quantum information technology

28
QUANTUM INFORMATION TECHNOLOGY PREPARED BY: FENNY THAKRAR

Upload: fenny-thakrar

Post on 12-Apr-2017

4.088 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Quantum Information Technology

QUANTUM INFORMATIONTECHNOLOGY

PREPARED BY:FENNY

THAKRAR

Page 2: Quantum Information Technology

DEFINITION

Quantum information theory is the study of how to integrate information theory with quantum mechanics, by studying how information can be stored with (and retrieved from) a quantum mechanical system.

Page 3: Quantum Information Technology

QUANTUM INFORMATION TECHNOLOGY IS NOTHING BUT DEALING WITH COMPUTERS USING QUANTUM PHYSICS…

AND HENCE ITS ALSO CALLED QUANTUM COMPUTING…

Page 4: Quantum Information Technology

WHAT IS QUANTUM COMPUTATION?

Computation with coherent atomic-scale dynamics.

The behavior of a quantum computer is governed by the laws of quantum mechanics.

Page 5: Quantum Information Technology

THE POWER OF QUANTUM COMPUTATION…

In quantum systems possibilities count, even if they never happen! -like particle theory.

Each of exponentially many possibilities can be used to perform a part of a computation at the same time.

Page 6: Quantum Information Technology

WHY BOTHER ABOUT QUANTUM COMPUTATION???

Moore’s Law: We hit the quantum level

2010~2020. Quantum computation is more

powerful than classical computation.

More can be computed in less time—the complexity classes are different!

Page 7: Quantum Information Technology

QUBIT Digital systems have – bit Quantum systems have – qubit The primary piece of information in

quantum information theory is the qubit, an analog to the bit (1 or 0) in classical information theory.

The two position states of a photon in a Mach-Zehnder apparatus is just one example of a quantum bit or qubit

Page 8: Quantum Information Technology

PARTICLE THEORY USED

The particle can exist in a linear combination or superposition of the two paths

This concept is applied here using qubits for computations.

Page 9: Quantum Information Technology

QUANTUM GATES Quantum Gates are similar to classical

gates, but do not have a degenerate output. i.e. their original input state can be derived from their output state, uniquely. They must be reversible.

This means that a deterministic

computation can be performed on a quantum computer only if it is reversible.

Page 10: Quantum Information Technology

QUANTUM PHYSICS CONCEPTS USED The following quantum physics concepts

are used in Quantum Computing. superposition Interference(constructive & destructive) Coherence Entanglement

Page 11: Quantum Information Technology

1. SUPERPOSITION Superposition is a principle of

quantum theory

The principle of superposition claims that while we do not know what the state of any object is, it is actually in all possible states simultaneously.

Mathematically, it refers to a property of solutions to the Schrödinger equation

Page 12: Quantum Information Technology

2.INTERFERENCE

In physics, interference is the phenomenon in which two waves superpose each other to form a resultant wave of greater or lower amplitude.

Page 13: Quantum Information Technology

3. COHERENCE

In physics, coherence is a property of waves that enables stationary (i.e. temporally and spatially constant) interference.

Page 14: Quantum Information Technology

4. ENTANGLEMENT

Entanglement is a term used in quantum theory to describe the way that particles of energy/matter can become correlated to predictably interact with each other regardless of how far apart they are.

Page 15: Quantum Information Technology

APPLICATIONS OF QUANTUM COMPUTING

Page 16: Quantum Information Technology

QUANTUM CRYPTOGRAPHYCRYPTOGRAPHY:-

Transmitting information with access restricted to the intended recipient even if the message is intercepted by others.

Page 17: Quantum Information Technology

The process• Sender Plaintext

Cryptotext

Decryption

PlaintextRecipient

Message encryption

Key

Key ready for use

Secure key distribution

Encryption

Securetransmission

Hard Problem for conventionalencryption

Page 18: Quantum Information Technology

THE CLASSIC CRYPTOGRAPHY Encryption algorithm and related

key are kept secret. Breaking the system is hard due to

large numbers of possible keys. For example: for a key 128 bits long

there are keys to

check using brute force. The fundamental difficulty is key

distribution to parties who want to exchange

messages.

38128 102

Page 19: Quantum Information Technology

PKC – THE MODERN CRYPTOGRAPHY In 1970s the Public Key

Cryptography emerged. Each user has two mutually

inverse keys. The encryption key is published; The decryption key is kept

secret. Eg:- Anybody can send a

message to Bob but only Bob can read it.

Page 20: Quantum Information Technology

RSA ALGO The most widely used PKC is the RSA

algorithm based on the difficulty of factoring a product of two large primes.

EASY PROBLEM:- Given two large primes p and q and compute

HARD PROBLEM:- Given n compute p and q.

qpn

Page 21: Quantum Information Technology

FACTORING A PRODUCT OF TWO LARGE PRIMES The best known conventional

algorithm requires the solution time proportional to:

For p & q 65 digits long T(n) is approximately

one month using cluster of workstations

and For p&q 200 digits long T(n) is

astronomical.

])ln(ln)(lnexp[)( 3/23/1 nncnT

Page 22: Quantum Information Technology

QUANTUM COMPUTING ALGORITHM FOR FACTORING In 1994 Peter Shor from the AT&T Bell

Laboratory showed that in principle a quantum computer could factor a very long

product of primes in seconds.

Shor’s algorithm time computational complexity is ])[(ln)( 3nOnT

Page 23: Quantum Information Technology

THE MAIN CONTRIBUTION OF QUANTUM CRYPTOGRAPHY It solved THE KEY DISTRIBUTION

problem. It unconditionally secured the key

distribution method proposed by Charles Bennett and Gilles Brassard in 1984.

The method is called BB84.

Page 24: Quantum Information Technology

QUANTUM KEY DISTRIBUTION

Page 25: Quantum Information Technology

SECURITY OF QUANTUM KEY DISTRIBUTION

This makes impossible to intercept message without being detected.

Page 26: Quantum Information Technology

WHATS THE NEED??!!?? Potential (benign) applications

- Faster combinatorial search - Simulating quantum systems

‘Spinoff’ in quantum optics, chemistry, etc.

Makes QM accessible to non-physicists Surprising connections between physics

and CS New insight into mysteries of the

quantum

Page 27: Quantum Information Technology

GOALS & APPROACHES Key technical challenge:

prevent decoherence , or unwanted interaction with environment.

Approaches: NMR, ion trap, quantum dot,Josephson junction, opticals,etc….

Page 28: Quantum Information Technology

THANK YOU !!!