1500 AMD Opteron processor (2.2 GHz with 2 GB RAM)
|
|
- Crystal Burns
- 5 years ago
- Views:
Transcription
1 NICT
2 RSA RSA 2
3 3
4 (1) exp $ 64/9 + *(1) (ln 0) 1/2 (ln ln 0) 3/2 (2) (232 ) 1500 AMD Opteron processor (2.2 GHz with 2 GB RAM) 4
5 (3) 18 2 (1) (2) (3) 5
6 CRYPTREC , 2048 CRYPTREC Report jp/report/cryptrec-rp pdf 34 6
7 (1) (2) (3) 7
8 1985 : Deutsch Turing Machine 1994 : Simon 1994 : Shor 1996 Grover Quantum Algorithm Zoo 8
9 NSA NIST Round 2 algorithms Round 2 algorithms
10 2. Noisy Intermediate-scale Quantum (NISQ) Noisy Intermediate-scale Quantum (NISQ) system Google 72 IBM 50 Intel 49 10
11 (3) Quantum Computing: Progress and Prospects (2018) * (it is still too early to be able to predict the time horizon for a scalable quantum computer.) NISQ * National Academies of Sciences, Engineering, and Medicine 11
12 (1) (K05, TK08, HRS16) (RNSL17) n 3n+2 O(n 3 ) 2n+2 O(n 4 ) 12
13 Shor N a, a r = 1(mod N) r Step1: 0 1 Step2: Hadamard Step3: Step:4 QFT 1 r 1 r å- s= 0 ~ s r u s m m m 2 å - 1 j= 0 m 2 å - 1 j= 0 j j 1 a j mod N Step5: 1 s~ r Step6: r 13
14 ( ) 2 =211 b 0 c1 b 1 c2 b 2 c3 b 3 c4 b 4 c5 b 5 c6 b 6 c7 b 7 b8 C-NOT gate c c t t Å c Toffoli gate c 1 c 1 c 2 c 2 t t Å c 1 Ù c ) ( 2 14
15 * # of qubits # of gates # of qubits # of gates * N. Kunihiro, Exact Analysis of Computational Time for Factoring in Quantum Computers, IEICE Trans. Vol. 88-A, No
16 (2) Shor [1] Experimental realization of Shor's quantum factoring algorithm using nuclear magnetic resonance, Nature, [2] Shor s Quantum Factoring Algorithm on a Photonic Chip, Science, [3] Computing prime factors with a Josephson phase qubit quantum processor, Nature Physics, [4] Realization of a scalable Shor algorithm, Science, [5] Experimental realisation of Shor s quantum factoring algorithm using qubit recycling, Nature Photonics,
17 Device Year Journal NMR IBM Nature Photonic chip U. of Bristol Science Superconductivity UCSB Nature Physics Ion Trap U. Innsbruck Science Photon U. of Bristol Nature Photonics qubit qubit 17
18 y 2 y3 [1] IBM, NMR 1 ( 2 # $ %&' ( $ # %&' + 7 % mod 15 x7 mod 15 x4 mod 15 x 1 x 2 x3 y 0 y1 x 3 =1 7 x 2 =1, y 0 y 2 SWAP x 2 =1, y 1 y 3 SWAP 18
19 N=15 1 x 3 ==1 1 6 x 2 ==1 4y mod 15 y=(y 3 y 2 y 1 y 0 ) 2 4 y= (y 3 y 2 y 1 y 0 00) 2 =16 (y 3 y 2 ) 2 +(y 1 y 0 00) 2 4 y mod 15= (y 3 y 2 ) 2 +(y 1 y 0 00) 2 =(y 1 y 0 y 3 y 2 ) 2 2 SWAP 19
20 [4] (Innsbruck, Ion Trap) a=2, 7, 8, 13 x 4 mod 15 x a mod 15 x H H H H IQFT y 0 y 1 y 2 U 4 U a a=2, 7, 8, 13 y 3 20
21 SWAP U 2 U 13 U 4 C-SWAP U 8 U 7 U 11 21
22 [2] (U. of Bristol, Photonic chip) x 1 x 2 x 3 y 0 y 1 a=7 7 0 =1, 7 1 = 7, 7 2 =4, 7 3 =13, 7 4 =1 Trick: encode 1 (00) 2, 7 (01) 2, 4 (10) 2, 13 (11) 2. U 7 : (00) 2 à (01) 2, U 4 : (0x) 2 à(1x) 2 4 Shor 22
23 [2][5] Shor 1 ( ) *+ 2 # $ %&' ( ) * $ # %&'. 0 % mod 4 simplified or compiled Shor 1 ( ) *+ 2 # $ %&' ( ) * $ # %&'.. mod 6 r Shor [5] 21 23
24 Oversimplifying Quantum Factoring * a 2 (a 2 mod N = 1) 1 ' 1 2 # * # * 0 $ mod 1 $%& $%& oversimplified Shor ' 2 # $%& ' * # $%& 0> H H 0> ' * * mod 2 20,000-bit * A Smolin, John & Smith, Graeme & Vargo, Alexander. (2013). Oversimplifying quantum factoring. Nature
25 N, a SageMath k=4096 p=random_prime(2^k-1, false, 2^(k-1)) q=random_prime(2^k-1, false, 2^(k-1)) N=p*q a= crt(1, -1, p, q) 2048-bit RSA 4096-bit RSA bit RSA 10 25
26 15 15 NISQ 26
27 Quantum Computing: Progress and Prospects Key Finding 1: Given the current state of quantum computing and recent rates of progress, it is highly unexpected that a quantum computer that can compromise RSA 2048 or comparable discrete logarithm based public key cryptosystems will be built within the next decade. Key Finding 10: Even if a quantum computer that can decrypt current cryptographic ciphers is more than a decade off, the hazard of such a machine is high enough - and the time frame for transitioning to a new security protocol is sufficiently long and uncertain - that prioritization of the development, standardization, and deployment of post-quantum cryptography is critical for minimizing the chance of a potential security and privacy disaster. 27
28 Key Finding 3: Research and development into practical commercial applications of noisy intermediate scale quantum (NISQ) computers is an issue of immediate urgency for the field. The results of this work will have a profound impact on the rate of development of large-scale quantum computers and on the size and robustness of a commercial market for quantum computers. Key Finding 4: Given the information available to the committee, it is still too early to be able to predict the time horizon for a scalable quantum computer. Instead, progress can be tracked in the near term by monitoring the scaling rate of physical qubits at constant average gate error rate, as evaluated using randomized benchmarking, and in the long term by monitoring the effective number of logical (error corrected) qubits that a system represents. 28
29 Grover (2 "/$ ) (2 "/% ) Simon (2010-) Even-Mansour 3-round Feistel scheme (Kuwakado-Morii, ISIT2010) LWR (CRYPTO2016) 29
30 (1) (2) (3) 30
Cryptography in the Quantum Era. Tomas Rosa and Jiri Pavlu Cryptology and Biometrics Competence Centre, Raiffeisen BANK International
Cryptography in the Quantum Era Tomas Rosa and Jiri Pavlu Cryptology and Biometrics Competence Centre, Raiffeisen BANK International Postulate #1: Qubit state belongs to Hilbert space of dimension 2 ψ
More informationLogic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation
Quantum logic gates Logic gates Classical NOT gate Quantum NOT gate (X gate) A NOT A α 0 + β 1 X α 1 + β 0 A N O T A 0 1 1 0 Matrix form representation 0 1 X = 1 0 The only non-trivial single bit gate
More informationquantum mechanics is a hugely successful theory... QSIT08.V01 Page 1
1.0 Introduction to Quantum Systems for Information Technology 1.1 Motivation What is quantum mechanics good for? traditional historical perspective: beginning of 20th century: classical physics fails
More information1.0 Introduction to Quantum Systems for Information Technology 1.1 Motivation
QSIT09.V01 Page 1 1.0 Introduction to Quantum Systems for Information Technology 1.1 Motivation What is quantum mechanics good for? traditional historical perspective: beginning of 20th century: classical
More informationIntroduction to Quantum Computing
Introduction to Quantum Computing Petros Wallden Lecture 1: Introduction 18th September 2017 School of Informatics, University of Edinburgh Resources 1. Quantum Computation and Quantum Information by Michael
More informationQuantum Computation 650 Spring 2009 Lectures The World of Quantum Information. Quantum Information: fundamental principles
Quantum Computation 650 Spring 2009 Lectures 1-21 The World of Quantum Information Marianna Safronova Department of Physics and Astronomy February 10, 2009 Outline Quantum Information: fundamental principles
More informationQubit Recycling. Ran Chu. May 4, 2016
Qubit Recycling Ran Chu May 4, 06 Abstract Shor s quantum algorithm for fast number factoring is a key example of quantum computational algorithm and the prime motivator in the international effort to
More informationChallenges in Quantum Information Science. Umesh V. Vazirani U. C. Berkeley
Challenges in Quantum Information Science Umesh V. Vazirani U. C. Berkeley 1 st quantum revolution - Understanding physical world: periodic table, chemical reactions electronic wavefunctions underlying
More informationQuantum Computers Is the Future Here?
Quantum Computers Is the Future Here? Tal Mor CS.Technion ISCQI Feb. 2016 128?? [ 2011 ; sold to LM ] D-Wave Two :512?? [ 2013 ; sold to NASA + Google ] D-Wave Three: 1024?? [ 2015 ; also installed at
More informationSemiconductors: Applications in spintronics and quantum computation. Tatiana G. Rappoport Advanced Summer School Cinvestav 2005
Semiconductors: Applications in spintronics and quantum computation Advanced Summer School 1 I. Background II. Spintronics Spin generation (magnetic semiconductors) Spin detection III. Spintronics - electron
More informationIBM quantum experience: Experimental implementations, scope, and limitations
IBM quantum experience: Experimental implementations, scope, and limitations Plan of the talk IBM Quantum Experience Introduction IBM GUI Building blocks for IBM quantum computing Implementations of various
More informationphys4.20 Page 1 - the ac Josephson effect relates the voltage V across a Junction to the temporal change of the phase difference
Josephson Effect - the Josephson effect describes tunneling of Cooper pairs through a barrier - a Josephson junction is a contact between two superconductors separated from each other by a thin (< 2 nm)
More informationAdvanced Cryptography Quantum Algorithms Christophe Petit
The threat of quantum computers Advanced Cryptography Quantum Algorithms Christophe Petit University of Oxford Christophe Petit -Advanced Cryptography 1 Christophe Petit -Advanced Cryptography 2 The threat
More informationQuantum Computing. Separating the 'hope' from the 'hype' Suzanne Gildert (D-Wave Systems, Inc) 4th September :00am PST, Teleplace
Quantum Computing Separating the 'hope' from the 'hype' Suzanne Gildert (D-Wave Systems, Inc) 4th September 2010 10:00am PST, Teleplace The Hope All computing is constrained by the laws of Physics and
More informationQUANTUM COMPUTING. Part II. Jean V. Bellissard. Georgia Institute of Technology & Institut Universitaire de France
QUANTUM COMPUTING Part II Jean V. Bellissard Georgia Institute of Technology & Institut Universitaire de France QUANTUM GATES: a reminder Quantum gates: 1-qubit gates x> U U x> U is unitary in M 2 ( C
More informationRisk management and the quantum threat
LEIDEN UNIVERSITY Risk management and the quantum threat Understanding the requirements to run Shor s algorithm to break RSA with a 2048 bit key and how to use this information to protect against the quantum
More informationGates for Adiabatic Quantum Computing
Gates for Adiabatic Quantum Computing Richard H. Warren Abstract. The goal of this paper is to introduce building blocks for adiabatic quantum algorithms. Adiabatic quantum computing uses the principle
More informationThe quantum threat to cryptography
The quantum threat to cryptography Ashley Montanaro School of Mathematics, University of Bristol 20 October 2016 Quantum computers University of Bristol IBM UCSB / Google University of Oxford Experimental
More informationQuantum Computers. Peter Shor MIT
Quantum Computers Peter Shor MIT 1 What is the difference between a computer and a physics experiment? 2 One answer: A computer answers mathematical questions. A physics experiment answers physical questions.
More informationQuantum Computation and Communication
Tom Lake tswsl1989@sucs.org 16/02/2012 quan tum me chan ics: The branch of mechanics that deals with the mathematical description of the motion and interaction of subatomic particles - OED quan tum me
More informationIntroduction to Quantum Computing
Introduction to Quantum Computing Toni Bluher Math Research Group, NSA 2018 Women and Mathematics Program Disclaimer: The opinions expressed are those of the writer and not necessarily those of NSA/CSS,
More informationAlgorithms, Logic and Complexity. Quantum computation. basic explanations! &! survey of progress
Algorithms, Logic and Complexity Quantum computation basic explanations! &! survey of progress Index Why Quantum Computation?! Quantum mechanics! D-wave! Quantum programming «If you think you understand
More informationPost Von Neumann Computing
Post Von Neumann Computing Matthias Kaiserswerth Hasler Stiftung (formerly IBM Research) 1 2014 IBM Corporation Foundation Purpose Support information and communication technologies (ICT) to advance Switzerland
More informationQuantum Computing. Richard Jozsa Centre for Quantum Information and Foundations DAMTP University of Cambridge
Quantum Computing Richard Jozsa Centre for Quantum Information and Foundations DAMTP University of Cambridge Physics and Computation A key question: what is computation....fundamentally? What makes it
More informationReversible and Quantum computing. Fisica dell Energia - a.a. 2015/2016
Reversible and Quantum computing Fisica dell Energia - a.a. 2015/2016 Reversible computing A process is said to be logically reversible if the transition function that maps old computational states to
More informationAttacking the ECDLP with Quantum Computing
Attacking the ECDLP with Quantum Computing Sam Green and Can Kizilkale sam.green@cs.ucsb.edu, cankizilkale@cs.ucsb.edu December 7, 015 CS 90g Fall Term 015 Attacking the ECDLP with Quantum Computing 1
More informationHacking Quantum Cryptography. Marina von Steinkirch ~ Yelp Security
Hacking Quantum Cryptography Marina von Steinkirch ~ Yelp Security Agenda 1. Quantum Mechanics in 10 mins 2. Quantum Computing in 11 mins 3. Quantum Key Exchange in 100 mins (or more minutes) Some disclaimers
More informationA brief survey on quantum computing
A brief survey on quantum computing Edward Poon University of Ottawa Edward Poon (Ottawa) A brief survey on quantum computing March 19, 2018 1 / 7 Outline Goal: Provide a high-level overview of what quantum
More information*WILEY- Quantum Computing. Joachim Stolze and Dieter Suter. A Short Course from Theory to Experiment. WILEY-VCH Verlag GmbH & Co.
Joachim Stolze and Dieter Suter Quantum Computing A Short Course from Theory to Experiment Second, Updated and Enlarged Edition *WILEY- VCH WILEY-VCH Verlag GmbH & Co. KGaA Contents Preface XIII 1 Introduction
More informationIBM Q: building the first universal quantum computers for business and science. Federico Mattei Banking and Insurance Technical Leader, IBM Italy
IBM Q: building the first universal quantum computers for business and science Federico Mattei Banking and Insurance Technical Leader, IBM Italy Agenda Which problems can not be solved with classical computers?
More informationQuantum Information Science (QIS)
Quantum Information Science (QIS) combination of three different fields: Quantum Physics QIS Computer Science Information Theory Lecture 1 - Outline 1. Quantum Mechanics 2. Computer Science History 3.
More informationVerification of quantum computation
Verification of quantum computation THOMAS VIDICK, CALIFORNIA INSTITUTE OF TECHNOLOGY Presentation based on the paper: Classical verification of quantum computation by U. Mahadev (IEEE symp. on Foundations
More informationIntroduction to Quantum Information Processing
Introduction to Quantum Information Processing Lecture 6 Richard Cleve Overview of Lecture 6 Continuation of teleportation Computation and some basic complexity classes Simple quantum algorithms in the
More informationTopological Quantum Computation. George Toh 11/6/2017
Topological Quantum Computation George Toh 11/6/2017 Contents Quantum Computing Comparison of QC vs TQC Topological Quantum Computation How to implement TQC? Examples, progress Industry investment Future
More informationBiomedical Security. Some Security News 9/17/2018. Erwin M. Bakker. Blockchains are not safe for voting (slashdot.org) : From: paragonie.
Biomedical Security Erwin M. Bakker Some Security News From: NYTimes Blockchains are not safe for voting (slashdot.org) : From Motherboard.vice.com ECDAA: Eliptic Curve Direct Anonymous Attestation for
More informationQuantum Computing. Joachim Stolze and Dieter Suter. A Short Course from Theory to Experiment. WILEY-VCH Verlag GmbH & Co. KGaA
Joachim Stolze and Dieter Suter Quantum Computing A Short Course from Theory to Experiment Second, Updated and Enlarged Edition WILEY- VCH WILEY-VCH Verlag GmbH & Co. KGaA Preface XIII 1 Introduction and
More informationShor s Prime Factorization Algorithm
Shor s Prime Factorization Algorithm Bay Area Quantum Computing Meetup - 08/17/2017 Harley Patton Outline Why is factorization important? Shor s Algorithm Reduction to Order Finding Order Finding Algorithm
More informationQuantum Technologies for Cryptography
University of Sydney 11 July 2018 Quantum Technologies for Cryptography Mario Berta (Department of Computing) marioberta.info Quantum Information Science Understanding quantum systems (e.g., single atoms
More informationCryptography in a quantum world
T School of Informatics, University of Edinburgh 25th October 2016 E H U N I V E R S I T Y O H F R G E D I N B U Outline What is quantum computation Why should we care if quantum computers are constructed?
More informationSummary of Hyperion Research's First QC Expert Panel Survey Questions/Answers. Bob Sorensen, Earl Joseph, Steve Conway, and Alex Norton
Summary of Hyperion Research's First QC Expert Panel Survey Questions/Answers Bob Sorensen, Earl Joseph, Steve Conway, and Alex Norton Hyperion s Quantum Computing Program Global Coverage of R&D Efforts
More informationIntroduction to Quantum Computing
Introduction to Quantum Computing Part I Emma Strubell http://cs.umaine.edu/~ema/quantum_tutorial.pdf April 12, 2011 Overview Outline What is quantum computing? Background Caveats Fundamental differences
More informationEU investment in Quantum Technologies
EU investment in Quantum Technologies ENISA Summer School, 26. September2018 Dr. Gustav Kalbe High Performance Computing and Quantum Technologies DG CNECT, European Commission 2 nd Quantumrevolution: manipulating/exploiting
More informationIBM Systems for Cognitive Solutions
IBM Q Quantum Computing IBM Systems for Cognitive Solutions Ehningen 12 th of July 2017 Albert Frisch, PhD - albert.frisch@de.ibm.com 2017 IBM 1 st wave of Quantum Revolution lasers atomic clocks GPS sensors
More informationExperimental Quantum Computing: A technology overview
Experimental Quantum Computing: A technology overview Dr. Suzanne Gildert Condensed Matter Physics Research (Quantum Devices Group) University of Birmingham, UK 15/02/10 Models of quantum computation Implementations
More informationQuantum Information Transfer and Processing Miloslav Dušek
Quantum Information Transfer and Processing Miloslav Dušek Department of Optics, Faculty of Science Palacký University, Olomouc Quantum theory Quantum theory At the beginning of 20 th century about the
More informationTutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction
Tutorial on Quantum Computing Vwani P. Roychowdhury Lecture 1: Introduction 1 & ) &! # Fundamentals Qubits A single qubit is a two state system, such as a two level atom we denote two orthogonal states
More informationQuantum Effect or HPC without FLOPS. Lugano March 23, 2016
Quantum Effect or HPC without FLOPS Lugano March 23, 2016 Electronics April 19, 1965 2016 D-Wave Systems Inc. All Rights Reserved 2 Moore s Law 2016 D-Wave Systems Inc. All Rights Reserved 3 www.economist.com/technology-quarterly/2016-03-12/aftermoores-law
More informationQuantum Computing. Thorsten Altenkirch
Quantum Computing Thorsten Altenkirch Is Computation universal? Alonzo Church - calculus Alan Turing Turing machines computable functions The Church-Turing thesis All computational formalisms define the
More informationThe quantum threat to cryptography
The quantum threat to cryptography Michele Mosca 8 May 2016 Vienna, Austria Cryptography in the context of quantum computers E. Lucero, D. Mariantoni, and M. Mariantoni Harald Ritsch Y. Colombe/NIST How
More informationPhysics is becoming too difficult for physicists. David Hilbert (mathematician)
Physics is becoming too difficult for physicists. David Hilbert (mathematician) Simple Harmonic Oscillator Credit: R. Nave (HyperPhysics) Particle 2 X 2-Particle wave functions 2 Particles, each moving
More informationPost-quantum RSA. We built a great, great 1-terabyte RSA wall, and we had the university pay for the electricity
We built a great, great 1-terabyte RSA wall, and we had the university pay for the electricity Daniel J. Bernstein Joint work with: Nadia Heninger Paul Lou Luke Valenta The referees are questioning applicability...
More informationQuantum Computing 101. ( Everything you wanted to know about quantum computers but were afraid to ask. )
Quantum Computing 101 ( Everything you wanted to know about quantum computers but were afraid to ask. ) Copyright Chris Lomont, 2004 2 67 1 = 193707721 761838257287 Took American Mathematician Frank Nelson
More informationFrom Niels Bohr to Quantum Computing - from philosophical struggle to technological revolution
From Niels Bohr to Quantum Computing - from philosophical struggle to technological revolution IPAC 2017 Intel Pentium QuadCore processor, 3.5 GHz, 3 GB SDRAM. Quantum computer Processor unknown 1000 Hz
More informationBiomedical Security. Overview 9/15/2017. Erwin M. Bakker
Biomedical Security Erwin M. Bakker Overview Cryptography: Algorithms Cryptography: Protocols Pretty Good Privacy (PGP) / B. Schneier Workshop Biomedical Security Biomedical Application Security (guest
More informationThe Reality of Quantum Computing
The Reality of Quantum Computing Now and in the Future @qant Christoph Lameter Jump Trading LLC Great Expectations But the current state: Wild West Funding: Governments see a chance to win
More informationBreaking RSA with Quantum Computing
University of Ljubljana Faculty of Mathematics and Physics Breaking RSA with Quantum Computing Blaž Bačnik Under mentorship of dr. Marko Žnidarič Ljubljana, 26 May 2008 Abstract We take a look at RSA encryption
More informationThe Quantum Threat to Cybersecurity (for CxOs)
The Quantum Threat to Cybersecurity (for CxOs) Michele Mosca 5 th ETSI-IQC Workshop on Quantum-Safe Cryptography 13 September 2017 What is quantum?? E. Lucero, D. Mariantoni, and M. Mariantoni 2017 M.
More informationUniversity of Illinois at Chicago. Prelude: What is the fastest algorithm to sort an array?
Challenges in quantum algorithms for integer factorization 1 D. J. Bernstein University of Illinois at Chicago Prelude: What is the fastest algorithm to sort an array? def blindsort(x): while not issorted(x):
More informationSecrets of Quantum Information Science
Secrets of Quantum Information Science Todd A. Brun Communication Sciences Institute USC Quantum computers are in the news Quantum computers represent a new paradigm for computing devices: computers whose
More informationBreaking Symmetric Cryptosystems Using Quantum Algorithms
Breaking Symmetric Cryptosystems Using Quantum Algorithms Gaëtan Leurent Joined work with: Marc Kaplan Anthony Leverrier María Naya-Plasencia Inria, France FOQUS Workshop Gaëtan Leurent (Inria) Breaking
More informationLarge-Scale Quantum Architectures
Large-Scale Quantum Architectures Fred Chong Director of Computer Engineering Professor of Computer Science University of California at Santa Barbara With Daniel Kudrow, Tzvetan Metodi, Darshan Thaker,
More informationQuantum Information Processing
Quantum Information Processing Jonathan Jones http://nmr.physics.ox.ac.uk/teaching The Information Age Communication Shannon Computation Turing Current approaches are essentially classical which is wrong
More informationQuantum computing! quantum gates! Fisica dell Energia!
Quantum computing! quantum gates! Fisica dell Energia! What is Quantum Computing?! Calculation based on the laws of Quantum Mechanics.! Uses Quantum Mechanical Phenomena to perform operations on data.!
More informationQuantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms
Quantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms Martin Roetteler, Michael Naehrig, Krysta M Svore, and Kristin Lauter Microsoft Research, USA Abstract We give precise quantum
More informationIntroduction to Superconductivity. Superconductivity was discovered in 1911 by Kamerlingh Onnes. Zero electrical resistance
Introduction to Superconductivity Superconductivity was discovered in 1911 by Kamerlingh Onnes. Zero electrical resistance Meissner Effect Magnetic field expelled. Superconducting surface current ensures
More informationQuantum Chosen-Ciphertext Attacks against Feistel Ciphers
SESSION ID: CRYP-R09 Quantum Chosen-Ciphertext Attacks against Feistel Ciphers Gembu Ito Nagoya University Joint work with Akinori Hosoyamada, Ryutaroh Matsumoto, Yu Sasaki and Tetsu Iwata Overview 3-round
More informationIntroduction to Quantum Information, Quantum Computation, and Its Application to Cryptography. D. J. Guan
Introduction to Quantum Information, Quantum Computation, and Its Application to Cryptography D. J. Guan Abstract The development of quantum algorithms and quantum information theory, as well as the design
More informationPromise of Quantum Computation
Quantum Computation, and Epilog: The Future of Computing 1 Promise of Quantum Computation Classical computers have their limitations: Factoring large numbers takes exponential time. No faster algorithm
More informationLimitations on transversal gates
Limitations on transversal gates Michael Newman 1 and Yaoyun Shi 1,2 University of Michigan 1, Alibaba Group 2 February 6, 2018 Quantum fault-tolerance Quantum fault-tolerance Quantum fault-tolerance Quantum
More informationShor s Algorithm. Polynomial-time Prime Factorization with Quantum Computing. Sourabh Kulkarni October 13th, 2017
Shor s Algorithm Polynomial-time Prime Factorization with Quantum Computing Sourabh Kulkarni October 13th, 2017 Content Church Thesis Prime Numbers and Cryptography Overview of Shor s Algorithm Implementation
More informationWhat are we talking about when we talk about post-quantum cryptography?
PQC Asia Forum Seoul, 2016 What are we talking about when we talk about post-quantum cryptography? Fang Song Portland State University PQC Asia Forum Seoul, 2016 A personal view on postquantum cryptography
More informationMathematics of Public Key Cryptography
Mathematics of Public Key Cryptography Eric Baxter April 12, 2014 Overview Brief review of public-key cryptography Mathematics behind public-key cryptography algorithms What is Public-Key Cryptography?
More informationSome Notes on Post-Quantum Cryptography
Some Notes on Post-Quantum Cryptography J. Maurice Rojas Texas A&M University March 27, 2014 Historical Context... Flight 150 B.C.E.: Reference to Śyena=Garuda =a Bird-like Hindu divinity in India Historical
More informationDaniel J. Bernstein University of Illinois at Chicago. means an algorithm that a quantum computer can run.
Quantum algorithms 1 Daniel J. Bernstein University of Illinois at Chicago Quantum algorithm means an algorithm that a quantum computer can run. i.e. a sequence of instructions, where each instruction
More informationQuantum Computing: What s the deal? Michele Mosca ICPM Discussion Forum 4 June 2017
Quantum Computing: What s the deal? Michele Mosca ICPM Discussion Forum 4 June 2017 What is quantum?? E. Lucero, D. Mariantoni, and M. Mariantoni 2017 M. Mosca New paradigm brings new possibilities Designing
More informationCyber Security in the Quantum Era
T Computer Security Guest Lecture University of Edinburgh 27th November 2017 E H U N I V E R S I T Y O H F R G E D I N B U Outline Quantum Computers: Is it a threat to Cyber Security? Why should we act
More informationIntroduction to Quantum Computing
Introduction to Quantum Computing Stephen Casey NASA Slide template creator Krysta Svore Bloch Sphere Hadamard basis θ φ Quantum Hardware Technologies Quantum dots Superconductors Ion traps Nitrogen
More informationGrover Algorithm Applied to Four Qubits System
www.ccsenet.org/cis Computer and Inormation Science Vol., No. ; May Grover Algorithm Applied to Four Qubits System Z. Sakhi (Corresponding author) Laboratory o Inormation Technology and Modelisation, and
More informationECE 646 Lecture 9. RSA: Genesis, operation & security
ECE 646 Lecture 9 RSA: Genesis, operation & security Required Reading (1) W. Stallings, "Cryptography and Network-Security," Chapter 8.1 Prime Numbers Chapter 8.2 Fermat's and Euler's Theorems Chapter
More informationResource Efficient Design of Quantum Circuits for Quantum Algorithms
Resource Efficient Design of Quantum Circuits for Quantum Algorithms Himanshu Thapliyal Department of Electrical and Computer Engineering University of Kentucky, Lexington, KY hthapliyal@uky.edu Quantum
More informationLecture 2, March 2, 2017
Lecture 2, March 2, 2017 Last week: Introduction to topics of lecture Algorithms Physical Systems The development of Quantum Information Science Quantum physics perspective Computer science perspective
More informationLecture note 8: Quantum Algorithms
Lecture note 8: Quantum Algorithms Jian-Wei Pan Physikalisches Institut der Universität Heidelberg Philosophenweg 12, 69120 Heidelberg, Germany Outline Quantum Parallelism Shor s quantum factoring algorithm
More informationNano and Biological Technology Panel: Quantum Information Science
26 th US Army Science Conference, Orlando 3 December 2008 Nano and Biological Technology Panel: Quantum Information Science Professor Andrew Dzurak NSW Manager, Centre for Quantum Computer Technology NSW
More informationStream ciphers. Pawel Wocjan. Department of Electrical Engineering & Computer Science University of Central Florida
Stream ciphers Pawel Wocjan Department of Electrical Engineering & Computer Science University of Central Florida wocjan@eecs.ucf.edu Definition of block ciphers Block ciphers: crypto work horse n bits
More informationSome Notes on Post-Quantum Cryptography
Some Notes on Post-Quantum Cryptography J. Maurice Rojas Texas A&M University October 9, 2013 150 B.C.E.: Reference to Śyena=Garuda =a Bird-like Hindu divinity in India 150 B.C.E.:...Garuda in India 100
More informationQuantum technology popular science description
Quantum technology popular science description 1 Quantum physics, from theory to ongoing revolution In the early 1900s observations were made that were not consistent with traditional, classical physics.
More informationQuantum Computers. Todd A. Brun Communication Sciences Institute USC
Quantum Computers Todd A. Brun Communication Sciences Institute USC Quantum computers are in the news Quantum computers represent a new paradigm for computing devices: computers whose components are individual
More informationSome Introductory Notes on Quantum Computing
Some Introductory Notes on Quantum Computing Markus G. Kuhn http://www.cl.cam.ac.uk/~mgk25/ Computer Laboratory University of Cambridge 2000-04-07 1 Quantum Computing Notation Quantum Computing is best
More information400 nm Solid State Qubits (1) Daniel Esteve GROUP. SPEC, CEA-Saclay
400 nm Solid State Qubits (1) S D Daniel Esteve QUAN UM ELECT RONICS GROUP SPEC, CEA-Saclay From the Copenhagen school (1937) Max Planck front row, L to R : Bohr, Heisenberg, Pauli,Stern, Meitner, Ladenburg,
More informationQUANTUM TECHNOLOGIES: THE SECOND QUANTUM REVOLUTION* Jonathan P. Dowling
QUANTUM TECHNOLOGIES: THE SECOND QUANTUM REVOLUTION* Jonathan P. Dowling Quantum Science & Technologies Group Hearne Institute for Theoretical Physics Louisiana State University http://quantum.phys.lsu.edu
More informationQuantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 1: Quantum circuits and the abelian QFT
Quantum algorithms (CO 78, Winter 008) Prof. Andrew Childs, University of Waterloo LECTURE : Quantum circuits and the abelian QFT This is a course on quantum algorithms. It is intended for graduate students
More informationIntroduction to Quantum Computing
Introduction to Quantum Computing Petros Wallden Lecture 7: Complexity & Algorithms I 13th October 016 School of Informatics, University of Edinburgh Complexity - Computational Complexity: Classification
More informationPQ Crypto Panel. Bart Preneel Professor, imec-cosic KU Leuven. Adi Shamir Borman Professor of Computer Science, The Weizmann Institute, Israel
#RSAC SESSION ID: CRYP-W10 PQ Crypto Panel MODERATOR: Bart Preneel Professor, imec-cosic KU Leuven PANELISTS: Dr. Dan Boneh Professor, Stanford University Michele Mosca Professor, UWaterloo and evolutionq
More informationShor s Algorithm. Elisa Bäumer, Jan-Grimo Sobez, Stefan Tessarini May 15, 2015
Shor s Algorithm Elisa Bäumer, Jan-Grimo Sobez, Stefan Tessarini May 15, 2015 Integer factorization n = p q (where p, q are prime numbers) is a cryptographic one-way function Classical algorithm with best
More informationNotes. Number Theory: Applications. Notes. Number Theory: Applications. Notes. Hash Functions I
Number Theory: Applications Slides by Christopher M. Bourke Instructor: Berthe Y. Choueiry Fall 2007 Computer Science & Engineering 235 Introduction to Discrete Mathematics Sections 3.4 3.7 of Rosen cse235@cse.unl.edu
More informationQuantum Computing and the Possible Effects on Modern Security Practices
Quantum Computing and the Possible Effects on Modern Security Practices SE 4C03 Winter 2005 Kartik Sivaramakrishnan Researched by: Jeffery Lindner, 9904294 Due: April 04, 2005 Table of Contents Introduction...
More informationIntroduction to Quantum Computing. Lecture 1
Introduction to Quantum Computing Lecture 1 1 OUTLINE Why Quantum Computing? What is Quantum Computing? History Quantum Weirdness Quantum Properties Quantum Computation 2 Why Quantum Computing? 3 Transistors
More informationFactoring on a Quantum Computer
Factoring on a Quantum Computer The Essence Shor s Algorithm Wolfgang Polak wp@pocs.com Thanks to: Eleanor Rieffel Fuji Xerox Palo Alto Laboratory Wolfgang Polak San Jose State University, 4-14-010 - p.
More informationConcepts and Algorithms of Scientific and Visual Computing Advanced Computation Models. CS448J, Autumn 2015, Stanford University Dominik L.
Concepts and Algorithms of Scientific and Visual Computing Advanced Computation Models CS448J, Autumn 2015, Stanford University Dominik L. Michels Advanced Computation Models There is a variety of advanced
More informationQuantum-Safe Crypto Why & How? JP Aumasson, Kudelski Security
Quantum-Safe Crypto Why & How? JP Aumasson, Kudelski Security Flight plan What s a quantum computer? How broken are your public keys? AES vs. quantum search Hidden quantum powers Defeating quantum computing
More information