible.  This means that a deterministic computation can be performed on a quantum computer only if it is reversible.
  • 10. The following quantum physics concepts are used in Quantum Computing.  superposition  Interference(constructive & destructive)  Coherence  Entanglement
  • 11.  Superposition is a principle of quantum theory  Theprinciple of superposition claims that while we do not know what the state of any object is, it is actually in all possible states simultaneously.  Mathematically, it refers to a property of solutions to the Schrödinger equation
  • 12.  In physics, interference is the phenomenon in which two waves superpose each other to form a resultant wave of greater or lower amplitude.
  • 13. In physics, coherence is a property of waves that enables stationary (i.e. temporally and spatially constant) interference.
  • 14. Entanglement is a term used in quantum theory to describe the way that particles of energy/matter can become correlated to predictably interact with each other regardless of how far apart they are.
  • 15.
  • 16. CRYPTOGRAPHY:- Transmitting information with access restricted to the intended recipient even if the message is intercepted by others.
  • 17. The process • Sender Plaintext Key Encryption Secure Cryptotext transmission Decryption Recipient Plaintext Key ready for use Message encryption Secure key distribution Hard Problem for conventional encryption
  • 18.  Encryption algorithm and related key are kept secret.  Breaking the system is hard due to large numbers of possible keys.  For example: for a key 128 bits long there 128 38 2 10 are keys to check using brute force.  The fundamental difficulty is key distribution to parties who want to exchange messages.
  • 19. In 1970s the Public Key Cryptography emerged.  Each user has two mutually inverse keys.  The encryption key is published;  The decryption key is kept secret.  Eg:- Anybody can send a message to Bob but only Bob can read it.
  • 20. The most widely used PKC is the RSA algorithm based on the difficulty of factoring a product of two large primes.  EASY PROBLEM:- Given two large primes p and q and compute n p q  HARD PROBLEM:- Given n compute p and q.
  • 21. The best known conventional algorithm requires the solution time proportional to: 1/ 3 2/3 T (n) exp[ c (ln n ) (ln ln n ) ]  For p & q 65 digits long T(n) is approximately one month using cluster of workstations and For p&q 200 digits long T(n) is astronomical.
  • 22. In 1994 Peter Shor from the AT&T Bell Laboratory showed that in principle a quantum computer could factor a very long product of primes in seconds. Shor’s algorithm time computational complexity is 3 T (n) O [(ln n ) ]
  • 23.  It solved THE KEY DISTRIBUTION problem.  It unconditionally secured the key distribution method proposed by Charles Bennett and Gilles Brassard in 1984.  The method is called BB84.
  • 24.
  • 25.  This makes impossible to intercept message without being detected.
  • 26. Potential (benign) applications - Faster combinatorial search - Simulating quantum systems  ‘Spinoff’in quantum optics, chemistry, etc.  Makes QM accessible to non-physicists  Surprising connections between physics and CS  New insight into mysteries of the quantum
  • 27. Key technical challenge: prevent decoherence , or unwanted interaction with environment.  Approaches: NMR, ion trap, quantum dot, Josephson junction, opticals,etc….