SlideShare a Scribd company logo
1 of 13
Quantum Computing In Financial Sector
Presented By:
Abhas Dash
18030241051
ITBM (2018-20)
Symbiosis Centre for IT
Mentor :
Mandaar Pande
Abhas Dash
Monday, April 10, 2023
What Are Quantum Computers
• How Classical computers work
It deals in bits i.e. 0 and 1
• How a Quantum Computer works
It deals with qubits i.e. it can be in both the states 0 and 1 ( name
of this phenomenon is Superposition)
Abhas Dash
Monday, April 10, 2023
Quantum Computing Applications and Use Case
 How Quantum Computing is enhancing Traffic Management
 By Quantum Machine Learning better track of weather and
climate data at micro level.
 Quantum Computers can gather the social media data so as to
predict and prevent crimes.
 Many More
https://youtu.be/Bx9GLH_GklA
Abhas Dash
Monday, April 10, 2023
Big Sharks in the field
• Microsoft Services :
 Azure Quantum provides :-
 Quantum solutions, like pre-built solvers and algorithms that run at industrial scale
 Quantum software, including simulators and resource estimation tools, scaled by Azure compute
 Quantum hardware system options with a variety of different qubit architectures.
 Scale, security and support from Azure and trusted partners.
• Google Services:
 Launched TensorFlow Quantum (TFQ), an open-source library for prototyping quantum machine
learning models.
 Google has formed a new laboratory: Embryonic Quantum Data Center.
 Google plans to introduce a cloud service for quantum computing.
 Google has achieved Quantum Supremacy.
Abhas Dash
Monday, April 10, 2023
Quantum Cryptography
 Quantum cryptography is the science of exploiting quantum mechanical properties to
perform cryptographic tasks.
 The most well known and developed application of quantum cryptography is Quantum Key
distribution (QKD).
 An important and unique property of quantum key distribution is the ability of the two
communicating users to detect the presence of any third party trying to gain knowledge of the
key. (Explained in Slide no.7 and 8).
 Entanglement based protocols
The quantum states of two (or more) separate objects can become linked together in such a
way that they must be described by a combined quantum state, not as individual objects. This is
known as entanglement and means that, for example, performing a measurement on one object
affects the other. If an entangled pair of objects is shared between two parties, anyone
intercepting either object alters the overall system, revealing the presence of the third party
(and the amount of information they have gained).
(~wiki)
Abhas Dash
Monday, April 10, 2023
Traditional Banking Authentication Process
Abhas Dash
Monday, April 10, 2023
Tradition Overpowered by Quantum Computer
1. Login ID
2. Login ID sent
3. Login ID verified
4. Sent back Option to Customer
5. Service Options displayed
6. Transaction request
7. Transaction request transmitted
8. Quantum Key Distribution
9. Quantum code produced
10. Quantum code sent
11. Quantum code Verification
12. Transaction confirmation transmitted
13. Transaction confirmed
Abhas Dash
Monday, April 10, 2023
Abhas Dash
Monday, April 10, 2023
Medical use case to address recent CORONA Pandemic
• "In the field of computational chemistry, high accuracy
property prediction is considered to be very difficult.
Running quantum computing methods with Quantum
optimization solutions, we are getting results that are more
accurate than other algorithms."
- Scott Genin, Head of Materials Discovery, OTI Lumionics
Abhas Dash
Monday, April 10, 2023
Thank You
“Quantum Computing will be so powerful, those who
embrace it first have a historic opportunity to bring their
values and ethics into the world at scale.”
Abhas Dash,
Monday, April 10, 2023
Characteristics of quantum cryptography
-The concept of Quantum Cryptography was introduced by Bennett
and Brassard in 1984.
Classical cryptography:
• M=P*Q (Difficult to find P and Q when we know
both are prime numbers and value of M.)
• ABHAS =128119
• 128119 * 143 = 18,321,017 (This is the
cryptographic message but it has to be
converted to binary when it is made to read by
classical computers in the form of binary, 0 and
1).
• Even the best of the classical computer has
limitation in prime number. (Largest prime
number = 2^74207281 -1)
Quantum Cryptograpgy:
• In QC information is transferred in as
photon polarization. (Directions are
0,1,-,+ i.e. vertical and horizontal
and two diagonals)
• Polarization detectors translate
photons to bits if it is passed.
• It is p assed through the filter
because of the position of the
photon.
• Receiver then reaches out to the
sender for which detector he used for
photon.
• After confirmation then the quantum
key is found and used to decrypt
How the traditional encryption system works
Monday, April 10, 2023
For traditional secure transaction
Below 3 steps are followed:
Encryption (It is developed in
software using specific patterns.)
The Exchange (Eavesdropping can
be done just like the diagram.)
Encryption Algorithm (to decode the
encryption so as to get the data.)
e.g. Payroll company
How Quantum cryptography is enhancing the
process
In Quantum cryptography comes up with the following solutions:
 Random Number Generator (For
encryption)
 Quantum Key Distributor ( If also any
eavesdrop happens in the middle , then
Both the parties are alerted.)
Paper taken for reference : Authentication in Online Banking
Systems through Quantum Cryptography by Anand Sharma,
S.K.Lenka. FET, MITS, Lakshmangarh Sikar, Rajasthan, India
Monday, April 10, 2023

More Related Content

What's hot

Quantum Computing - Basic Concepts
Quantum Computing - Basic ConceptsQuantum Computing - Basic Concepts
Quantum Computing - Basic ConceptsSendash Pangambam
 
Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...
Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...
Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...Professor Lili Saghafi
 
Quantum computer
Quantum computerQuantum computer
Quantum computerNikhil Eg
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum ComputingKomal Gupta
 
Presentation on quantum computers
Presentation on quantum computersPresentation on quantum computers
Presentation on quantum computersNancy Mann
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum ComputingJonathan Tan
 
Quantum Computing: The Why and How
Quantum Computing: The Why and HowQuantum Computing: The Why and How
Quantum Computing: The Why and Howinside-BigData.com
 
Quantum computer
Quantum computerQuantum computer
Quantum computerashirafzal1
 
Quantum computing
Quantum computingQuantum computing
Quantum computingSamira Riki
 
What is quantum computing
What is quantum computingWhat is quantum computing
What is quantum computingMariyum Khan
 
Taking Quantum Computing for a Spin: What is Imaginary and What is Real?
Taking Quantum Computing for a Spin: What is Imaginary and What is Real?Taking Quantum Computing for a Spin: What is Imaginary and What is Real?
Taking Quantum Computing for a Spin: What is Imaginary and What is Real?Mike Hogarth, MD, FACMI, FACP
 
Quantum computing
Quantum computingQuantum computing
Quantum computingRitwik MG
 
Quantum computation - Introduction
Quantum computation - IntroductionQuantum computation - Introduction
Quantum computation - IntroductionAakash Martand
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum ComputingKeshav
 

What's hot (20)

Quantum Computing - Basic Concepts
Quantum Computing - Basic ConceptsQuantum Computing - Basic Concepts
Quantum Computing - Basic Concepts
 
Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...
Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...
Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Presentation on quantum computers
Presentation on quantum computersPresentation on quantum computers
Presentation on quantum computers
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum Computing
 
Quantum Computing: The Why and How
Quantum Computing: The Why and HowQuantum Computing: The Why and How
Quantum Computing: The Why and How
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Quantum computing ppt.pptx
Quantum computing ppt.pptxQuantum computing ppt.pptx
Quantum computing ppt.pptx
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
 
Quantum computing
Quantum computing Quantum computing
Quantum computing
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
What is quantum computing
What is quantum computingWhat is quantum computing
What is quantum computing
 
Taking Quantum Computing for a Spin: What is Imaginary and What is Real?
Taking Quantum Computing for a Spin: What is Imaginary and What is Real?Taking Quantum Computing for a Spin: What is Imaginary and What is Real?
Taking Quantum Computing for a Spin: What is Imaginary and What is Real?
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum computation - Introduction
Quantum computation - IntroductionQuantum computation - Introduction
Quantum computation - Introduction
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 

Similar to Quantum Computing Financial Sector Applications

International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
Client server computing in mobile environments part 2
Client server computing in mobile environments part 2Client server computing in mobile environments part 2
Client server computing in mobile environments part 2Praveen Joshi
 
COSMOS Data Analytics Architecture
COSMOS Data Analytics ArchitectureCOSMOS Data Analytics Architecture
COSMOS Data Analytics ArchitectureAdnan Akbar
 
IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET -  	  Identification and Classification of IoT Devices in Various Appli...IRJET -  	  Identification and Classification of IoT Devices in Various Appli...
IRJET - Identification and Classification of IoT Devices in Various Appli...IRJET Journal
 
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...IRJET Journal
 
CoryCookFinalProject535
CoryCookFinalProject535CoryCookFinalProject535
CoryCookFinalProject535Cory Cook
 
Mind My Value: A decentralised infrastructure for fair and trusted IoT data ...
Mind My Value:  A decentralised infrastructure for fair and trusted IoT data ...Mind My Value:  A decentralised infrastructure for fair and trusted IoT data ...
Mind My Value: A decentralised infrastructure for fair and trusted IoT data ...Paolo Missier
 
Fair and trustworthy: Lock-free enhanced tendermint blockchain algorithm
Fair and trustworthy: Lock-free enhanced tendermint blockchain algorithmFair and trustworthy: Lock-free enhanced tendermint blockchain algorithm
Fair and trustworthy: Lock-free enhanced tendermint blockchain algorithmTELKOMNIKA JOURNAL
 
Low-Cost Approximate and Adaptive Monitoring Techniques for the Internet of T...
Low-Cost Approximate and Adaptive Monitoring Techniques for the Internet of T...Low-Cost Approximate and Adaptive Monitoring Techniques for the Internet of T...
Low-Cost Approximate and Adaptive Monitoring Techniques for the Internet of T...Demetris Trihinas
 
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Editor IJARCET
 
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Editor IJARCET
 
Schaffner Quantum Computing and Cryptography.pptx
Schaffner Quantum Computing and Cryptography.pptxSchaffner Quantum Computing and Cryptography.pptx
Schaffner Quantum Computing and Cryptography.pptxsanta142869
 
Global Wireless e voting
Global Wireless e votingGlobal Wireless e voting
Global Wireless e votingSandeep Kumar
 
Global Wireless E-Voting Documentation
Global Wireless E-Voting DocumentationGlobal Wireless E-Voting Documentation
Global Wireless E-Voting DocumentationCharan Reddy Mutyala
 
Criptografía cuántica - fundamentos, productos y empresas
Criptografía cuántica - fundamentos, productos y empresasCriptografía cuántica - fundamentos, productos y empresas
Criptografía cuántica - fundamentos, productos y empresasSoftware Guru
 
Quantum Internet Explained
Quantum Internet ExplainedQuantum Internet Explained
Quantum Internet ExplainedAhmed Banafa
 
computer networks module 1 . fundamentals of networking and data communication
computer networks module 1 . fundamentals of networking and data communicationcomputer networks module 1 . fundamentals of networking and data communication
computer networks module 1 . fundamentals of networking and data communicationNishaJaiswal34
 

Similar to Quantum Computing Financial Sector Applications (20)

Trends in it
Trends in itTrends in it
Trends in it
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Client server computing in mobile environments part 2
Client server computing in mobile environments part 2Client server computing in mobile environments part 2
Client server computing in mobile environments part 2
 
COSMOS Data Analytics Architecture
COSMOS Data Analytics ArchitectureCOSMOS Data Analytics Architecture
COSMOS Data Analytics Architecture
 
IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET -  	  Identification and Classification of IoT Devices in Various Appli...IRJET -  	  Identification and Classification of IoT Devices in Various Appli...
IRJET - Identification and Classification of IoT Devices in Various Appli...
 
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
 
CoryCookFinalProject535
CoryCookFinalProject535CoryCookFinalProject535
CoryCookFinalProject535
 
Mind My Value: A decentralised infrastructure for fair and trusted IoT data ...
Mind My Value:  A decentralised infrastructure for fair and trusted IoT data ...Mind My Value:  A decentralised infrastructure for fair and trusted IoT data ...
Mind My Value: A decentralised infrastructure for fair and trusted IoT data ...
 
Fair and trustworthy: Lock-free enhanced tendermint blockchain algorithm
Fair and trustworthy: Lock-free enhanced tendermint blockchain algorithmFair and trustworthy: Lock-free enhanced tendermint blockchain algorithm
Fair and trustworthy: Lock-free enhanced tendermint blockchain algorithm
 
Low-Cost Approximate and Adaptive Monitoring Techniques for the Internet of T...
Low-Cost Approximate and Adaptive Monitoring Techniques for the Internet of T...Low-Cost Approximate and Adaptive Monitoring Techniques for the Internet of T...
Low-Cost Approximate and Adaptive Monitoring Techniques for the Internet of T...
 
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240
 
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240
 
Schaffner Quantum Computing and Cryptography.pptx
Schaffner Quantum Computing and Cryptography.pptxSchaffner Quantum Computing and Cryptography.pptx
Schaffner Quantum Computing and Cryptography.pptx
 
E010412433
E010412433E010412433
E010412433
 
Global Wireless e voting
Global Wireless e votingGlobal Wireless e voting
Global Wireless e voting
 
Global Wireless E-Voting Documentation
Global Wireless E-Voting DocumentationGlobal Wireless E-Voting Documentation
Global Wireless E-Voting Documentation
 
Criptografía cuántica - fundamentos, productos y empresas
Criptografía cuántica - fundamentos, productos y empresasCriptografía cuántica - fundamentos, productos y empresas
Criptografía cuántica - fundamentos, productos y empresas
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
 
Quantum Internet Explained
Quantum Internet ExplainedQuantum Internet Explained
Quantum Internet Explained
 
computer networks module 1 . fundamentals of networking and data communication
computer networks module 1 . fundamentals of networking and data communicationcomputer networks module 1 . fundamentals of networking and data communication
computer networks module 1 . fundamentals of networking and data communication
 

Recently uploaded

B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxStephen266013
 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxfirstjob4
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationshipsccctableauusergroup
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAroojKhan71
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxolyaivanovalion
 
Call Girls In Mahipalpur O9654467111 Escorts Service
Call Girls In Mahipalpur O9654467111  Escorts ServiceCall Girls In Mahipalpur O9654467111  Escorts Service
Call Girls In Mahipalpur O9654467111 Escorts ServiceSapana Sha
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxolyaivanovalion
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingNeil Barnes
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...Suhani Kapoor
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Callshivangimorya083
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionfulawalesam
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptSonatrach
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz1
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiSuhani Kapoor
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxolyaivanovalion
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxolyaivanovalion
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxolyaivanovalion
 

Recently uploaded (20)

B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docx
 
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptx
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFx
 
Call Girls In Mahipalpur O9654467111 Escorts Service
Call Girls In Mahipalpur O9654467111  Escorts ServiceCall Girls In Mahipalpur O9654467111  Escorts Service
Call Girls In Mahipalpur O9654467111 Escorts Service
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptx
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data Storytelling
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interaction
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
 
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptx
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptx
 
E-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptxE-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptx
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptx
 

Quantum Computing Financial Sector Applications

  • 1. Quantum Computing In Financial Sector Presented By: Abhas Dash 18030241051 ITBM (2018-20) Symbiosis Centre for IT Mentor : Mandaar Pande Abhas Dash Monday, April 10, 2023
  • 2. What Are Quantum Computers • How Classical computers work It deals in bits i.e. 0 and 1 • How a Quantum Computer works It deals with qubits i.e. it can be in both the states 0 and 1 ( name of this phenomenon is Superposition) Abhas Dash Monday, April 10, 2023
  • 3. Quantum Computing Applications and Use Case  How Quantum Computing is enhancing Traffic Management  By Quantum Machine Learning better track of weather and climate data at micro level.  Quantum Computers can gather the social media data so as to predict and prevent crimes.  Many More https://youtu.be/Bx9GLH_GklA Abhas Dash Monday, April 10, 2023
  • 4. Big Sharks in the field • Microsoft Services :  Azure Quantum provides :-  Quantum solutions, like pre-built solvers and algorithms that run at industrial scale  Quantum software, including simulators and resource estimation tools, scaled by Azure compute  Quantum hardware system options with a variety of different qubit architectures.  Scale, security and support from Azure and trusted partners. • Google Services:  Launched TensorFlow Quantum (TFQ), an open-source library for prototyping quantum machine learning models.  Google has formed a new laboratory: Embryonic Quantum Data Center.  Google plans to introduce a cloud service for quantum computing.  Google has achieved Quantum Supremacy. Abhas Dash Monday, April 10, 2023
  • 5. Quantum Cryptography  Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks.  The most well known and developed application of quantum cryptography is Quantum Key distribution (QKD).  An important and unique property of quantum key distribution is the ability of the two communicating users to detect the presence of any third party trying to gain knowledge of the key. (Explained in Slide no.7 and 8).  Entanglement based protocols The quantum states of two (or more) separate objects can become linked together in such a way that they must be described by a combined quantum state, not as individual objects. This is known as entanglement and means that, for example, performing a measurement on one object affects the other. If an entangled pair of objects is shared between two parties, anyone intercepting either object alters the overall system, revealing the presence of the third party (and the amount of information they have gained). (~wiki) Abhas Dash Monday, April 10, 2023
  • 6. Traditional Banking Authentication Process Abhas Dash Monday, April 10, 2023
  • 7. Tradition Overpowered by Quantum Computer 1. Login ID 2. Login ID sent 3. Login ID verified 4. Sent back Option to Customer 5. Service Options displayed 6. Transaction request 7. Transaction request transmitted 8. Quantum Key Distribution 9. Quantum code produced 10. Quantum code sent 11. Quantum code Verification 12. Transaction confirmation transmitted 13. Transaction confirmed Abhas Dash Monday, April 10, 2023
  • 9. Medical use case to address recent CORONA Pandemic • "In the field of computational chemistry, high accuracy property prediction is considered to be very difficult. Running quantum computing methods with Quantum optimization solutions, we are getting results that are more accurate than other algorithms." - Scott Genin, Head of Materials Discovery, OTI Lumionics Abhas Dash Monday, April 10, 2023
  • 10. Thank You “Quantum Computing will be so powerful, those who embrace it first have a historic opportunity to bring their values and ethics into the world at scale.” Abhas Dash, Monday, April 10, 2023
  • 11. Characteristics of quantum cryptography -The concept of Quantum Cryptography was introduced by Bennett and Brassard in 1984. Classical cryptography: • M=P*Q (Difficult to find P and Q when we know both are prime numbers and value of M.) • ABHAS =128119 • 128119 * 143 = 18,321,017 (This is the cryptographic message but it has to be converted to binary when it is made to read by classical computers in the form of binary, 0 and 1). • Even the best of the classical computer has limitation in prime number. (Largest prime number = 2^74207281 -1) Quantum Cryptograpgy: • In QC information is transferred in as photon polarization. (Directions are 0,1,-,+ i.e. vertical and horizontal and two diagonals) • Polarization detectors translate photons to bits if it is passed. • It is p assed through the filter because of the position of the photon. • Receiver then reaches out to the sender for which detector he used for photon. • After confirmation then the quantum key is found and used to decrypt
  • 12. How the traditional encryption system works Monday, April 10, 2023 For traditional secure transaction Below 3 steps are followed: Encryption (It is developed in software using specific patterns.) The Exchange (Eavesdropping can be done just like the diagram.) Encryption Algorithm (to decode the encryption so as to get the data.) e.g. Payroll company
  • 13. How Quantum cryptography is enhancing the process In Quantum cryptography comes up with the following solutions:  Random Number Generator (For encryption)  Quantum Key Distributor ( If also any eavesdrop happens in the middle , then Both the parties are alerted.) Paper taken for reference : Authentication in Online Banking Systems through Quantum Cryptography by Anand Sharma, S.K.Lenka. FET, MITS, Lakshmangarh Sikar, Rajasthan, India Monday, April 10, 2023