SlideShare a Scribd company logo
PREPARED BY:
FENNY THAKRAR
Quantum information theory is the study of
how to integrate information theory with
quantum mechanics, by studying how
information can be stored with (and
retrieved from) a quantum mechanical
system.
QUANTUM INFORMATION TECHNOLOGY
 IS NOTHING BUT DEALING WITH
 COMPUTERS USING QUANTUM
 PHYSICS…
AND HENCE ITS ALSO CALLED
 QUANTUM COMPUTING…
   Computation with coherent atomic-scale
    dynamics.

   The behavior of a quantum computer is
    governed by the laws of quantum
    mechanics.
 In
   quantum systems possibilities
 count, even if they never happen! -like
 particle theory.


 Eachof exponentially many possibilities
 can be used to perform a part of a
 computation at the same time.
Moore’s Law:
    We hit the quantum level 2010~2020.

  Quantum computation is more powerful
than classical computation.

  More can be computed in less time—the
complexity classes are different!
 Digital
        systems have – bit
 Quantum systems have – qubit
   The primary piece of information in quantum
    information theory is the qubit, an analog to the
    bit (1 or 0) in classical information theory.


 The  two position states of a photon in a
    Mach-Zehnder apparatus is just one
    example of a quantum bit or qubit
 Theparticle can exist in a linear
 combination or superposition of the two
 paths

 This
    concept is applied here using qubits for
 computations.
    Quantum Gates are similar to classical
    gates, but do not have a degenerate output.
    i.e. their original input state can be derived
    from their output state, uniquely. They
    must be reversible.

   This means that a deterministic computation
    can be performed on a quantum computer
    only if it is reversible.
The following quantum physics concepts are
  used in Quantum Computing.
 superposition
 Interference(constructive & destructive)
 Coherence
 Entanglement
 Superposition   is a principle of quantum
 theory

 Theprinciple of superposition claims that
 while we do not know what the state of any
 object is, it is actually in all possible states
 simultaneously.

 Mathematically, it refers to a property of
 solutions to the Schrödinger equation
 In physics, interference is the phenomenon
  in which two waves superpose each other to
  form a resultant wave of greater or lower
  amplitude.
In physics, coherence is a property of waves
 that enables stationary (i.e. temporally and
 spatially constant) interference.
Entanglement is a term used in quantum
theory to describe the way that particles of
energy/matter can become correlated to
predictably interact with each other
regardless of how far apart they are.
CRYPTOGRAPHY:-
 Transmitting information with access
 restricted to the intended recipient even if
 the message is intercepted by others.
The process
• Sender      Plaintext                 Key
Encryption

                                   Secure
              Cryptotext           transmission

 Decryption

Recipient      Plaintext
                                  Key ready for use
        Message encryption
                               Secure key distribution
                             Hard Problem for conventional
                             encryption
 Encryption  algorithm and related key are
  kept secret.
 Breaking the system is hard due to large
  numbers of possible keys.
 For example: for a key 128 bits long there
      128          38
   2          10         are keys to check
  using brute force.
 The fundamental difficulty is key
  distribution to parties
   who want to exchange messages.
   In 1970s the Public Key Cryptography
    emerged.
   Each user has two mutually inverse
    keys.
   The encryption key is published;
   The decryption key is kept secret.
   Eg:- Anybody can send a message to Bob
     but only Bob can read it.
   The most widely used PKC is the RSA algorithm
    based on the difficulty of factoring a product
    of two large primes.
   EASY PROBLEM:- Given two large primes p and
    q and compute
                      n     p    q
   HARD PROBLEM:- Given n compute p and q.
   The best known conventional algorithm
    requires the solution time proportional to:

                               1/ 3                2/3
T (n)        exp[ c (ln n )           (ln ln n )         ]
   For p & q 65 digits long T(n) is approximately
    one month using cluster of workstations
                      and
    For p&q 200 digits long T(n) is astronomical.
   In 1994 Peter Shor from the AT&T Bell
    Laboratory showed that in principle a
    quantum computer could factor a very long
    product of primes in seconds.



Shor’s algorithm time computational complexity
  is                      3
       T (n)     O [(ln n ) ]
 It solved THE KEY DISTRIBUTION problem.
 It unconditionally secured the key
  distribution method proposed by Charles
  Bennett and Gilles Brassard in 1984.
 The method is called BB84.
 This
     makes impossible to intercept message
 without being detected.
    Potential (benign) applications
    - Faster combinatorial search
    - Simulating quantum systems

 ‘Spinoff’in quantum optics, chemistry, etc.
 Makes QM accessible to non-physicists
 Surprising connections between physics and
 CS
 New insight into mysteries of the quantum
    Key technical challenge:
    prevent decoherence , or unwanted
    interaction with environment.

    Approaches: NMR, ion trap, quantum dot,
    Josephson junction, opticals,etc….
Quantum Information Technology

More Related Content

What's hot

Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum Computing
Jonathan Tan
 
What is quantum computing
What is quantum computingWhat is quantum computing
What is quantum computing
Mariyum Khan
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
Rajasekhar Manda
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
Samira Riki
 
Quantum Technology
Quantum TechnologyQuantum Technology
Quantum Technology
Jacob Gokul
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
deeksha qanoungo
 
Quantum entanglement
Quantum entanglementQuantum entanglement
Quantum entanglementAKM666
 
Presentation quantum computers
Presentation quantum computersPresentation quantum computers
Presentation quantum computers
AzeemAhmed55
 
Quantum computing seminar
Quantum computing seminarQuantum computing seminar
Quantum computing seminar
Pankaj Kumar
 
Quantum computer
Quantum computerQuantum computer
Quantum computerNikhil Eg
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
dharmsinghggu
 
Quantum computation - Introduction
Quantum computation - IntroductionQuantum computation - Introduction
Quantum computation - IntroductionAakash Martand
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
MuhammadHaroon188
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Himanshu Shekhar
 
quantum computing and Quantum Communications
quantum computing and Quantum Communicationsquantum computing and Quantum Communications
quantum computing and Quantum Communications
Srinivas Bukkuru
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
Krishna Patel
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptographySukhdeep Kaur
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityKamal Diwakar
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
pixiejen
 

What's hot (20)

Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum Computing
 
What is quantum computing
What is quantum computingWhat is quantum computing
What is quantum computing
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum Technology
Quantum TechnologyQuantum Technology
Quantum Technology
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum entanglement
Quantum entanglementQuantum entanglement
Quantum entanglement
 
Presentation quantum computers
Presentation quantum computersPresentation quantum computers
Presentation quantum computers
 
Quantum computing seminar
Quantum computing seminarQuantum computing seminar
Quantum computing seminar
 
Quantum Computing ppt
Quantum Computing  pptQuantum Computing  ppt
Quantum Computing ppt
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum computation - Introduction
Quantum computation - IntroductionQuantum computation - Introduction
Quantum computation - Introduction
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
quantum computing and Quantum Communications
quantum computing and Quantum Communicationsquantum computing and Quantum Communications
quantum computing and Quantum Communications
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic security
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 

Similar to Quantum Information Technology

Quantum communication and quantum computing
Quantum communication and quantum computingQuantum communication and quantum computing
Quantum communication and quantum computing
IOSR Journals
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Nishant Bhardwaj
 
Presentation on quantum computers
Presentation on quantum computersPresentation on quantum computers
Presentation on quantum computers
Nancy Mann
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implications
InnoTech
 
Cryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptxCryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptx
RohanTakke
 
Ibm quantum computing
Ibm quantum computingIbm quantum computing
Ibm quantum computing
Francisco J. Gálvez Ramírez
 
Quantum Information FINAL.pptx
Quantum Information FINAL.pptxQuantum Information FINAL.pptx
Quantum Information FINAL.pptx
gitrahekno
 
Quantum computers by Emran
Quantum computers by EmranQuantum computers by Emran
Quantum computers by Emran
Emran Hossain
 
An Introduction to Quantum computing
An Introduction to Quantum computingAn Introduction to Quantum computing
An Introduction to Quantum computing
Jai Sipani
 
Quantum Internet Explained
Quantum Internet ExplainedQuantum Internet Explained
Quantum Internet Explained
Ahmed Banafa
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
Nolesh_Warke
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
Rishabh Jindal
 
The second quantum revolution: the world beyond binary 0 and 1
The second quantum revolution: the world beyond binary 0 and 1The second quantum revolution: the world beyond binary 0 and 1
The second quantum revolution: the world beyond binary 0 and 1
Bruno Fedrici, PhD
 
osama-quantum-computing.ppt
osama-quantum-computing.pptosama-quantum-computing.ppt
osama-quantum-computing.ppt
SainadhDuppalapudi
 
Quantum & AI in Finance
Quantum & AI in FinanceQuantum & AI in Finance
Quantum & AI in Finance
Object Automation
 
Seminar
SeminarSeminar
quantum-computing.ppt
quantum-computing.pptquantum-computing.ppt
quantum-computing.ppt
MainakChakraborty40
 
Quantum Implementation of RSA Crypto-algorithm using IBM-QISKIT
Quantum Implementation of RSA Crypto-algorithm using IBM-QISKITQuantum Implementation of RSA Crypto-algorithm using IBM-QISKIT
Quantum Implementation of RSA Crypto-algorithm using IBM-QISKIT
IRJET Journal
 
osama-quantum-computing and its uses and applications
osama-quantum-computing and its uses and applicationsosama-quantum-computing and its uses and applications
osama-quantum-computing and its uses and applications
Rachitdas2
 
Quantum & AI in Finance
Quantum & AI in FinanceQuantum & AI in Finance
Quantum & AI in Finance
Object Automation
 

Similar to Quantum Information Technology (20)

Quantum communication and quantum computing
Quantum communication and quantum computingQuantum communication and quantum computing
Quantum communication and quantum computing
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Presentation on quantum computers
Presentation on quantum computersPresentation on quantum computers
Presentation on quantum computers
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implications
 
Cryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptxCryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptx
 
Ibm quantum computing
Ibm quantum computingIbm quantum computing
Ibm quantum computing
 
Quantum Information FINAL.pptx
Quantum Information FINAL.pptxQuantum Information FINAL.pptx
Quantum Information FINAL.pptx
 
Quantum computers by Emran
Quantum computers by EmranQuantum computers by Emran
Quantum computers by Emran
 
An Introduction to Quantum computing
An Introduction to Quantum computingAn Introduction to Quantum computing
An Introduction to Quantum computing
 
Quantum Internet Explained
Quantum Internet ExplainedQuantum Internet Explained
Quantum Internet Explained
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
 
The second quantum revolution: the world beyond binary 0 and 1
The second quantum revolution: the world beyond binary 0 and 1The second quantum revolution: the world beyond binary 0 and 1
The second quantum revolution: the world beyond binary 0 and 1
 
osama-quantum-computing.ppt
osama-quantum-computing.pptosama-quantum-computing.ppt
osama-quantum-computing.ppt
 
Quantum & AI in Finance
Quantum & AI in FinanceQuantum & AI in Finance
Quantum & AI in Finance
 
Seminar
SeminarSeminar
Seminar
 
quantum-computing.ppt
quantum-computing.pptquantum-computing.ppt
quantum-computing.ppt
 
Quantum Implementation of RSA Crypto-algorithm using IBM-QISKIT
Quantum Implementation of RSA Crypto-algorithm using IBM-QISKITQuantum Implementation of RSA Crypto-algorithm using IBM-QISKIT
Quantum Implementation of RSA Crypto-algorithm using IBM-QISKIT
 
osama-quantum-computing and its uses and applications
osama-quantum-computing and its uses and applicationsosama-quantum-computing and its uses and applications
osama-quantum-computing and its uses and applications
 
Quantum & AI in Finance
Quantum & AI in FinanceQuantum & AI in Finance
Quantum & AI in Finance
 

Recently uploaded

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 

Recently uploaded (20)

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 

Quantum Information Technology

  • 2. Quantum information theory is the study of how to integrate information theory with quantum mechanics, by studying how information can be stored with (and retrieved from) a quantum mechanical system.
  • 3. QUANTUM INFORMATION TECHNOLOGY IS NOTHING BUT DEALING WITH COMPUTERS USING QUANTUM PHYSICS… AND HENCE ITS ALSO CALLED QUANTUM COMPUTING…
  • 4. Computation with coherent atomic-scale dynamics.  The behavior of a quantum computer is governed by the laws of quantum mechanics.
  • 5.  In quantum systems possibilities count, even if they never happen! -like particle theory.  Eachof exponentially many possibilities can be used to perform a part of a computation at the same time.
  • 6. Moore’s Law: We hit the quantum level 2010~2020.  Quantum computation is more powerful than classical computation.  More can be computed in less time—the complexity classes are different!
  • 7.  Digital systems have – bit  Quantum systems have – qubit  The primary piece of information in quantum information theory is the qubit, an analog to the bit (1 or 0) in classical information theory.  The two position states of a photon in a Mach-Zehnder apparatus is just one example of a quantum bit or qubit
  • 8.  Theparticle can exist in a linear combination or superposition of the two paths  This concept is applied here using qubits for computations.
  • 9. Quantum Gates are similar to classical gates, but do not have a degenerate output. i.e. their original input state can be derived from their output state, uniquely. They must be reversible.  This means that a deterministic computation can be performed on a quantum computer only if it is reversible.
  • 10. The following quantum physics concepts are used in Quantum Computing.  superposition  Interference(constructive & destructive)  Coherence  Entanglement
  • 11.  Superposition is a principle of quantum theory  Theprinciple of superposition claims that while we do not know what the state of any object is, it is actually in all possible states simultaneously.  Mathematically, it refers to a property of solutions to the Schrödinger equation
  • 12.  In physics, interference is the phenomenon in which two waves superpose each other to form a resultant wave of greater or lower amplitude.
  • 13. In physics, coherence is a property of waves that enables stationary (i.e. temporally and spatially constant) interference.
  • 14. Entanglement is a term used in quantum theory to describe the way that particles of energy/matter can become correlated to predictably interact with each other regardless of how far apart they are.
  • 15.
  • 16. CRYPTOGRAPHY:- Transmitting information with access restricted to the intended recipient even if the message is intercepted by others.
  • 17. The process • Sender Plaintext Key Encryption Secure Cryptotext transmission Decryption Recipient Plaintext Key ready for use Message encryption Secure key distribution Hard Problem for conventional encryption
  • 18.  Encryption algorithm and related key are kept secret.  Breaking the system is hard due to large numbers of possible keys.  For example: for a key 128 bits long there 128 38 2 10 are keys to check using brute force.  The fundamental difficulty is key distribution to parties who want to exchange messages.
  • 19. In 1970s the Public Key Cryptography emerged.  Each user has two mutually inverse keys.  The encryption key is published;  The decryption key is kept secret.  Eg:- Anybody can send a message to Bob but only Bob can read it.
  • 20. The most widely used PKC is the RSA algorithm based on the difficulty of factoring a product of two large primes.  EASY PROBLEM:- Given two large primes p and q and compute n p q  HARD PROBLEM:- Given n compute p and q.
  • 21. The best known conventional algorithm requires the solution time proportional to: 1/ 3 2/3 T (n) exp[ c (ln n ) (ln ln n ) ]  For p & q 65 digits long T(n) is approximately one month using cluster of workstations and For p&q 200 digits long T(n) is astronomical.
  • 22. In 1994 Peter Shor from the AT&T Bell Laboratory showed that in principle a quantum computer could factor a very long product of primes in seconds. Shor’s algorithm time computational complexity is 3 T (n) O [(ln n ) ]
  • 23.  It solved THE KEY DISTRIBUTION problem.  It unconditionally secured the key distribution method proposed by Charles Bennett and Gilles Brassard in 1984.  The method is called BB84.
  • 24.
  • 25.  This makes impossible to intercept message without being detected.
  • 26. Potential (benign) applications - Faster combinatorial search - Simulating quantum systems  ‘Spinoff’in quantum optics, chemistry, etc.  Makes QM accessible to non-physicists  Surprising connections between physics and CS  New insight into mysteries of the quantum
  • 27. Key technical challenge: prevent decoherence , or unwanted interaction with environment.  Approaches: NMR, ion trap, quantum dot, Josephson junction, opticals,etc….