SlideShare a Scribd company logo
Quantum Computing
The Next Generation of Computing Devices?
by Heiko Frost, Seth Herve and Daniel Matthews
What is a Quantum Computer?
Quantum Computer
A computer that uses quantum mechanical
phenomena to perform operations on data through
devices such as superposition and entanglement.
Classical Computer (Binary)
A computer that uses voltages flowing through
circuits and gates, which can be calculated entirely
by classical mechanics.
The Need For Speed...
 Classical Digital Computer
 Moore’s Law: # of transistors on chip doubles every 18 months—
microprocessor circuits will measure on atomic scale by 2020-2030
 Downscaling of circuit board layout/components is leading to
discrepancies.
 Copper traces are actually crystallizing and shorting out!
 Emergence of quantum phenomena such as electrons tunneling through
the barriers between wires.
 Serial Processing – one operation at a time
 64-bit classical computer operates speeds measured in gigaflops (billions of
floating-point operations per second).
 Quantum Computer
 Harnesses the power of atoms and molecules to perform memory and
processing tasks
 Parallel Processing – millions of operations at a time
 30-qubit quantum computer equals the processing power
of conventional computer that running at 10 teraflops
(trillions of floating-point operations per second).
Classical vs Quantum Bits
 Classical Bit
 2 Basic states – off or on: 0, 1
 Mutually exclusive
 Quantum Bit (Qubit)
 2 Basic states – ket 0, ket 1:
 Superposition of both states –
(not continuous in nature)
 Quantum entanglement
 2 or more objects must be
described in reference to one
another
 Entanglement is a non-local
property that allows a set of
qubits to express
superpositions of different
binary strings (01010 and
11111, for example)
simultaneously
| 0 , |1〉 〉
2 2
Pure Quibit State:
| 0 |1
where ,
s.t. 1
8 Possible States
per Qubit
a b
a b
a b
Ψ = 〉 + 〉
∈
= +
∴
£
Quantum Computing Power
Integer Factorization
Impossible for digital computers to factor large
numbers which are the products of two primes of
nearly equal size
Quantum Computer with 2n qubits can factor
numbers with lengths of n bits (binary)
Quantum Database Search
Example: To search the entire Library of Congress
for one’s name given an unsorted database...
Classical Computer – 100 years
Quantum Computer – ½ second
Practical Quantum Computer Applications
Quantum Mechanics Simulations
physics, chemistry, materials science,
nanotechnology, biology and medicine.
Computer can compute millions of variables at once.
All are limited today by the slow speed of quantum
mechanical simulations.
Cryptoanalysis
Capable of cracking extremely complicated codes
RSA encryption
Typically uses numbers with over 200 digits
Quantum Computing History
 1973 - Alexander Holevo publishes paper showing that n qubits cannot carry more than n classical bits of information.
 1976 - Polish mathematical physicist Roman Ingarden shows that Shannon information theory cannot directly be generalized to the quantum case.
 1981 - Richard Feynman determines that it is impossible to efficiently simulate a evolution of a quantum system on a classical computer.
 1985 - David Deutsch of the University of Oxford, describes the first universal quantum computer.1985 - David Deutsch of the University of Oxford, describes the first universal quantum computer.
 1993 - Dan Simon, at Universite de Montreal, invents an oracle problem for which quantum computer would be exponentially faster than conventional
computer. This algorithm introduced the main ideas which were then developed in Peter Shor's factoring algorithm.
 1994 - Peter Shor, at AT&T's Bell Labs discovers algorithm to allow quantum computers to factor large integers quickly. Shor's algorithm could
theoretically break many of the cryptosystems in use today.
 1995 - Shor proposs the first scheme for quantum error correction.
 1996 - Lov Grover, at Bell Labs, invents quantum database search algorithm.
 1997 - David Cory, A.F. Fahmy, Timothy Havel, Neil Gershenfeld and Isaac Chuang publish the first papers1997 - David Cory, A.F. Fahmy, Timothy Havel, Neil Gershenfeld and Isaac Chuang publish the first papers
on quantum computers based on bulk spin resonance, or thermal ensembles. Computers are actually aon quantum computers based on bulk spin resonance, or thermal ensembles. Computers are actually a
single, small molecule, storing qubits in the spin of protons and neutrons. Trillions of trillions of these cansingle, small molecule, storing qubits in the spin of protons and neutrons. Trillions of trillions of these can
float in a cup of water.float in a cup of water.
 1998 - First working 2-qubit NMR computer demonstrated at University of California, Berkeley.
 1999 - First working 3-qubit NMR computer demonstrated at IBM's Almaden Research Center. First execution of Grover's algorithm.
 2000 - First working 5-qubit NMR computer demonstrated at IBM's Almaden Research Center.
 2001 - First working 7-qubit NMR computer demonstrated at IBM's Almaden Research Center.2001 - First working 7-qubit NMR computer demonstrated at IBM's Almaden Research Center.
First execution of Shor's algorithm. The number 15 was factored using 1018 identicalFirst execution of Shor's algorithm. The number 15 was factored using 1018 identical
molecules, each containing 7 atoms.molecules, each containing 7 atoms.
Candidates for Quantum Computers
 Superconductor-based quantum computers
(including SQUID-based quantum computers)
 Ion trap-based quantum computers
 "Nuclear magnetic resonance on molecules in solution"-based
 “Quantum dot on surface"-based
 “Laser acting on floating ions (in vacuum)"-based (Ion trapping)
 "Cavity quantum electrodynamics" (CQED)-based
 Molecular magnet-based
 Fullerene-based ESR quantum computer
 Solid state NMR Kane quantum computer
Quantum Computing Problems
 Current technology
≈ 40 Qubit operating machine needed to rival current
classical equivalents.
 Errors
Decoherence - the tendency of a quantum computer to
decay from a given quantum state into an incoherent state
as it interacts with the environment.
Interactions are unavoidable and induce breakdown of information
stored in the quantum computer resulting in computation errors.
Error rates are typically proportional to the ratio of operating
time to decoherence time
operations must be completed much quicker than the decoherence
time.
Research References
 http://www.qubit.org
 http://www.cs.caltech.edu/~westside/quantum-intro.html
 http://computer.howstuffworks.com/quantum-computer1.htm
 http://en.wikipedia.org/wiki/Quantum_computers
 http://www.carolla.com/quantum/QuantumComputers.htm

More Related Content

What's hot

Quantum Computer
Quantum ComputerQuantum Computer
Quantum Computer
Towfiqul Islam
 
Quantum computing presentation 200115
Quantum computing presentation 200115Quantum computing presentation 200115
Quantum computing presentation 200115
Muhammad Habibullah Siddiqui
 
Quantum Computing by Rajeev Chauhan
Quantum Computing by Rajeev ChauhanQuantum Computing by Rajeev Chauhan
Quantum Computing by Rajeev Chauhan
OWASP Delhi
 
QuantumComputersPresentation
QuantumComputersPresentationQuantumComputersPresentation
QuantumComputersPresentationVinayak Suresh
 
Quantum Computers
Quantum ComputersQuantum Computers
Quantum Computers
NAGUR SHAREEF SHAIK
 
Des2017 quantum computing_final
Des2017 quantum computing_finalDes2017 quantum computing_final
Des2017 quantum computing_final
Francisco J. Gálvez Ramírez
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
Stephen Habegger
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
salmanjilani
 
Quantum Computers
Quantum ComputersQuantum Computers
Quantum Computers
khan saad bin hasan
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
LAKSHMI TEJA SAYABARAPU
 
Quantum Information Technology
Quantum Information TechnologyQuantum Information Technology
Quantum Information Technology
Fenny Thakrar
 
Quantum Computers- How do quantum computers work
 Quantum Computers- How do quantum computers work Quantum Computers- How do quantum computers work
Quantum Computers- How do quantum computers work
texolworld
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
Kumar Abhijeet
 
Qunatum computing
Qunatum computing Qunatum computing
Qunatum computing
Shivangi Gupta
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
Ritwik MG
 
Quantum computing
Quantum computingQuantum computing
Quantum computing seminar
Quantum computing seminarQuantum computing seminar
Quantum computing seminar
Pankaj Kumar
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
Krishna Patel
 
Let's build a quantum computer!
Let's build a quantum computer!Let's build a quantum computer!
Let's build a quantum computer!
Andreas Dewes
 

What's hot (20)

Quantum Computer
Quantum ComputerQuantum Computer
Quantum Computer
 
Quantum computing presentation 200115
Quantum computing presentation 200115Quantum computing presentation 200115
Quantum computing presentation 200115
 
Quantum Computing by Rajeev Chauhan
Quantum Computing by Rajeev ChauhanQuantum Computing by Rajeev Chauhan
Quantum Computing by Rajeev Chauhan
 
QuantumComputersPresentation
QuantumComputersPresentationQuantumComputersPresentation
QuantumComputersPresentation
 
Quantum Computers
Quantum ComputersQuantum Computers
Quantum Computers
 
Quantum computer ppt
Quantum computer pptQuantum computer ppt
Quantum computer ppt
 
Des2017 quantum computing_final
Des2017 quantum computing_finalDes2017 quantum computing_final
Des2017 quantum computing_final
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum Computers
Quantum ComputersQuantum Computers
Quantum Computers
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
 
Quantum Information Technology
Quantum Information TechnologyQuantum Information Technology
Quantum Information Technology
 
Quantum Computers- How do quantum computers work
 Quantum Computers- How do quantum computers work Quantum Computers- How do quantum computers work
Quantum Computers- How do quantum computers work
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
 
Qunatum computing
Qunatum computing Qunatum computing
Qunatum computing
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum computing seminar
Quantum computing seminarQuantum computing seminar
Quantum computing seminar
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Let's build a quantum computer!
Let's build a quantum computer!Let's build a quantum computer!
Let's build a quantum computer!
 

Similar to Quantum computing

Quantum computers
Quantum computersQuantum computers
Quantum computers
Rishabh Jindal
 
Presentation on quantum_computing
Presentation on quantum_computingPresentation on quantum_computing
Presentation on quantum_computing
AltafAlam12
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implications
InnoTech
 
From Bits to Qubits: Can Medicine Benefit From Quantum Computing?
From Bits to Qubits: Can Medicine Benefit From Quantum Computing?From Bits to Qubits: Can Medicine Benefit From Quantum Computing?
From Bits to Qubits: Can Medicine Benefit From Quantum Computing?
Mike Hogarth, MD, FACMI, FACP
 
Ibm quantum computing
Ibm quantum computingIbm quantum computing
Ibm quantum computing
Francisco J. Gálvez Ramírez
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
Nolesh_Warke
 
Quantum Computers.ppt
Quantum Computers.pptQuantum Computers.ppt
Quantum Computers.ppt
alimohammed194539
 
Quantum Computers.ppt
Quantum Computers.pptQuantum Computers.ppt
Quantum Computers.ppt
zuhaibmohammed465
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
Julien33x
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
Geet Patel
 
Quantum computers by Emran
Quantum computers by EmranQuantum computers by Emran
Quantum computers by Emran
Emran Hossain
 
quantumcomputer-190731154949.pptx
quantumcomputer-190731154949.pptxquantumcomputer-190731154949.pptx
quantumcomputer-190731154949.pptx
AjayRaj912848
 
Quantum computing ajay.pptx
Quantum computing ajay.pptxQuantum computing ajay.pptx
Quantum computing ajay.pptx
AjayRaj912848
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
HarishKumar1779
 
Quantum computing COMPLETE LECTURE
Quantum computing COMPLETE LECTUREQuantum computing COMPLETE LECTURE
Quantum computing COMPLETE LECTURE
SMALAIAPPANSRIKANTH
 
P138 142 r4c03
P138 142 r4c03P138 142 r4c03
P138 142 r4c03
Kuan-Tsae Huang
 
Seminar on quatum
Seminar on quatumSeminar on quatum
Seminar on quatum
aprameyabr1
 
A brief presentation on qunatum computing system & the material science r...
A brief presentation on qunatum computing system & the material science r...A brief presentation on qunatum computing system & the material science r...
A brief presentation on qunatum computing system & the material science r...
Sakibul Islam Sazzad
 
An Introduction to Quantum computing
An Introduction to Quantum computingAn Introduction to Quantum computing
An Introduction to Quantum computing
Jai Sipani
 
quantum computing22.pptx
quantum computing22.pptxquantum computing22.pptx
quantum computing22.pptx
Abhijit181377
 

Similar to Quantum computing (20)

Quantum computers
Quantum computersQuantum computers
Quantum computers
 
Presentation on quantum_computing
Presentation on quantum_computingPresentation on quantum_computing
Presentation on quantum_computing
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implications
 
From Bits to Qubits: Can Medicine Benefit From Quantum Computing?
From Bits to Qubits: Can Medicine Benefit From Quantum Computing?From Bits to Qubits: Can Medicine Benefit From Quantum Computing?
From Bits to Qubits: Can Medicine Benefit From Quantum Computing?
 
Ibm quantum computing
Ibm quantum computingIbm quantum computing
Ibm quantum computing
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
 
Quantum Computers.ppt
Quantum Computers.pptQuantum Computers.ppt
Quantum Computers.ppt
 
Quantum Computers.ppt
Quantum Computers.pptQuantum Computers.ppt
Quantum Computers.ppt
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
 
Quantum computers by Emran
Quantum computers by EmranQuantum computers by Emran
Quantum computers by Emran
 
quantumcomputer-190731154949.pptx
quantumcomputer-190731154949.pptxquantumcomputer-190731154949.pptx
quantumcomputer-190731154949.pptx
 
Quantum computing ajay.pptx
Quantum computing ajay.pptxQuantum computing ajay.pptx
Quantum computing ajay.pptx
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
 
Quantum computing COMPLETE LECTURE
Quantum computing COMPLETE LECTUREQuantum computing COMPLETE LECTURE
Quantum computing COMPLETE LECTURE
 
P138 142 r4c03
P138 142 r4c03P138 142 r4c03
P138 142 r4c03
 
Seminar on quatum
Seminar on quatumSeminar on quatum
Seminar on quatum
 
A brief presentation on qunatum computing system & the material science r...
A brief presentation on qunatum computing system & the material science r...A brief presentation on qunatum computing system & the material science r...
A brief presentation on qunatum computing system & the material science r...
 
An Introduction to Quantum computing
An Introduction to Quantum computingAn Introduction to Quantum computing
An Introduction to Quantum computing
 
quantum computing22.pptx
quantum computing22.pptxquantum computing22.pptx
quantum computing22.pptx
 

Recently uploaded

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 

Quantum computing

  • 1. Quantum Computing The Next Generation of Computing Devices? by Heiko Frost, Seth Herve and Daniel Matthews
  • 2. What is a Quantum Computer? Quantum Computer A computer that uses quantum mechanical phenomena to perform operations on data through devices such as superposition and entanglement. Classical Computer (Binary) A computer that uses voltages flowing through circuits and gates, which can be calculated entirely by classical mechanics.
  • 3. The Need For Speed...  Classical Digital Computer  Moore’s Law: # of transistors on chip doubles every 18 months— microprocessor circuits will measure on atomic scale by 2020-2030  Downscaling of circuit board layout/components is leading to discrepancies.  Copper traces are actually crystallizing and shorting out!  Emergence of quantum phenomena such as electrons tunneling through the barriers between wires.  Serial Processing – one operation at a time  64-bit classical computer operates speeds measured in gigaflops (billions of floating-point operations per second).  Quantum Computer  Harnesses the power of atoms and molecules to perform memory and processing tasks  Parallel Processing – millions of operations at a time  30-qubit quantum computer equals the processing power of conventional computer that running at 10 teraflops (trillions of floating-point operations per second).
  • 4. Classical vs Quantum Bits  Classical Bit  2 Basic states – off or on: 0, 1  Mutually exclusive  Quantum Bit (Qubit)  2 Basic states – ket 0, ket 1:  Superposition of both states – (not continuous in nature)  Quantum entanglement  2 or more objects must be described in reference to one another  Entanglement is a non-local property that allows a set of qubits to express superpositions of different binary strings (01010 and 11111, for example) simultaneously | 0 , |1〉 〉 2 2 Pure Quibit State: | 0 |1 where , s.t. 1 8 Possible States per Qubit a b a b a b Ψ = 〉 + 〉 ∈ = + ∴ £
  • 5. Quantum Computing Power Integer Factorization Impossible for digital computers to factor large numbers which are the products of two primes of nearly equal size Quantum Computer with 2n qubits can factor numbers with lengths of n bits (binary) Quantum Database Search Example: To search the entire Library of Congress for one’s name given an unsorted database... Classical Computer – 100 years Quantum Computer – ½ second
  • 6. Practical Quantum Computer Applications Quantum Mechanics Simulations physics, chemistry, materials science, nanotechnology, biology and medicine. Computer can compute millions of variables at once. All are limited today by the slow speed of quantum mechanical simulations. Cryptoanalysis Capable of cracking extremely complicated codes RSA encryption Typically uses numbers with over 200 digits
  • 7. Quantum Computing History  1973 - Alexander Holevo publishes paper showing that n qubits cannot carry more than n classical bits of information.  1976 - Polish mathematical physicist Roman Ingarden shows that Shannon information theory cannot directly be generalized to the quantum case.  1981 - Richard Feynman determines that it is impossible to efficiently simulate a evolution of a quantum system on a classical computer.  1985 - David Deutsch of the University of Oxford, describes the first universal quantum computer.1985 - David Deutsch of the University of Oxford, describes the first universal quantum computer.  1993 - Dan Simon, at Universite de Montreal, invents an oracle problem for which quantum computer would be exponentially faster than conventional computer. This algorithm introduced the main ideas which were then developed in Peter Shor's factoring algorithm.  1994 - Peter Shor, at AT&T's Bell Labs discovers algorithm to allow quantum computers to factor large integers quickly. Shor's algorithm could theoretically break many of the cryptosystems in use today.  1995 - Shor proposs the first scheme for quantum error correction.  1996 - Lov Grover, at Bell Labs, invents quantum database search algorithm.  1997 - David Cory, A.F. Fahmy, Timothy Havel, Neil Gershenfeld and Isaac Chuang publish the first papers1997 - David Cory, A.F. Fahmy, Timothy Havel, Neil Gershenfeld and Isaac Chuang publish the first papers on quantum computers based on bulk spin resonance, or thermal ensembles. Computers are actually aon quantum computers based on bulk spin resonance, or thermal ensembles. Computers are actually a single, small molecule, storing qubits in the spin of protons and neutrons. Trillions of trillions of these cansingle, small molecule, storing qubits in the spin of protons and neutrons. Trillions of trillions of these can float in a cup of water.float in a cup of water.  1998 - First working 2-qubit NMR computer demonstrated at University of California, Berkeley.  1999 - First working 3-qubit NMR computer demonstrated at IBM's Almaden Research Center. First execution of Grover's algorithm.  2000 - First working 5-qubit NMR computer demonstrated at IBM's Almaden Research Center.  2001 - First working 7-qubit NMR computer demonstrated at IBM's Almaden Research Center.2001 - First working 7-qubit NMR computer demonstrated at IBM's Almaden Research Center. First execution of Shor's algorithm. The number 15 was factored using 1018 identicalFirst execution of Shor's algorithm. The number 15 was factored using 1018 identical molecules, each containing 7 atoms.molecules, each containing 7 atoms.
  • 8. Candidates for Quantum Computers  Superconductor-based quantum computers (including SQUID-based quantum computers)  Ion trap-based quantum computers  "Nuclear magnetic resonance on molecules in solution"-based  “Quantum dot on surface"-based  “Laser acting on floating ions (in vacuum)"-based (Ion trapping)  "Cavity quantum electrodynamics" (CQED)-based  Molecular magnet-based  Fullerene-based ESR quantum computer  Solid state NMR Kane quantum computer
  • 9. Quantum Computing Problems  Current technology ≈ 40 Qubit operating machine needed to rival current classical equivalents.  Errors Decoherence - the tendency of a quantum computer to decay from a given quantum state into an incoherent state as it interacts with the environment. Interactions are unavoidable and induce breakdown of information stored in the quantum computer resulting in computation errors. Error rates are typically proportional to the ratio of operating time to decoherence time operations must be completed much quicker than the decoherence time.
  • 10. Research References  http://www.qubit.org  http://www.cs.caltech.edu/~westside/quantum-intro.html  http://computer.howstuffworks.com/quantum-computer1.htm  http://en.wikipedia.org/wiki/Quantum_computers  http://www.carolla.com/quantum/QuantumComputers.htm