3. Demistifying „quantum”/”qubit”
Quantum Computing: From Theoretical to Tangible, Accenture Report, 2017.
Information representation
• Superposition – before we read the qubits’ value, they are in
interdeterminate state called superposition
• Realisation – electron spin, light polarisation, super
conducting circuits, etc.
Information processing
• Entanglement – in quantum
computation, qubit are
entangled together so changing
state of one qubit influence the
state of other qubits regardless
of their physical distance
• Qubits working together
instrinsically converge faster on
optimal solution than certain
classical approaches
• Could be constructive, but could
be destructive as well
5. What is Cybersecurity?
„Cybersecurity is the practice of deploying people,
policies, processes and technologies to protect
organizations, their critical systems and sensitive
information from digital attacks.”
Confidentiality: No third party can see what is being
sent/communicated
Integrity: No third party can modify the
data/messages without being detected
Authenticity: No third party can impersonate one of
the communicating parties
- we all want to be safe in cyber space -
6. What is Cybersecurity?
„Cybersecurity is the practice of deploying people,
policies, processes and technologies to protect
organizations, their critical systems and sensitive
information from digital attacks.”
Confidentiality: No third party can see what is being
sent/communicated
Integrity: No third party can modify the
data/messages without being detected
Authenticity: No third party can impersonate one of
the communicating parties
?
7. What is Cybersecurity?
„Cybersecurity is the practice of deploying people,
policies, processes and technologies to protect
organizations, their critical systems and sensitive
information from digital attacks.”
Confidentiality: No third party can see what is being
sent/communicated
Integrity: No third party can modify the
data/messages without being detected
Authenticity: No third party can impersonate one of
the communicating parties
CRYPTOGRAPHY plays a role here
https://
10. HTTPS://
Alice Bob
1. Certification with Certificate
Authority
2. Key exchange using public key
cryptograhpy / Diffie-Hellman-
style
3. Secure communication using
shared secure key
4. Public key cryptography:
RSA/ECC
11. • Shor’s algorithm
• Prime factorization
• RSA
• Grover’s algorithm
• Search algorithm
• Unstructured database
Quantum-based algorithms
Daniel J. Bernstein, Tanja Lange, Post-quantum
cryptography, Nature, September 2017.
Accenture report
14. • €2B funding from the European Commission for AI, Quantum and
Digital Skills
• Quantum Technology Flagships
• EuroHPC JU
• EuroQCI
Programmes: grants & tenders