Part 1. Grover s s Algorithm. Quantum Computing. The Grover, Shor,, and Deutsch-Jozsa. Algorithms. This work is supported by: Samuel J. Lomonaco, Jr.
|
|
- Octavia Baker
- 5 years ago
- Views:
Transcription
1 uantum Computing Samuel J. Lomonaco, Jr. Dept. o Comp. Sci.. & Electrical Engineering University o Maryland Baltimore County Baltimore, MD 5 Lomonaco@UMBC.EDU Webage: Overview Four Talks Elementary A Rosetta Stone or uantum Computation Three uantum Algorithms uantum idden Subgroup Algorithms An Entangled Tale o uantum Entanglement Lecture Three uantum Algorithms The Grover, Shor,, and Deutsch-Jozsa Algorithms Samuel J. Lomonaco, Jr. Dept. o Comper Science & Electrical Engineering University o Maryland Baltimore County Baltimore, MD 5 Lomonaco@UMBC.EDU Webage: Advanced This work is supported by: The Deense Advance Research rojects Agency (DARA & Air Force Research Laboratory (AFRL, Air Force Materiel Command, USAF Agreement umber F The ational Institute or Standards and Technology (IST. The Mathematical Sciences Research Institute (MSRI. art Grover s s Algorithm L-O-O- The L-O-O- L Fund.
2 Grover s s Algorithm Searching or a eedle in a aystack Samuel J. Lomonaco, Jr. Dept. o Comper Science & Electrical Engineering University o Maryland Baltimore County Baltimore, MD 5 Lomonaco@UMBC.EDU Webage: This work is supported by: The Deense Advance Research rojects Agency (DARA & Air Force Research Laboratory (AFRL, Air Force Materiel Command, USAF Agreement umber F The ational Institute or Standards and Technology (IST. The Mathematical Sciences Research Institute (MSRI. L-O-O- The L-O-O- L Fund. Lomonaco, Samuel J., Jr., Grover s s uantum Search Algorithm,, in AMS SAM/58, (, pages 8 9. Grover s s Algorithm Finding a eedle in a aystack Consider a large unstructured database consisting o = n records labeled in random order by the integers integers,,,, E.g., the database could be stored as a linked list ead Record Record #%*!*# %#*!#* On average, we have to retrieve inding the label x. / ence, the average computational work is computational steps Record *!#%*# labels beore O( This is a practical Searching problem that appears a hone in many Book guises For example, consider a city phone book containing phone numbers. Find the name associated with the phone number x = ( The best classical algorithm or inding the associated name, say Jane Doe,, would search through / phone numbers on average beore inding the name Jane Doe. In other words, it would take on average computational steps. O More ormally, we are given a unction { } { } :,,,,, called an Oracle,, such that ( x i x = x ( YES = Otherwise YES ( O By calling it an Oracle,, we mean that we do not have immediate access to all argument- unction pairs (,. The Oracle is simply a blackbox,, which we can query as many times as we like by inputting a number x, and then observing the resulting output ( x. But each such query comes with an associated computational $$cost$$. x x ( x
3 The Search roblem or an Unstructured Database is: To ind the record labeled as x with the minimum amount o computational $$work$$, i.e., with the minimum number o queries o the oracle. Another Example Consider a plaintext/ciphertext attack by brute orce key search on a message encrypted with the Data Encryption Standard (DES, where the key K is a 56 bit number Given the plaintext/ciphertext pair laintext Ciphertext TheStolenGoldIsiddenAt xjepwvziderkqldievmsfk crack the entire cipher by encrypting the plaintext TheStolenGoldIsiddenAt with each o the keys,,,. 56 -, in turn, until the key K is ound that produces the ciphertext xjepwvziderkqldievmsfk In other words, i (, C denotes the available plaintext/ciphertext pair, and i then the Oracle is ( K K denotes the key such that (, DES K = = C i K = K Otherwise Mission Impossible Assignment Your Mission Impossible assignment, should you choose to accept it, is to devise an algorithm which inds the label in steps. O( As always, should you ail, your lecturer will disavow any association with your activities. x Mission Impossible Assignment Lov Grover has accepted this Mission Impossible challenge, and has successully created an algorithm which inds the label x in O( steps, with a total computational work o O( log The uantum Mechanical erspective -D D ilbert space with orthonormal basis {,} n -D D ilbert space with orthonormal basis {,,,, } n = Oracle is given as a blackbox unitary transormation U U x y x ( x y 3
4 The uantum Mechanical erspective From the Oracle U x y x ( x y we construct the unitary transormation x x i x = x I ( x = ( x x = x x otherwise as ollows x ( x x U I I ote that x is an Inversion I = I x x, since x I x x x= x x x x i x= x = x otherwise Also please note that or any unit length ket I = I is an inversion about the hyperplane to, i.e., A A Mirror Image Transormation ilbert Space Let A A Mirror Relection Right Right yperplane Mirror Let roperties o I χ χ Deinition. Let, be unit length kets in s.t... Then (, χ { χ, } = Span = a + b a b is a vector space over lying in with a real inner product induced by the bracket in. ence, i, χ are linearly independent, then is a -D Euclidean plane lying in. Inversion by I roperties o I (, χ { χ, } = Span = a + b a b I & I χ leave the plane invariant roposition. The plane is invariant under the transormations I, I χ, i.e., I I χ S = S S = S I χ χ I 4
5 Let be a ket in perpendicular to, and let L denote the line in passing through the origin and to. Then I : S S Line L And moreover, i is a unit length vector in which is to, then I = I I And inally, i is a unit length ket in, and i U : is a unitary transormation, then Relection in line L UI U = I U Summary Given two unit kets and χ living in with χ real, there is a -D D plane (i.e., -D inner product space over living in spanned by and χ s.t. I ( S = S and I χ S = S S I a relection in is or the line L an inversion about I = I or all unitary transs UI U = I U U Overview o Grover s s Algorithm Step. (Initialization Step. = j k j= Loop until ( π k= π /4sin / 4 = I I x k k+ Step. Measure with respect to the standard basis,,, to obtain the marked unknown state x with probability / What s s Going On? It s s All About this icture Let be the adamard transorm given by where The Method in Lov s Madness : n = ( ( = L x L x x 5
6 Thus, we now have living in the -D D plane Step. x (, S = Span x (Initialization This step creates a superposition o all states, i.e., = j = j= Step. The Iteration Loop Each iteration rotates (in closer to x. Let x and be unit length kets in which are to x and, respectively. Let = Angle( x, L x L x x L x L Step. With each iteration (Cont. x k+ = x where = = x ( I I I I = I I = I I = I I is the product o two inversions. k x x x x Theorem But, So, L x L x x L& L Linesin L L = point O Re Re = Rot = L L Angle ( L, L = cos x + sin x k So, = cos[ ( + ] + sin [( + ] k x k x = cos [( + ] + sin [( + ] k k x k x We seek to iterate until sin k + possible. [ ] But what is? is as large as In other words, we seek the smallest positive integer k = K such that ( k + is as close as possible to π /. This turns out to be k K π / ( = = L x L But what is? Recall that = Angle( x, We ind is complementary to x x by noting that the angle = Angle x, i.e., + = π / (, 6
7 Since = π( x + + Since ence, the number o iterations in O( Step. is π we have = x = cos = cos = sin ence, ( = sin / / π k = K = 4 and π /4sin ( / But each iteration uses the adamard transorm n = ( at the computational cost o O ( lg Since Step. is the computationaly dominant part o Grover s s algorithm, it ollows that the computational time complexity o this algorithm is O( lg The probability that the measurement perormed in Step. o Grover s s algorithm will successully retrieve the unknown label is given by x The robability o Success [( K ] robsuccess = sin + cos = Grover s s Algorithm Step. (Initialization Step. = j k j= Loop until ( π k= π /4sin / 4 = I I x k k+ Step. Measure with respect to the standard basis,,, to obtain the marked unknown state x with probability / The End o Grover s s Algorithm art Shor s Algorithm 7
8 Shor s Factoring Algorithm Samuel J. Lomonaco, Jr. Dept. o Comper Science & Electrical Engineering University o Maryland Baltimore County Baltimore, MD 5 Lomonaco@UMBC.EDU Webage: This work is supported by: The Deense Advance Research rojects Agency (DARA & Air Force Research Laboratory (AFRL, Air Force Materiel Command, USAF Agreement umber F The ational Institute or Standards and Technology (IST. The Mathematical Sciences Research Institute (MSRI. L-O-O- The L-O-O- L Fund. This talk is loosely based on the paper Lomonaco, Samuel J., Jr., Shor s uantum Factoring Algorithm,, in AMS SAM/58, (, pages A Crytanalyst s Dream I m m going to crack the RSA Cryto System by inding a Superast Factoring Algorithm!! I ll be rich & amous!!! Code Breaker roblem. Given an integer which is the product o two unknown primes p & q,, i.e., =pq, ind p and q, i.e., actor. Step. Step. Simpliied Shor s Algorithm Choose an integer a s.t. o the unction: x x = a mod gcd a, = Step 3. 3 I is not even, then goto Step. Step 4. 4 Use a uantum Computer to determine the period I is even, then / / a = a a + mod So use the Euclidean algorithm to compute / / ( a and cd( a +, gcd, g Step 5. 5 Simpliied I the above gcd s are & or q & p, then we have actored. I not, goto Step. p q 8
9 Step. Step. Simpliied Shor s Algorithm Choose an integer a s.t. gcd a, = Step 3. 3 I is not even, then goto Step. Step 4. 4 Use a uantum Computer to determine the period o the unction: I ( x = a x mod is even, then / / a = a a + mod So use the Euclidean algorithm to compute / / ( a and cd( a +, gcd, g uantum art o Algorithm {,,, } = ± ± The Integers roblem. Given a periodic unction : Find the period o. Choose a suiciently large positive integer, and restrict to the set S = {,,,, } and ocus on the restricted unction : S Simpliication. To avoid minor technicalities, we assume that is a multiple o, i.e.,, Choose an integer n s.t. < n & Max(< n Construct two n-qubit registers, i.e., Reg and Reg. Reg Reg = an an a bn bn b Arguments o Arguments o n a a a = a Convention. n n j= j For example, = 3 j The -oint Fourier Transorm ω = rimitive -th root o unity, e.g., e πi/ S {,,,, } = The Fourier Transorm is: where F : S : S y = x ω x Remark. We will implement transormation. F xy as a unitary Step.. Initialize = F Step.. Apply to Reg F I i j ω j j= j= = = j Step.. Let U be a unitary transormation ence, that Reg takes now j holds to all the j integers ( j. Apply U,,,., - in superposition U j x ( x j= j= Reg Reg = j= j ( j = j + j ( j + j j= j= j= j= = j + j ( j = j j + ( j j= j= 9
10 Step.3. Reg Reg = j j + ( j j= j= r {,,,, } Measure Reg rob(j rob(j =r =r =/ =/ Reg Reg = j+ r ( r j = Whoosh Whoosh! F Step.4. Apply to Reg F I ( j+ r k j+ r r ω k r j= j= k= ( j+ r k ω k But =! k= j = = ω rk k= j = k ( ω j ( r k ( r But! k j ( ω ence, j = / i y= mod / = otherwise Reg Re = rk ω k ( r k λ : λ=,,, = rλ ω λ ( r λ = g Step.4. r λ Reg Reg = ω λ ( r λ = Measure Reg rob( rob(λ=λ Reg Reg = λ ( r ence, we have obtained λ or some =λ =/ =/ Whoosh Whoosh! λ { },,, Repeat steps through 5 until there are enough multiples o / to recover /, and hence. Remark. We should remind the reader that the above description is a simpliication o Shor s actoring algorithm which contains most o the key eatures o the actual algorithm. A more detailed and thorough can be ound in the ollowing two papers: Shor s quantum actoring algorithm,, in uantum Computation, AMS SAM/58, (, pages 6-79 uantum idden Subgroup Algorithms: A Mathematical espective,, in uantum Computation and Inormation, AMS COM/35, (, pages
11 The End o Shor s Algorithm art 3 The Deutsch-Jozsa Algorithm The Deutsch-Jozsa Algorithm Samuel J. Lomonaco, Jr. Dept. o Comp. Sci. & Electrical Engineering University o Maryland Baltimore County Baltimore, MD 5 Lomonaco@UMBC.EDU Webage: Deense Advanced Research rojects Agency (DARA & Air Force Research Laboratory, Air Force Materiel Command, USAF Agreement umber F This work is supported by: The Deense Advance Research rojects Agency (DARA & Air Force Research Laboratory (AFRL, Air Force Materiel Command, USAF Agreement umber F The ational Institute or Standards and Technology (IST The Mathematical Sciences Research Institute (MSRI. L-O-O- The L-O-O- Fund. Deutsch s s Algorithm Deinition.. A coin is air (or balanced i it has heads on one side and tails on the other side. It is unair (or constant i either it has tails on both sides, or heads on both sides. Side T T Side Fair (Balanced Side Side T Side T Side Unair (Constant Side Side Observation Observation. In the classical world, we need to observe both sides o the coin to determine whether or not it is air? But what about in the quantum world? Fair (Balanced Unair (Constant
12 We represent a coin mathematically as a Boolean unction: Side { } { } :,, Side T Let then The Unitary Implementation o U be the unitary transormation x U x y x ( x y U ( ( x x Moreover, U ( + ( ( ( + ( (. is air,, i.e., balanced ( ( ( ( Outpu t = i + =±. is unair,, i.e., constant ( ( ( + ( Output = + i =± Case. Case. ( ( So I we only make one observation, i.e., i we observe the let register, then we can determine whether or not is air or unair. uantum Computation: A Grand Mathematical Mathematical Challenge or the Twenty-First Century Century and the Millennium, Samuel J. Lomonaco, Jr. (editor, AMS SAM/58, (. The End
13 uantum Computation and Inormation, Samuel J. Lomonaco, Jr. and oward E. Brandt (editors, AMS COM/35, (. 3
11/16/2008 Quantum Computing Quantum Algorithms & Beyond D p e t p. of Comp. p S. c S i. &
/6/28 uantum Computing? uantum s & Beyond amuel J. Lomonaco, Jr. Dept. of Comp. ci. & Electrical Engineering University of Maryland Baltimore County Baltimore, MD 225 Email: Lomonaco@UMBC.EDU Webage: http://www.csee.umbc.edu/~lomonaco
More informationQuantum Computing. Continuous Quantum Hidden Subgroup Algorithms. This work is in collaboration with. Louis H. Kauffman. Samuel J. Lomonaco, Jr.
Quantum Computing amuel J. Lomonaco, Jr. Dept. of Comp. ci.. & Electrical Engineering University of Maryland Baltimore County Baltimore, MD 225 Email: Lomonaco@UMBC.EDU WebPage: http://www.csee.umbc.edu/~lomonaco
More informationQuantum Computing Lecture 6. Quantum Search
Quantum Computing Lecture 6 Quantum Search Maris Ozols Grover s search problem One of the two most important algorithms in quantum computing is Grover s search algorithm (invented by Lov Grover in 1996)
More informationWebPage: lomonaco A LECTURE ON SHOR S QUANTUM FACTORING ALGORITHM VERSION 1.1. Contents. 1. Preamble to Shor s algorithm
Webage: http://www.csee.umbc.edu/ lomonaco A LECTURE ON SHOR S QUANTUM FACTORING ALGORITHM VERSION 1.1 SAMUEL J. LOMONACO, JR. Abstract. This paper is a written version of a one hour lecture given on eter
More informationMa/CS 6a Class 4: Primality Testing
Ma/CS 6a Class 4: Primality Testing By Adam Sheffer Reminder: Euler s Totient Function Euler s totient φ(n) is defined as follows: Given n N, then φ n = x 1 x < n and GCD x, n = 1. In more words: φ n is
More informationTutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction
Tutorial on Quantum Computing Vwani P. Roychowdhury Lecture 1: Introduction 1 & ) &! # Fundamentals Qubits A single qubit is a two state system, such as a two level atom we denote two orthogonal states
More informationQuantum Knots & Mosaics
Quantum nots??? Quantum nots & Mosaics Samuel Lomonaco University of Maryland Baltimore County (UMBC) Email: Lomonaco@UMBC.edu Webage: www.csee.umbc.edu/~lomonaco L-O-O- This talk was motivated by a number
More informationarxiv:quant-ph/ v1 31 Mar 2004
Quantum Hidden Subgroup Algorithms: The Devil Is in the Details Samuel J. Lomonaco, Jr. a and Louis H. Kauffman b a Department of Computer Science and Electrical Engineering, University of Maryland arxiv:quant-ph/0403229v1
More informationThroughout this talk: Knot means either a knot or a link
??? Quantum nots??? Quantum nots & Mosaics Samuel Lomonaco University of Maryland Baltimore County (UMBC) Email: Lomonaco@UMBC.edu Webage: www.csee.umbc.edu/~lomonaco Throughout this talk: not means either
More informationC/CS/Phys C191 Grover s Quantum Search Algorithm 11/06/07 Fall 2007 Lecture 21
C/CS/Phys C191 Grover s Quantum Search Algorithm 11/06/07 Fall 2007 Lecture 21 1 Readings Benenti et al, Ch 310 Stolze and Suter, Quantum Computing, Ch 84 ielsen and Chuang, Quantum Computation and Quantum
More informationGrover Algorithm Applied to Four Qubits System
www.ccsenet.org/cis Computer and Inormation Science Vol., No. ; May Grover Algorithm Applied to Four Qubits System Z. Sakhi (Corresponding author) Laboratory o Inormation Technology and Modelisation, and
More informationQuantum Computation and Communication
Tom Lake tswsl1989@sucs.org 16/02/2012 quan tum me chan ics: The branch of mechanics that deals with the mathematical description of the motion and interaction of subatomic particles - OED quan tum me
More informationMa/CS 6a Class 4: Primality Testing
Ma/CS 6a Class 4: Primality Testing By Adam Sheffer Send anonymous suggestions and complaints from here. Email: adamcandobetter@gmail.com Password: anonymous2 There aren t enough crocodiles in the presentations
More informationIntroduction to Quantum Computing
Introduction to Quantum Computing Part II Emma Strubell http://cs.umaine.edu/~ema/quantum_tutorial.pdf April 13, 2011 Overview Outline Grover s Algorithm Quantum search A worked example Simon s algorithm
More informationExercise Sheet Cryptography 1, 2011
Cryptography 1 http://www.cs.ut.ee/~unruh/crypto1-11/ Exercise Sheet Cryptography 1, 2011 Exercise 1 DES The Data Encryption Standard (DES) is a very famous and widely used block cipher. It maps 64-bit
More informationLecture note 8: Quantum Algorithms
Lecture note 8: Quantum Algorithms Jian-Wei Pan Physikalisches Institut der Universität Heidelberg Philosophenweg 12, 69120 Heidelberg, Germany Outline Quantum Parallelism Shor s quantum factoring algorithm
More informationQUANTUM COMPUTATION. Exercise sheet 1. Ashley Montanaro, University of Bristol H Z U = 1 2
School of Mathematics Spring 017 QUANTUM COMPUTATION Exercise sheet 1 Ashley Montanaro, University of Bristol ashley.montanaro@bristol.ac.uk 1. The quantum circuit model. (a) Consider the following quantum
More informationOn High-Rate Cryptographic Compression Functions
On High-Rate Cryptographic Compression Functions Richard Ostertág and Martin Stanek Department o Computer Science Faculty o Mathematics, Physics and Inormatics Comenius University Mlynská dolina, 842 48
More informationPh 219b/CS 219b. Exercises Due: Wednesday 4 December 2013
1 Ph 219b/CS 219b Exercises Due: Wednesday 4 December 2013 4.1 The peak in the Fourier transform In the period finding algorithm we prepared the periodic state A 1 1 x 0 + jr, (1) A j=0 where A is the
More informationAn Introduction to Quantum Information and Applications
An Introduction to Quantum Information and Applications Iordanis Kerenidis CNRS LIAFA-Univ Paris-Diderot Quantum information and computation Quantum information and computation How is information encoded
More informationIntroduction to Quantum Information Processing
Introduction to Quantum Information Processing Lecture 6 Richard Cleve Overview of Lecture 6 Continuation of teleportation Computation and some basic complexity classes Simple quantum algorithms in the
More informationIntroduction to Quantum Algorithms Part I: Quantum Gates and Simon s Algorithm
Part I: Quantum Gates and Simon s Algorithm Martin Rötteler NEC Laboratories America, Inc. 4 Independence Way, Suite 00 Princeton, NJ 08540, U.S.A. International Summer School on Quantum Information, Max-Planck-Institut
More information5199/IOC5063 Theory of Cryptology, 2014 Fall
5199/IOC5063 Theory of Cryptology, 2014 Fall Homework 2 Reference Solution 1. This is about the RSA common modulus problem. Consider that two users A and B use the same modulus n = 146171 for the RSA encryption.
More informationChapter 10. Quantum algorithms
Chapter 10. Quantum algorithms Complex numbers: a quick review Definition: C = { a + b i : a, b R } where i = 1. Polar form of z = a + b i is z = re iθ, where r = z = a 2 + b 2 and θ = tan 1 y x Alternatively,
More informationAn Architectural Framework For Quantum Algorithms Processing Unit (QAPU)
An Architectural Framework For Quantum s Processing Unit (QAPU) Mohammad Reza Soltan Aghaei, Zuriati Ahmad Zukarnain, Ali Mamat, and ishamuddin Zainuddin Abstract- The focus of this study is developing
More informationFactoring on a Quantum Computer
Factoring on a Quantum Computer The Essence Shor s Algorithm Wolfgang Polak wp@pocs.com Thanks to: Eleanor Rieffel Fuji Xerox Palo Alto Laboratory Wolfgang Polak San Jose State University, 4-14-010 - p.
More informationThe Deutsch-Jozsa Problem: De-quantization and entanglement
The Deutsch-Jozsa Problem: De-quantization and entanglement Alastair A. Abbott Department o Computer Science University o Auckland, New Zealand May 31, 009 Abstract The Deustch-Jozsa problem is one o the
More informationC/CS/Phys 191 Shor s order (period) finding algorithm and factoring 11/01/05 Fall 2005 Lecture 19
C/CS/Phys 9 Shor s order (period) finding algorithm and factoring /0/05 Fall 2005 Lecture 9 Readings Benenti et al., Ch. 3.2-3.4 Stolze and Suter, uantum Computing, Ch. 8.3 Nielsen and Chuang, uantum Computation
More informationRichard Cleve David R. Cheriton School of Computer Science Institute for Quantum Computing University of Waterloo
CS 497 Frontiers of Computer Science Introduction to Quantum Computing Lecture of http://www.cs.uwaterloo.ca/~cleve/cs497-f7 Richard Cleve David R. Cheriton School of Computer Science Institute for Quantum
More informationComplex numbers: a quick review. Chapter 10. Quantum algorithms. Definition: where i = 1. Polar form of z = a + b i is z = re iθ, where
Chapter 0 Quantum algorithms Complex numbers: a quick review / 4 / 4 Definition: C = { a + b i : a, b R } where i = Polar form of z = a + b i is z = re iθ, where r = z = a + b and θ = tan y x Alternatively,
More informationCompute the Fourier transform on the first register to get x {0,1} n x 0.
CS 94 Recursive Fourier Sampling, Simon s Algorithm /5/009 Spring 009 Lecture 3 1 Review Recall that we can write any classical circuit x f(x) as a reversible circuit R f. We can view R f as a unitary
More informationQuantum Computing. 6. Quantum Computer Architecture 7. Quantum Computers and Complexity
Quantum Computing 1. Quantum States and Quantum Gates 2. Multiple Qubits and Entangled States 3. Quantum Gate Arrays 4. Quantum Parallelism 5. Examples of Quantum Algorithms 1. Grover s Unstructured Search
More informationUniversity of Tokyo: Advanced Algorithms Summer Lecture 6 27 May. Let s keep in mind definitions from the previous lecture:
University of Tokyo: Advanced Algorithms Summer 2010 Lecture 6 27 May Lecturer: François Le Gall Scribe: Baljak Valentina As opposed to prime factorization, primality testing is determining whether a given
More informationQuantum Cryptography. Marshall Roth March 9, 2007
Quantum Cryptography Marshall Roth March 9, 2007 Overview Current Cryptography Methods Quantum Solutions Quantum Cryptography Commercial Implementation Cryptography algorithms: Symmetric encrypting and
More informationShor s Algorithm. Polynomial-time Prime Factorization with Quantum Computing. Sourabh Kulkarni October 13th, 2017
Shor s Algorithm Polynomial-time Prime Factorization with Quantum Computing Sourabh Kulkarni October 13th, 2017 Content Church Thesis Prime Numbers and Cryptography Overview of Shor s Algorithm Implementation
More informationA Gentle Introduction to Quantum Computing
A Gentle Introduction to Quantum Computing Abdullah Khalid 01-10-0168 School of Science and Engineering Lahore University of Management Sciences Friday 3 rd June, 011 Contents 1 Introduction to Quantum
More informationQuantum Computing 101. ( Everything you wanted to know about quantum computers but were afraid to ask. )
Quantum Computing 101 ( Everything you wanted to know about quantum computers but were afraid to ask. ) Copyright Chris Lomont, 2004 2 67 1 = 193707721 761838257287 Took American Mathematician Frank Nelson
More informationAbstract structure of unitary oracles for quantum algorithms
Abstract structure o unitary oracles or quantum algorithms William Zeng 1 Jamie Vicary 2 1 Department o Computer Science University o Oxord 2 Centre or Quantum Technologies, University o Singapore and
More informationIntroduction to Quantum Computing
Introduction to Quantum Computing Part I Emma Strubell http://cs.umaine.edu/~ema/quantum_tutorial.pdf April 12, 2011 Overview Outline What is quantum computing? Background Caveats Fundamental differences
More informationSecurity Implications of Quantum Technologies
Security Implications of Quantum Technologies Jim Alves-Foss Center for Secure and Dependable Software Department of Computer Science University of Idaho Moscow, ID 83844-1010 email: jimaf@cs.uidaho.edu
More informationQuantum Algorithms for Leader Election Problem in Distributed Systems
Quantum Algorithms for Leader Election Problem in Distributed Systems Pradeep Sarvepalli pradeep@cs.tamu.edu Department of Computer Science, Texas A&M University Quantum Algorithms for Leader Election
More information6.896 Quantum Complexity Theory October 2, Lecture 9
6896 Quantum Complexity heory October, 008 Lecturer: Scott Aaronson Lecture 9 In this class we discuss Grover s search algorithm as well as the BBBV proof that it is optimal 1 Grover s Algorithm 11 Setup
More informationIntroduction to Cryptology. Lecture 20
Introduction to Cryptology Lecture 20 Announcements HW9 due today HW10 posted, due on Thursday 4/30 HW7, HW8 grades are now up on Canvas. Agenda More Number Theory! Our focus today will be on computational
More informationSolution to Midterm Examination
YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Handout #13 Xueyuan Su November 4, 2008 Instructions: Solution to Midterm Examination This is a closed book
More informationGrover s algorithm. We want to find aa. Search in an unordered database. QC oracle (as usual) Usual trick
Grover s algorithm Search in an unordered database Example: phonebook, need to find a person from a phone number Actually, something else, like hard (e.g., NP-complete) problem 0, xx aa Black box ff xx
More informationConcepts and Algorithms of Scientific and Visual Computing Advanced Computation Models. CS448J, Autumn 2015, Stanford University Dominik L.
Concepts and Algorithms of Scientific and Visual Computing Advanced Computation Models CS448J, Autumn 2015, Stanford University Dominik L. Michels Advanced Computation Models There is a variety of advanced
More informationLattices. A Lattice is a discrete subgroup of the additive group of n-dimensional space R n.
Lattices A Lattice is a discrete subgroup of the additive group of n-dimensional space R n. Lattices have many uses in cryptography. They may be used to define cryptosystems and to break other ciphers.
More informationClassical RSA algorithm
Classical RSA algorithm We need to discuss some mathematics (number theory) first Modulo-NN arithmetic (modular arithmetic, clock arithmetic) 9 (mod 7) 4 3 5 (mod 7) congruent (I will also use = instead
More informationIn fact, 3 2. It is not known whether 3 1. All three problems seem hard, although Shor showed that one can solve 3 quickly on a quantum computer.
Attacks on RSA, some using LLL Recall RSA: N = pq hard to factor. Choose e with gcd(e,φ(n)) = 1, where φ(n) = (p 1)(q 1). Via extended Euclid, find d with ed 1 (mod φ(n)). Discard p and q. Public key is
More informationNew Results on Boomerang and Rectangle Attacks
New Results on Boomerang and Rectangle Attacks Eli Biham, 1 Orr Dunkelman, 1 Nathan Keller 2 1 Computer Science Department, Technion. Haia 32000, Israel {biham,orrd}@cs.technion.ac.il 2 Mathematics Department,
More informationIntroduction to quantum algorithms
Introduction to quantum algorithms Gabriel Semanišin Institute of Computer Science P.J. Šafárik University, Faculty of Science Košice, Slovakia e-mail: gabriel.semanisin@upjs.sk eduqute 2018 Motto Michelangelo
More informationAPPLYING QUANTUM SEARCH TO A KNOWN- PLAINTEXT ATTACK ON TWO-KEY TRIPLE ENCRYPTION
APPLYING QUANTUM SEARCH TO A KNOWN- PLAINTEXT ATTACK ON TWO-KEY TRIPLE ENCRYPTION Phaneendra HD, Vidya Raj C, Dr MS Shivakumar Assistant Professor, Department of Computer Science and Engineering, The National
More informationFigure 1: Circuit for Simon s Algorithm. The above circuit corresponds to the following sequence of transformations.
CS 94 //09 Fourier Transform, Period Finding and Factoring in BQP Spring 009 Lecture 4 Recap: Simon s Algorithm Recall that in the Simon s problem, we are given a function f : Z n Zn (i.e. from n-bit strings
More informationCOMP424 Computer Security
COMP424 Computer Security Prof. Wiegley jeffw@csun.edu Rivest, Shamir & Adelman (RSA) Implementation 1 Relatively prime Prime: n, is prime if its only two factors are 1 and n. (and n 1). Relatively prime:
More informationThe Future. Currently state of the art chips have gates of length 35 nanometers.
Quantum Computing Moore s Law The Future Currently state of the art chips have gates of length 35 nanometers. The Future Currently state of the art chips have gates of length 35 nanometers. When gate lengths
More informationarxiv:quant-ph/ v3 11 Mar 2004
ariv:quant-ph/040148v3 11 ar 004 Generalized G States and Distributed Quantum Computing Anocha Yimsiriwattana and Samuel J. Lomonaco Jr. Abstract. A key problem in quantum computing is finding a viable
More informationPhysics ; CS 4812 Problem Set 4
Physics 4481-7681; CS 4812 Problem Set 4 Six problems (six pages), all short, covers lectures 11 15, due in class 25 Oct 2018 Problem 1: 1-qubit state tomography Consider a 1-qubit state ψ cos θ 2 0 +
More informationQuantum Searching. Robert-Jan Slager and Thomas Beuman. 24 november 2009
Quantum Searching Robert-Jan Slager and Thomas Beuman 24 november 2009 1 Introduction Quantum computers promise a significant speed-up over classical computers, since calculations can be done simultaneously.
More informationProvably Secure Double-Block-Length Hash Functions in a Black-Box Model
Provably Secure Double-Block-ength Hash Functions in a Black-Box Model Shoichi Hirose Graduate School o Inormatics, Kyoto niversity, Kyoto 606-8501 Japan hirose@i.kyoto-u.ac.jp Abstract. In CRYPTO 89,
More informationLecture 4: Elementary Quantum Algorithms
CS 880: Quantum Information Processing 9/13/010 Lecture 4: Elementary Quantum Algorithms Instructor: Dieter van Melkebeek Scribe: Kenneth Rudinger This lecture introduces several simple quantum algorithms.
More informationLECTURE NOTES ON QUANTUM COMPUTATION. Cornell University, Physics , CS 483; Spring, 2005 c 2006, N. David Mermin
LECTURE NOTES ON QUANTUM COMPUTATION Cornell University, Physics 481-681, CS 483; Spring, 2005 c 2006, N. David Mermin IV. Searching with a Quantum Computer Last revised 3/30/06 Suppose you know that eactly
More informationShor s Prime Factorization Algorithm
Shor s Prime Factorization Algorithm Bay Area Quantum Computing Meetup - 08/17/2017 Harley Patton Outline Why is factorization important? Shor s Algorithm Reduction to Order Finding Order Finding Algorithm
More informationQUANTUM COMPUTATION. Lecture notes. Ashley Montanaro, University of Bristol 1 Introduction 2
School of Mathematics Spring 018 Contents QUANTUM COMPUTATION Lecture notes Ashley Montanaro, University of Bristol ashley.montanaro@bristol.ac.uk 1 Introduction Classical and quantum computational complexity
More informationTECHNISCHE UNIVERSITEIT EINDHOVEN Faculty of Mathematics and Computer Science Exam Cryptology, Friday 25 January 2019
Faculty of Mathematics and Computer Science Exam Cryptology, Friday 25 January 2019 Name : TU/e student number : Exercise 1 2 3 4 5 total points Notes: Please hand in all sheets at the end of the exam.
More informationThe security of RSA (part 1) The security of RSA (part 1)
The modulus n and its totient value φ(n) are known φ(n) = p q (p + q) + 1 = n (p + q) + 1 The modulus n and its totient value φ(n) are known φ(n) = p q (p + q) + 1 = n (p + q) + 1 i.e. q = (n φ(n) + 1)
More informationTECHNISCHE UNIVERSITEIT EINDHOVEN Faculty of Mathematics and Computer Science Exam Cryptology, Tuesday 30 October 2018
Faculty of Mathematics and Computer Science Exam Cryptology, Tuesday 30 October 2018 Name : TU/e student number : Exercise 1 2 3 4 5 total points Notes: Please hand in all sheets at the end of the exam.
More informationQuantum Circuits and Algorithms
Quantum Circuits and Algorithms Modular Arithmetic, XOR Reversible Computation revisited Quantum Gates revisited A taste of quantum algorithms: Deutsch algorithm Other algorithms, general overviews Measurements
More informationQuantum Braids. Mosaics. Samuel Lomonaco 10/16/2011. This work is in collaboration with Louis Kauffman
??? Quantum raids & Mosaics Samuel Lomonaco University of Maryland altimore County (UMC) Email: Lomonaco@UMC.edu WebPage: www.csee.umbc.edu/~lomonaco Lomonaco Library This work is in collaboration with
More informationLecture 12: Grover s Algorithm
CPSC 519/619: Quantum Computation John Watrous, University of Calgary Lecture 12: Grover s Algorithm March 7, 2006 We have completed our study of Shor s factoring algorithm. The asic technique ehind Shor
More informationQuantum algorithms for computing short discrete logarithms and factoring RSA integers
Quantum algorithms for computing short discrete logarithms and factoring RSA integers Martin Ekerå, Johan Håstad February, 07 Abstract In this paper we generalize the quantum algorithm for computing short
More informationLecture 22: RSA Encryption. RSA Encryption
Lecture 22: Recall: RSA Assumption We pick two primes uniformly and independently at random p, q $ P n We define N = p q We shall work over the group (Z N, ), where Z N is the set of all natural numbers
More informationADVANCED QUANTUM INFORMATION THEORY
CDT in Quantum Engineering Spring 016 Contents ADVANCED QUANTUM INFORMATION THEORY Lecture notes Ashley Montanaro, University of Bristol ashley.montanaro@bristol.ac.uk 1 Introduction Classical and quantum
More informationIntroduction to Quantum Information, Quantum Computation, and Its Application to Cryptography. D. J. Guan
Introduction to Quantum Information, Quantum Computation, and Its Application to Cryptography D. J. Guan Abstract The development of quantum algorithms and quantum information theory, as well as the design
More informationCPA-Security. Definition: A private-key encryption scheme
CPA-Security The CPA Indistinguishability Experiment PrivK cpa A,Π n : 1. A key k is generated by running Gen 1 n. 2. The adversary A is given input 1 n and oracle access to Enc k, and outputs a pair of
More informationIntroduction to Quantum Computing
Introduction to Quantum Computing Petros Wallden Lecture 7: Complexity & Algorithms I 13th October 016 School of Informatics, University of Edinburgh Complexity - Computational Complexity: Classification
More informationCS257 Discrete Quantum Computation
CS57 Discrete Quantum Computation John E Savage April 30, 007 Lect 11 Quantum Computing c John E Savage Classical Computation State is a vector of reals; e.g. Booleans, positions, velocities, or momenta.
More informationImplementation Tutorial on RSA
Implementation Tutorial on Maciek Adamczyk; m adamczyk@umail.ucsb.edu Marianne Magnussen; mariannemagnussen@umail.ucsb.edu Adamczyk and Magnussen Spring 2018 1 / 13 Overview Implementation Tutorial Introduction
More informationQuestion 2.1. Show that. is non-negligible. 2. Since. is non-negligible so is μ n +
Homework #2 Question 2.1 Show that 1 p n + μ n is non-negligible 1. μ n + 1 p n > 1 p n 2. Since 1 p n is non-negligible so is μ n + 1 p n Question 2.1 Show that 1 p n - μ n is non-negligible 1. μ n O(
More informationLecture 15: The Hidden Subgroup Problem
CS 880: Quantum Information Processing 10/7/2010 Lecture 15: The Hidden Subgroup Problem Instructor: Dieter van Melkebeek Scribe: Hesam Dashti The Hidden Subgroup Problem is a particular type of symmetry
More informationQuantum Computing Lecture Notes, Extra Chapter. Hidden Subgroup Problem
Quantum Computing Lecture Notes, Extra Chapter Hidden Subgroup Problem Ronald de Wolf 1 Hidden Subgroup Problem 1.1 Group theory reminder A group G consists of a set of elements (which is usually denoted
More informationLemma 1.2. (1) If p is prime, then ϕ(p) = p 1. (2) If p q are two primes, then ϕ(pq) = (p 1)(q 1).
1 Background 1.1 The group of units MAT 3343, APPLIED ALGEBRA, FALL 2003 Handout 3: The RSA Cryptosystem Peter Selinger Let (R, +, ) be a ring. Then R forms an abelian group under addition. R does not
More informationAnalysis of the RSA Encryption Algorithm
Analysis of the RSA Encryption Algorithm Betty Huang June 16, 2010 Abstract The RSA encryption algorithm is commonly used in public security due to the asymmetric nature of the cipher. The procedure is
More informationLecture 5: Arithmetic Modulo m, Primes and Greatest Common Divisors Lecturer: Lale Özkahya
BBM 205 Discrete Mathematics Hacettepe University http://web.cs.hacettepe.edu.tr/ bbm205 Lecture 5: Arithmetic Modulo m, Primes and Greatest Common Divisors Lecturer: Lale Özkahya Resources: Kenneth Rosen,
More informationECS 189A Final Cryptography Spring 2011
ECS 127: Cryptography Handout F UC Davis Phillip Rogaway June 9, 2011 ECS 189A Final Cryptography Spring 2011 Hints for success: Good luck on the exam. I don t think it s all that hard (I do believe I
More informationIntroduction to Cybersecurity Cryptography (Part 4)
Introduction to Cybersecurity Cryptography (Part 4) Review of Last Lecture Blockciphers Review of DES Attacks on Blockciphers Advanced Encryption Standard (AES) Modes of Operation MACs and Hashes Message
More informationShor s Quantum Factorization Algorithm
Shor s Quantum Factorization Algorithm Tayeb Aïssiou Department of Mathematics and Statistics McGill University, Montreal, Quebec Canada H3A K6 e-mail: tayeb.aissiou@mail.mcgill.ca November, 5 Abstract
More informationIntroduction to Quantum Information Processing QIC 710 / CS 768 / PH 767 / CO 681 / AM 871
Introduction to Quantum Information Processing QIC 71 / CS 768 / PH 767 / CO 681 / AM 871 Lecture 8 (217) Jon Yard QNC 3126 jyard@uwaterloo.ca http://math.uwaterloo.ca/~jyard/qic71 1 Recap of: Eigenvalue
More informationIntroduction to Cybersecurity Cryptography (Part 4)
Introduction to Cybersecurity Cryptography (Part 4) Review of Last Lecture Blockciphers Review of DES Attacks on Blockciphers Advanced Encryption Standard (AES) Modes of Operation MACs and Hashes Message
More informationTHE UNIVERSITY OF CALGARY. The Classical and Quantum Complexity of the Goldreich-Levin Problem. with Applications to Bit Commitment
THE UNIVERSITY OF CALGARY The Classical and Quantum Complexity of the Goldreich-Levin Problem with Applications to Bit Commitment by Mark R. A. Adcock A THESIS SUBMITTED TO THE FACULTY OF GRADUATE STUDIES
More informationYALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE
YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Notes 13 (rev. 2) Professor M. J. Fischer October 22, 2008 53 Chinese Remainder Theorem Lecture Notes 13 We
More informationα x x 0 α x x f(x) α x x α x ( 1) f(x) x f(x) x f(x) α x = α x x 2
Quadratic speedup for unstructured search - Grover s Al- CS 94- gorithm /8/07 Spring 007 Lecture 11 01 Unstructured Search Here s the problem: You are given an efficient boolean function f : {1,,} {0,1},
More informationLecture Note 3 Date:
P.Lafourcade Lecture Note 3 Date: 28.09.2009 Security models 1st Semester 2007/2008 ROUAULT Boris GABIAM Amanda ARNEDO Pedro 1 Contents 1 Perfect Encryption 3 1.1 Notations....................................
More informationWinter 2008 Introduction to Modern Cryptography Benny Chor and Rani Hod. Assignment #2
0368.3049.01 Winter 2008 Introduction to Modern Cryptography Benny Chor and Rani Hod Assignment #2 Published Sunday, February 17, 2008 and very slightly revised Feb. 18. Due Tues., March 4, in Rani Hod
More information10 Concrete candidates for public key crypto
10 Concrete candidates for public key crypto In the previous lecture we talked about public key cryptography and saw the Diffie Hellman system and the DSA signature scheme. In this lecture, we will see
More informationAPPLYING QUANTUM SEARCH TO A KNOWN- PLAINTEXT ATTACK ON TWO-KEY TRIPLE ENCRYPTION
APPLYING QUANTUM SEARCH TO A KNOWN- PLAINTEXT ATTACK ON TWO-KEY TRIPLE ENCRYPTION Phaneendra H.D., Vidya Raj C., Dr. M.S. Shivaloimar Assistant Professor, Department of Computer Science and Engineering,
More informationA Generic Hybrid Encryption Construction in the Quantum Random Oracle Model
A Generic Hybrid Encryption Construction in the Quantum Random Oracle Model Presented by: Angela Robinson Department of Mathematical Sciences, Florida Atlantic University April 4, 2018 Motivation Quantum-resistance
More informationLogic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation
Quantum logic gates Logic gates Classical NOT gate Quantum NOT gate (X gate) A NOT A α 0 + β 1 X α 1 + β 0 A N O T A 0 1 1 0 Matrix form representation 0 1 X = 1 0 The only non-trivial single bit gate
More informationCryptography CS 555. Topic 24: Finding Prime Numbers, RSA
Cryptography CS 555 Topic 24: Finding Prime Numbers, RSA 1 Recap Number Theory Basics Abelian Groups φφ pppp = pp 1 qq 1 for distinct primes p and q φφ NN = Z N gg xx mod N = gg [xx mmmmmm φφ NN ] mod
More informationQuantum algorithms. Andrew Childs. Institute for Quantum Computing University of Waterloo
Quantum algorithms Andrew Childs Institute for Quantum Computing University of Waterloo 11th Canadian Summer School on Quantum Information 8 9 June 2011 Based in part on slides prepared with Pawel Wocjan
More information9 Knapsack Cryptography
9 Knapsack Cryptography In the past four weeks, we ve discussed public-key encryption systems that depend on various problems that we believe to be hard: prime factorization, the discrete logarithm, and
More information