Quantum Security using Property of a Quantum Wave Function

Size: px
Start display at page:

Download "Quantum Security using Property of a Quantum Wave Function"

Transcription

1 Quantum Security using Property of a Quantum Wave Function Wafa Elmannai, Khaled Elleithy, Varun Pande, Elham Geddeda Department of Computer Science and Engineering University of Bridgeport, USA welmanna@my.bridgeport.edu, elleithy@bridgeport.edu, pande@my.bridgeport.edu, egeddeda@my.bridgeport.edu, Abstract- security over communication is totally essential especially for critical applications such as Military, Education and Financial applications. Unfortunately, many security mechanisms can be broken with new developments in classical computers. Quantum computers are capable of performing high speed simultaneous computations rather than sequentially as the case in classical computers do. In order to break a symmetric encryption algorithm, the attacker needs to find all the potential key combinations to get the right one. In this paper, we are introducing a secure protocol that considers the Qubit as a wave function. The beauty of the work is that the proposed protocol is based on time stamp that can only be broken by the correct set of time value, wave function, Qubit position, and other attributes such as: velocity, and phase of the Qubit. Moreover, using quantum tunneling makes the proposed protocol stronger by providing a very strong secure password protection mechanism using just one Qubit. Keyword: Quantum Security, Quantum Wave Function, Qubit position, quantum tunneling. I. INTRODUCTION The implication of quantum mechanics has a new aspect in the physical world. In these new computing paradigms machines are composed of collection of particles whose behavior, in fact, are not deterministic but is probabilistic. Moreover, the true state of a particle cannot be known because the measurement of one aspect of the state may cause interference in the value of other aspects which is known as Heisenberg principal of uncertainty. This is considered as the basis of some security issues which are relevant to quantum communication system. The behavior of a state, although it is probabilistic, is also demonstrated as super position of values [1, 2]. In addition, the achievement of quantum computation enables us to perform calculations on all states at the same time. However, with algorithms which give a unique answer, we can obtain answers on quantum computer which is much faster than using classical computer [3]. The probabilities of the amplitude and quantum algorithms are considered as a result of obtaining the correct answer. Furthermore, the construction of quantum computer is considered as the source of quantum computing; for example, the central computation engine of a device is based on the concept of encoding information called qubits which its values are not fixed. That can encode a superposition of states. Also, operations on quantum computer can be implemented on all states at the same time. However, quantum computer is a debatable topic due to its actual hardware implementation. The hardware implementation is based on simple quantum gates that make developing and constructing a large scale quantum computer practically overwhelming [4]. In this paper, we are presenting a new algorithm that is capable of securing data such as password or personal information by using the quantum wave function. Based on current literature, there are many security quantum mechanisms that are unsafe due to their dependency on the assumption that classical computers are not fast enough. However, the quantum security mechanisms are based on both the quantum approaches and encryption techniques which make it hard to break. Quantum unclone theorem and Heisenberg inaccurate principle could guarantee the quantum security [5]. In addition, Quantum computing is security verifiable and behaviorally predictable by several global encryption and physics groups due to its performance in detecting eavesdropper s behavior. It is proposed in this paper is to introduce a new quantum algorithm that considers the Qubit as a wave particle in order to perform a stronger security over specific data. The algorithm is based on a stored stack of different attributes which makes it more secure than others. That is because in order to expose and match the data, all attributes in the stack need to be known. We are going to demonstrate in the following section the quantum wave function and how it is presented in such a case. A. Quantum Wave Function Overview: The function of quantum waves of a particle and in which way they act is discussed in this section. The quantum wave function is also known as quantum state, whereas its value is presented as a complex number [6]. Actually, every particle is a function of time and space and here exactly is where our protocol relies on. According to Schrodinger s equation which discusses how a wave function transforms through time [7], the wave function is considered as water or string waves.

2 Therefore, this type of equation is a mathematical wave equation which points to the wave particle duality that locates a particle in a specified place and time. However, in Max Borns proposal, the wave function can be found by the probability density function. Furthermore, the wave function has other attributes like velocity field which depends on the actual position of N particle in the universe. The state of a particle at a given time is managed by two vectors; the first one is representing the position, and the other one is representing the momentum. Both determine a point of 6 dimensional phase space; in other words, a particle that moves in only one diminution with position x and momentum p. Thus, the wave function depends on the position x. In addition, the physical significance of quantum wave function can be understood only if we know that they belong to a linear vector space. The linear vector space, which is called the Hilbert space of square- integral function, is discussed in functional analysis and mathematical physical. So, the study of physical interpretation of the wave function in the space represents a possible state of a quantum particle. II. RELATED WORK There are several attempts and experiments that have been carried out to secure the distribution of the secret key and the security in quantum computing. In this section, we summarize some of the successful attempts with our evaluation wherever possible. One of these attempts done by [8] was submitted in his thesis; its title, Quantum Key Exchange, is based on quantum mechanics. As the author claimed, security relies on fundamental laws of quantum mechanics. The first step in this work was the study of the Squeezed States which the author thinks is necessary to enable him to secure the quantum key exchange protocol. According to [10], the true transition that people need is achieved either with biometry or with digital and physical keys. Also, they found out that approaching physical keys has no pessimistic results but they are liable to hacking. The alterative solution according to [9] is application of Quantum Secure Authentication (Q S A) of none - reproducing conventional physical keys. They are applying Quantum Secure Readout that is limited in operation. So far an exploration has been done by experimental quantum that works with a large number of channels represented by more than 1000 degrees with optical wave front and light modulation 13. Such detailed process could prevent hacking which is continuously developing new techniques. However, the protocol of quantum readout of (PUF) technique challenges hackings by using non cloning property of quantum states to hide Physical Unclonable Function (PUF). Mosk et al. [11] used several steps such as highly robust cohered states of light with photon, a spatial light modulator (SLM1) and (SLM2). Also, they used a control peak in the analyzer plane for photon detection repeated the measurements 2000 times to improve the statistics. The researchers also used a histogram method to discriminate between authentic and immoral. They introduced the quantum security parameter and photon; moreover, they used micro mirror based spatial high modulations. The results of this method shows that the readout system is rigorously protected. The paper provides security against hikers. The implementation to secure this protocol can be carried out under certain conditions and problems that occur can be solved by Quantum Key Exchange (QKE). Other implementations about securing communications by using quantum cryptography include new techniques for secure key distributions with signal photon transmissions which is called Quantum Key Distribution (QKD). The advantage of quantum cryptography offers ease use [11] and avoids the insider thread. Also, it avoids the harried and clumsy physical security parts of classical key distribution method. Another advantage of this method is that it provides a secure alternative to key distribution projects which are based on public key cryptography. III. PROPOSED ALGORITHM A. The Proposed Algorithm and Set Up: In this section, we are introducing a secure quantum algorithm to provide a high level of security over critical data. Our algorithm is based on Max Born s and Louis de Broglie s theorems. To demonstrate the security of this algorithm, we have implemented it using C sharp programming language. The idea of this algorithm is to take the wave function as the main input, the Qubit is considered as a wave particle, all over a time stamp that can only be broken by the correct set of time value, wave function, and Qubit position. Furthermore, the algorithm is based on quantum Tunneling [12]. The property of quantum tunneling is changed in our algorithmic approach using the phase velocity of one qubit particle. It has been discussed in literature that a state of a function in quantum of a particle acts quantitatively as wave function that transforms throughout the time. The equation of quality is a mathematical wave equation while density can be used to locate a particle in a given place and time, according to Max Born s theory. Louis de Broglie invented a real value of wave function which is presented with complex wave function by a continuum of proportionality and created the De Broglie Bohm theory. The atom velocity can be shown using the following equation: In order for us to present many atoms, we consider Q k as kth particle and the following equation presents the speeds: The actual position of those particles can affect their velocity fields; whereas, it can be encapsulated into an active

3 wave function. Thus, it provides us the ability to provide more security using one Qubit or a combination of more than one Qubit which makes the proposed algorithm stronger. Table 1 shows the initial values that we used in the implemented application. Actually, the attributes are the main input for one Qubit to present the quantum wave function. The values presented are only for one of our experimented examples. match, the process is repeated until the desired result is achieved. Therefore, the desired results can only be achieved with the correct input data; otherwise, an infinite iterative loop occurs. This can demonstrate the strength of our algorithm for preventing compromising the password. Table 1: Attributes of Quantum Wave Function Computation for One Qubit Attribute Value Time 12:47:52:08 Wave Length ƛ 3 Frequency 3 Phase Speed 3X10 8 Energy 0.22 Ψ(x) Φ(p) Spin +1/2 B. The Experiment and the System Architecture: We have discussed in the previous sections that the proposed algorithm is designed to provide a high level of security over critical data. Therefore, our concern was to prevent attacking a user s password over time using quantum computing efficiency. Passwords can be a combination of letters, numbers and symbols. Based on this data, the algorithm starts computing the quantum wave function as shown in Figure 1. As shown in Figure 1, we choose our data from an implemented database. In addition, we use the wave function and the given data in order to define the wave length. This information produces the frequency value and the phase. Then, we apply Schrodinger s wave equation [13] to compute the particle state over the time: Where, is the imaginary part, is the h bar, is timedependent wave function, ( ) is the impending value and is the Hamiltonian operator. Based on our computation the wave function will be generated. More details are explained in the following section. In the next step of the algorithm we calculate the window size and prediction size. The algorithm starts to compare the output of the wave function that is displayed from a single Qubit to figure out whether or not they match. If they do not Figure1: Flow Chart of the Proposed Secure Quantum Algorithm C. The Results of the Experiment: In this section we present results of our implementation. We have used different phases and types of wave functions over the time versus the phases velocities as shown in Figure 2. Figure 2 shows the various wave functions that we use as input to determine the Qubit locations based on the time value. The used wave functions are sinusoid, sigmoid, parabola, growing sinusoid, and exponent. Based on the data that is displayed on the graph, we start to examine our application over all types of the wave function to show the efficiency of the application. Since our application stores the stack of input data, we can determine the specific probable location of a

4 Qubit using Schrodinger wave functions. The given values in the graph are real time positions and the probable positions are up to the computational algorithm. Figure 3 presents the application s result for sine wave function over time where we now know the probable locations of the qubit in which the wave function has created. Also, the probable density and the velocity of each Qubit are known. Now we also know that in a certain period of space and time, the velocity, the phase s value of the Qubit and its wavelength will be unique to that moment of space and time. Since time is a constant which is leading to infinity, the only input values of the data set leading to compute the location of a real time Qubit is done based on our novel approach. This algorithm allows us to look into the field of quantum particle which enabled the security. Therefore, as we can observe in Figure 3 we are going over infinite loop once we run the application unless the right set of data is matched. On the other hand, that makes it hard for an attacker to compromise the data. Figure 4 shows the matching of the real part and imaginary parts of the quantum wave function; where the right set of data was entered. IV. CONCLUSIONS The main objective of this paper is to a high level of security over sensitive data using a quantum wave function. To demonstrate the feasibility of this approach, we have used C sharp programming language to implement a secure algorithm. The proposed algorithm is a novel approach in looking at the way a Qubit behaves as a wave function. Every Qubit has a place in space and time in terms of wave particle duality. Schrodinger s wave equation is used to define such a property of the wave function. Furthermore, Max Born theory is used in our algorithmic approach to define the probable location of Qubit in a wave function. Also, using De- Broglie s theory, we can define the velocity of a Qubit. Moreover, the Qubit is measured as a wave particle over a time stamp which cannot be broken without the correct set of time value, wave function, Qubit position. Furthermore, our proposed algorithm is using quantum Tunneling. In summary, we presented a new approach for a security system using quantum based qubits. The advantages of such an approach can revolutionize the way we look at the system s security replacing bounded key length Classical encryption algorithms. In addition, the proposed algorithm could prevent compromising passwords. Furthermore, the algorithm stores appropriate data of a Qubit to provide a secure feature in terms of its wave properties. Figure 2: The Wave Function Presentation to Determine the Location of Qubit Figure 3: the Generation of Quantum Wave Function over the time Figure 4: Matching of Real Part and Imaginary Part of Quantum Wave Function REFERENCES [1] Bainbridge, William S., ed. Societal Implications of nanoscience and nanotechnology. Springer, [2] Niemiec, Marcin, and Andrzej R. Pach. "Management of security in quantum cryptography." Communications Magazine, IEEE 51, no. 8 (2013). [3] Scarani, Valerio, Helle Bechmann-Pasquinucci, Nicolas J. Cerf, Miloslav Dušek, Norbert Lütkenhaus, and Momtchil Peev. "The security of

5 practical quantum key distribution." Reviews of Modern Physics 81, no. 3 (2009): [4] Ursin, Rupert, and Richard Hughes. "Quantum information: Sharing quantum secrets." Nature 501, no (2013): [5] Baili, Sun, et al. "An Improved Method of Quantum Key Distribution Protocol."Computer Science-Technology and Applications, IFCSTA'09. International Forum on. Vol. 1. IEEE, [6] Campbell, Earl T., and Joseph Fitzsimons. "An introduction to one-way quantum computing in distributed architectures." International Journal of Quantum Information 8.01n02 (2010): [7] Shepherd, James J., et al. "Convergence of many-body wave-function expansions using a plane-wave basis: From homogeneous electron gas to solid state systems." Physical Review B 86.3 (2012): [8] Poels, Karin, Pim Tuyls, and Berry Schoenmakers. "Generic security proof of quantum key exchange using squeezed states." Information Theory, ISIT Proceedings. International Symposium on. IEEE, [9] Vellekoop, I. M., and A. P. Mosk. "Focusing coherent light through opaque strongly scattering media." Optics letters (2007): [10] Goorden, Sebastianus A., Marcel Horstmann, Allard P. Mosk, Boris Škorić, and Pepijn WH Pinkse. "Quantum-Secure Authentication with a Classical Key."arXiv preprint arxiv: (2013). [11] Mosk, Allard P., Ad Lagendijk, Geoffroy Lerosey, and Mathias Fink. "Controlling waves in space and time for imaging and focusing in complex media." Nature photonics 6, no. 5 (2012): [12] Datta, Ayan, and Sharmishta Karmakar. "Role of Quantum Mechanical Tunneling on the γ effect of Silicon on Carbenes in 3- Trimethylsilylcyclobutylidene." The Journal of Physical Chemistry B (2014). [13] Bortot, C. A., M. M. Cavalcanti, W. J. Corrêa, and V. N. Domingos Cavalcanti. "Uniform decay rate estimates for Schrödinger and plate equations with nonlinear locally distributed damping." Journal of Differential Equations 254, no. 9 (2013): AUTHORS Mrs. Wafa Elmannai is a PhD Candidate in the School of Engineering and Computer Science at the University of Bridgeport. She received her master degree from University Of Bridgeport, USA. She has received her Bachelor s degree in Fall2005 at Ben Ashore College for Computer Science, Libya. She graduated with highest honors, ranking 4th in her Bachelor degree and awarded merit certificate. She also was recognized by both Phi Kappa Phi and Upsilon Pi Epsilon. She received a scholarship in 2012 based on her academic achievement from Upsilon Pi Epsilon. Mrs. Elmannai worked as a Research Assistant at University of Bridgeport from and Graduate Assistance from at University of Bridgeport. She worked in the management department as assistant administrator in education department from in Libya. She also worked as a teacher in Algamaheria School from Mrs. Elmannai is interested in network areas, mobile communications, and some software applications. She has published several papers in international journals and conferences. She has made presentation of her researches in different conferences. Dr. Khaled Elleithy is the Associate Dean for Graduate Studies in the School of Engineering at the University of Bridgeport. He has research interests in the areas of network security, mobile communications, and formal approaches for design and verification. He has published more than two hundred and fifty research papers in international journals and conferences in his areas of expertise. Dr. Elleithy is the co-chair of the International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE). CISSE is the first Engineering/Computing and Systems Research E-Conference in the world to be completely conducted online in real-time via the internet and was successfully running for four years. Dr. Elleithy is the editor and co-editor of 12 books published by Springer for advances on Innovations and Advanced Techniques in Systems, Computing Sciences and Software. Mr. Varun Pande is a Graduate Research Assistant currently attending the University of Bridgeport as a PhD candidate in Computer Science and Engineering. He graduated from the University of Bridgeport with a Masters in Computer Science in May of He had worked as a CSR representative at TATA Power during his Bachelor in Computer Science and Information Technology. Currently and for the past two years, he has been a Graduate Assistant and taught Labs on Wireless Sensor Communication using MICA z Motes. His research interests are Computer Vision, Image Processing, Parallel processing and Wireless Sensor Networks. He hopes to share my experiences, research and knowledge with other graduates and professionals in order to work in a collaborative research for a Better tomorrow! Miss. Elham Geddeda was graduated from Faculty of Information Technology - Computer science -, and she worked as a teacher in her specialty for five years. Also, she is presently undergoing her Masters in the field of Computer Science at University of Bridgeport. She is interested in network area, mobile communication.

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC) A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC) Majid Alshammari and Khaled Elleithy Department of Computer Science and Engineering University of Bridgeport

More information

Quantum-Secure Authentication

Quantum-Secure Authentication Quantum-Secure Authentication Physics Symposium Bits of Physics Eindhoven, Dec. 16, 2014 Boris Škorić Outline Authentication of Objects Unclonable Physical Functions (PUFs) Quantum readout of PUFs - theory

More information

Security Implications of Quantum Technologies

Security Implications of Quantum Technologies Security Implications of Quantum Technologies Jim Alves-Foss Center for Secure and Dependable Software Department of Computer Science University of Idaho Moscow, ID 83844-1010 email: jimaf@cs.uidaho.edu

More information

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

Physics is becoming too difficult for physicists. David Hilbert (mathematician) Physics is becoming too difficult for physicists. David Hilbert (mathematician) Simple Harmonic Oscillator Credit: R. Nave (HyperPhysics) Particle 2 X 2-Particle wave functions 2 Particles, each moving

More information

A Highly Secure Quantum Communication Scheme for Blind Signature using Qubits and Qutrits

A Highly Secure Quantum Communication Scheme for Blind Signature using Qubits and Qutrits Proceedings of 2014 Zone 1 Conference of the American Society for Engineering Education (ASEE Zone 1) A Highly Secure Quantum Communication Scheme for Blind Signature using Qubits and Qutrits Arafat Abu

More information

A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols

A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols Walter O. Krawec walter.krawec@gmail.com Iona College Computer Science Department New Rochelle, NY USA IEEE WCCI July, 2016

More information

Realization of B92 QKD protocol using id3100 Clavis 2 system

Realization of B92 QKD protocol using id3100 Clavis 2 system Realization of B92 QKD protocol using id3100 Clavis 2 system Makhamisa Senekane 1, Abdul Mirza 1, Mhlambululi Mafu 1 and Francesco Petruccione 1,2 1 Centre for Quantum Technology, School of Chemistry and

More information

10 - February, 2010 Jordan Myronuk

10 - February, 2010 Jordan Myronuk 10 - February, 2010 Jordan Myronuk Classical Cryptography EPR Paradox] The need for QKD Quantum Bits and Entanglement No Cloning Theorem Polarization of Photons BB84 Protocol Probability of Qubit States

More information

Quantum Wireless Sensor Networks

Quantum Wireless Sensor Networks Quantum Wireless Sensor Networks School of Computing Queen s University Canada ntional Computation Vienna, August 2008 Main Result Quantum cryptography can solve the problem of security in sensor networks.

More information

Security analysis of Quantum-Readout PUFs in the case of challenge-estimation attacks

Security analysis of Quantum-Readout PUFs in the case of challenge-estimation attacks Security analysis of Quantum-Readout PUFs in the case of challenge-estimation attacks Boris Škorić Abstract Quantum Readout PUFs (QR-PUFs) have been proposed as a technique for remote authentication of

More information

CS120, Quantum Cryptography, Fall 2016

CS120, Quantum Cryptography, Fall 2016 CS10, Quantum Cryptography, Fall 016 Homework # due: 10:9AM, October 18th, 016 Ground rules: Your homework should be submitted to the marked bins that will be by Annenberg 41. Please format your solutions

More information

Quantum Information Transfer and Processing Miloslav Dušek

Quantum Information Transfer and Processing Miloslav Dušek Quantum Information Transfer and Processing Miloslav Dušek Department of Optics, Faculty of Science Palacký University, Olomouc Quantum theory Quantum theory At the beginning of 20 th century about the

More information

WHITE PAPER ON QUANTUM COMPUTING AND QUANTUM COMMUNICATION

WHITE PAPER ON QUANTUM COMPUTING AND QUANTUM COMMUNICATION WHITE PAPER ON QUANTUM COMPUTING AND QUANTUM COMMUNICATION Based on the discussion during the respective workshop at the ZEISS Symposium Optics in the Quantum World on 18 April 2018 in Oberkochen, Germany

More information

Device-Independent Quantum Information Processing

Device-Independent Quantum Information Processing Device-Independent Quantum Information Processing Antonio Acín ICREA Professor at ICFO-Institut de Ciencies Fotoniques, Barcelona Chist-Era kick-off seminar, March 2012, Warsaw, Poland Quantum Information

More information

The Relativistic Quantum World

The Relativistic Quantum World The Relativistic Quantum World A lecture series on Relativity Theory and Quantum Mechanics Marcel Merk University of Maastricht, Sept 24 Oct 15, 2014 Relativity Quantum Mechanics The Relativistic Quantum

More information

Quantum Key Distribution and the Future of Encryption

Quantum Key Distribution and the Future of Encryption Quantum Key Distribution and the Future of Encryption Konstantinos Karagiannis Global Technical Lead, Ethical Hacking BT Security Amsterdam, October 16 th, 2014 Understanding QM? I think I can safely say

More information

Cosmology Lecture 2 Mr. Kiledjian

Cosmology Lecture 2 Mr. Kiledjian Cosmology Lecture 2 Mr. Kiledjian Lecture 2: Quantum Mechanics & Its Different Views and Interpretations a) The story of quantum mechanics begins in the 19 th century as the physicists of that day were

More information

Hacking Quantum Cryptography. Marina von Steinkirch ~ Yelp Security

Hacking Quantum Cryptography. Marina von Steinkirch ~ Yelp Security Hacking Quantum Cryptography Marina von Steinkirch ~ Yelp Security Agenda 1. Quantum Mechanics in 10 mins 2. Quantum Computing in 11 mins 3. Quantum Key Exchange in 100 mins (or more minutes) Some disclaimers

More information

PROGRESS IN OPTICS VOLUME 4 9. E. Wolf

PROGRESS IN OPTICS VOLUME 4 9. E. Wolf PROGRESS IN OPTICS VOLUME 4 9 E. Wolf Preface v Chapter 1. Gaussian apodization and beam propagation, Virendra N. Mahajan (El Segundo, CA and Tucson, AZ, USA) 1 1. Introduction 3 2. Theory 5 2.1. Pupil

More information

Quantum Cryptography

Quantum Cryptography Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam Centrum Wiskunde & Informatica Winter 17 QuantumDay@Portland

More information

Closing the Debates on Quantum Locality and Reality: EPR Theorem, Bell's Theorem, and Quantum Information from the Brown-Twiss Vantage

Closing the Debates on Quantum Locality and Reality: EPR Theorem, Bell's Theorem, and Quantum Information from the Brown-Twiss Vantage Closing the Debates on Quantum Locality and Reality: EPR Theorem, Bell's Theorem, and Quantum Information from the Brown-Twiss Vantage C. S. Unnikrishnan Fundamental Interactions Laboratory Tata Institute

More information

A Quantum Fuzzy Logic for a Secure and Safe Wireless Network Communication

A Quantum Fuzzy Logic for a Secure and Safe Wireless Network Communication A Quantum Fuzzy Logic for a Secure and Safe Wireless Network Communication Varun Pande, Khaled Elleithy, Wafa Elmannai, Elham Geddeda Department of Computer Science and Engineering University of Bridgeport,

More information

Quantum Computing 101. ( Everything you wanted to know about quantum computers but were afraid to ask. )

Quantum Computing 101. ( Everything you wanted to know about quantum computers but were afraid to ask. ) Quantum Computing 101 ( Everything you wanted to know about quantum computers but were afraid to ask. ) Copyright Chris Lomont, 2004 2 67 1 = 193707721 761838257287 Took American Mathematician Frank Nelson

More information

Secrets of Quantum Information Science

Secrets of Quantum Information Science Secrets of Quantum Information Science Todd A. Brun Communication Sciences Institute USC Quantum computers are in the news Quantum computers represent a new paradigm for computing devices: computers whose

More information

A NOVEL APPROACH FOR SECURE MULTI-PARTY SECRET SHARING SCHEME VIA QUANTUM CRYPTOGRAPHY

A NOVEL APPROACH FOR SECURE MULTI-PARTY SECRET SHARING SCHEME VIA QUANTUM CRYPTOGRAPHY A NOVEL APPROACH FOR SECURE MULI-PARY SECRE SHARING SCHEME VIA QUANUM CRYPOGRAPHY Noor Ul Ain Dept. of Computing, SEECS National University of Sciences and echnology H-1 Islamabad, Pakistan 13msccsnaain@seecs.edu.pk

More information

OKLAHOMA SUBJECT AREA TESTS (OSAT )

OKLAHOMA SUBJECT AREA TESTS (OSAT ) CERTIFICATION EXAMINATIONS FOR OKLAHOMA EDUCATORS (CEOE ) OKLAHOMA SUBJECT AREA TESTS (OSAT ) FIELD 014: PHYSICS September 2011 Subarea Range of Competencies I. Scientific and Engineering Processes 0001

More information

Chapter 38 Quantum Mechanics

Chapter 38 Quantum Mechanics Chapter 38 Quantum Mechanics Units of Chapter 38 38-1 Quantum Mechanics A New Theory 37-2 The Wave Function and Its Interpretation; the Double-Slit Experiment 38-3 The Heisenberg Uncertainty Principle

More information

RELIABLE BIOMETRIC AUTHENTICATION WITH PRIVACY PROTECTION

RELIABLE BIOMETRIC AUTHENTICATION WITH PRIVACY PROTECTION RELIABLE BIOMETRIC AUTHENTICATION WITH PRIVACY PROTECTION E. VERBITSKIY, P. TUYLS, D. DENTENEER, J.P. LINNARTZ PHILIPS RESEARCH LABORATORIES PROF. HOLSTLAAN 4, AA 5656 EINDHOVEN, THE NETHERLANDS {EVGENY.VERBITSKIY,PIM.TUYLS,DEE.DENTENEER,J.P.LINNARTZ@PHILIPS.COM}

More information

Introduction to Quantum Computing

Introduction to Quantum Computing Introduction to Quantum Computing Petros Wallden Lecture 1: Introduction 18th September 2017 School of Informatics, University of Edinburgh Resources 1. Quantum Computation and Quantum Information by Michael

More information

Introduction to Quantum Cryptography

Introduction to Quantum Cryptography Università degli Studi di Perugia September, 12th, 2011 BunnyTN 2011, Trento, Italy This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License. Quantum Mechanics

More information

Entanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen

Entanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen Entanglement arnoldzwicky.org Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen PHYS403, July 26, 2017 Entanglement A quantum object can

More information

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes 5th March 2004 Unconditional Security of Quantum Key Distribution With Practical Devices Hermen Jan Hupkes The setting Alice wants to send a message to Bob. Channel is dangerous and vulnerable to attack.

More information

Summary. The prospect of a factoring. Consumer key generation. Future long range key. Commercial systems. Metro Networks. exchange. machine. Spin-off.

Summary. The prospect of a factoring. Consumer key generation. Future long range key. Commercial systems. Metro Networks. exchange. machine. Spin-off. The future of quantum cryptography BCS Meeting 17th Sept 2009 J. G. Rarity University of Bristol john.rarity@bristol.ac.uk Summary Commercial systems. Metro Networks. Future long range key exchange. Consumer

More information

10. Physics from Quantum Information. I. The Clifton-Bub-Halvorson (CBH) Theorem.

10. Physics from Quantum Information. I. The Clifton-Bub-Halvorson (CBH) Theorem. 10. Physics from Quantum Information. I. The Clifton-Bub-Halvorson (CBH) Theorem. Clifton, Bub, Halvorson (2003) Motivation: Can quantum physics be reduced to information-theoretic principles? CBH Theorem:

More information

Quantum Information. and Communication

Quantum Information. and Communication Quantum Information 2015.7.22 and Communication quantum mechanics uncertainty principle wave function superposition state information/communication cryptography signal processing Quantum Information/Communication

More information

Centre for Quantum Information and Communication

Centre for Quantum Information and Communication Centre for Quantum Information and Communication http://quic.ulb.ac.be local UA3-217 Mémoires de Fin d'etudes pour l année académique 2018-19 Contacts : Prof. Nicolas Cerf (ncerf@ulb.ac.be) Prof. Jérémie

More information

Standardization of Quantum Cryptography in China

Standardization of Quantum Cryptography in China Standardization of Quantum Cryptography in China Zhengfu Han University of Science and Technology of China Anhui Asky Quantum Technology Co.,Ltd November 7,2018 CONTENTS 1 Background on Quantum Cryptography

More information

CRYPTOGRAPHY AND NUMBER THEORY

CRYPTOGRAPHY AND NUMBER THEORY CRYPTOGRAPHY AND NUMBER THEORY XINYU SHI Abstract. In this paper, we will discuss a few examples of cryptographic systems, categorized into two different types: symmetric and asymmetric cryptography. We

More information

Optical Quantum Communication with Quantitative Advantage. Quantum Communication

Optical Quantum Communication with Quantitative Advantage. Quantum Communication Optical Quantum Communication with Quantitative Advantage Juan Miguel Arrazola Benjamin Lovitz Ashutosh Marwah Dave Touchette Norbert Lütkenhaus Institute for Quantum Computing & Department of Physics

More information

1 1D Schrödinger equation: Particle in an infinite box

1 1D Schrödinger equation: Particle in an infinite box 1 OF 5 1 1D Schrödinger equation: Particle in an infinite box Consider a particle of mass m confined to an infinite one-dimensional well of width L. The potential is given by V (x) = V 0 x L/2, V (x) =

More information

Applications of Quantum Key Distribution (QKD)

Applications of Quantum Key Distribution (QKD) Applications of Quantum Key Distribution (QKD) Olav Tirkkonen, Iikka Elonsalo, Jari Lietzen, Teemu Manninen, Ilkka Tittonen, Roope Vehkalahti Departments of Communications and Networking & Micro and Nano,

More information

Quantum Computing. Richard Jozsa Centre for Quantum Information and Foundations DAMTP University of Cambridge

Quantum Computing. Richard Jozsa Centre for Quantum Information and Foundations DAMTP University of Cambridge Quantum Computing Richard Jozsa Centre for Quantum Information and Foundations DAMTP University of Cambridge Physics and Computation A key question: what is computation....fundamentally? What makes it

More information

The Three Upcoming Revolutions in Physics and Astronomy that will Affect Everyone. Quantum Information Nov. 12, 2002

The Three Upcoming Revolutions in Physics and Astronomy that will Affect Everyone. Quantum Information Nov. 12, 2002 The Three Upcoming Revolutions in Physics and Astronomy that will Affect Everyone Quantum Information Nov. 12, 2002 The History of Secrecy Enemy of the State You re being watched Big Brother You are captured

More information

Ping Pong Protocol & Auto-compensation

Ping Pong Protocol & Auto-compensation Ping Pong Protocol & Auto-compensation Adam de la Zerda For QIP seminar Spring 2004 02.06.04 Outline Introduction to QKD protocols + motivation Ping-Pong protocol Security Analysis for Ping-Pong Protocol

More information

Science One Physics Lecture 8. The Schrodinger Equation slides with commentary

Science One Physics Lecture 8. The Schrodinger Equation slides with commentary Science One Physics Lecture 8 The Schrodinger Equation slides with commentary : Outline The Schrödinger equation Measurement in quantum mechanics: from the Stern-Gerlach experiment to the Born rule Entanglement

More information

Teaching and Research Experience

Teaching and Research Experience mahmood ul hassan Education and Training 1996 2000 PhD (Doctor of Philosophy) in Physics, University of Cambridge, United Kingdom. - St. John s College, Cambridge. - Department of Applied Mathematics and

More information

Research, Development and Simulation of Quantum Cryptographic Protocols

Research, Development and Simulation of Quantum Cryptographic Protocols http://dx.doi.org/1.5755/j1.eee.19.4.17 Research, Development and Simulation of Quantum Cryptographic Protocols C. Anghel 1 1 University Dunărea de Jos Galati, 2 Științei, 8146 Galati, Romania, phone:

More information

University of Kentucky, Lexington, Kentucky Bachelor of Science, August 1983 to May 1990 Major: Mechanical Engineering

University of Kentucky, Lexington, Kentucky Bachelor of Science, August 1983 to May 1990 Major: Mechanical Engineering Michael Newman Department of Aerospace Engineering 734 H.R. Bright Building College Station, TX 77843-3141 Home: (979)268-8335 Work: (979)845-0750 OBJECTIVE EDUCATION An entry level faculty position to

More information

von Neumann Architecture

von Neumann Architecture Computing with DNA & Review and Study Suggestions 1 Wednesday, April 29, 2009 von Neumann Architecture Refers to the existing computer architectures consisting of a processing unit a single separate storage

More information

Quantum Key Distribution. The Starting Point

Quantum Key Distribution. The Starting Point Quantum Key Distribution Norbert Lütkenhaus The Starting Point Quantum Mechanics allows Quantum Key Distribution, which can create an unlimited amount of secret key using -a quantum channel -an authenticated

More information

Research Proposal for Secure Double slit experiment. Sandeep Cheema Security Analyst, Vichara Technologies. Abstract

Research Proposal for Secure Double slit experiment. Sandeep Cheema Security Analyst, Vichara Technologies. Abstract Research Proposal for Secure Double slit experiment Sandeep Cheema Security Analyst, Vichara Technologies Abstract The key objective of this research proposal is to resolve or advance with the measurement

More information

LECTURE NOTES ON Quantum Cryptography

LECTURE NOTES ON Quantum Cryptography Department of Software The University of Babylon LECTURE NOTES ON Quantum Cryptography By Dr. Samaher Hussein Ali College of Information Technology, University of Babylon, Iraq Samaher@itnet.uobabylon.edu.iq

More information

Basics on quantum information

Basics on quantum information Basics on quantum information Mika Hirvensalo Department of Mathematics and Statistics University of Turku mikhirve@utu.fi Thessaloniki, May 2014 Mika Hirvensalo Basics on quantum information 1 of 49 Brief

More information

Security of Quantum Key Distribution with Imperfect Devices

Security of Quantum Key Distribution with Imperfect Devices Security of Quantum Key Distribution with Imperfect Devices Hoi-Kwong Lo Dept. of Electrical & Comp. Engineering (ECE); & Dept. of Physics University of Toronto Email:hklo@comm.utoronto.ca URL: http://www.comm.utoronto.ca/~hklo

More information

Security of Quantum Cryptography using Photons for Quantum Key Distribution. Karisa Daniels & Chris Marcellino Physics C191C

Security of Quantum Cryptography using Photons for Quantum Key Distribution. Karisa Daniels & Chris Marcellino Physics C191C Security of Quantum Cryptography using Photons for Quantum Key Distribution Karisa Daniels & Chris Marcellino Physics C191C Quantum Key Distribution QKD allows secure key distribution Keys are then used

More information

Quantum Computing: it s the end of the world as we know it? Giesecke+Devrient Munich, June 2018

Quantum Computing: it s the end of the world as we know it? Giesecke+Devrient Munich, June 2018 Quantum Computing: it s the end of the world as we know it? Giesecke+Devrient Munich, June 2018 What drives a company s digital strategy in 2020 and beyond? Quantum Computing it s the end of the world

More information

EE 223 Applied Quantum Mechanics 2 Winter 2016

EE 223 Applied Quantum Mechanics 2 Winter 2016 EE 223 Applied Quantum Mechanics 2 Winter 2016 Syllabus and Textbook references Version as of 12/29/15 subject to revisions and changes All the in-class sessions, paper problem sets and assignments, and

More information

Quantum Cryptography

Quantum Cryptography Quantum Cryptography Umesh V. Vazirani CS 161/194-1 November 28, 2005 Why Quantum Cryptography? Unconditional security - Quantum computers can solve certain tasks exponentially faster; including quantum

More information

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1 Quantum Cryptography Quantum Cryptography Presented by: Shubhra Mittal Instructor: Dr. Stefan Robila Intranet & Internet Security (CMPT-585-) Fall 28 Montclair State University, New Jersey Introduction

More information

Hiding Data in a QImage File

Hiding Data in a QImage File Hiding Data in a QImage File Gabriela Mogos Abstract The idea of embedding some information within a digital media, in such a way that the inserted data are intrinsically part of the media itself, has

More information

EXPERIMENTAL DEMONSTRATION OF QUANTUM KEY

EXPERIMENTAL DEMONSTRATION OF QUANTUM KEY EXPERIMENTAL DEMONSTRATION OF QUANTUM KEY DISTRIBUTION WITH ENTANGLED PHOTONS FOLLOWING THE PING- PONG CODING PROTOCOL Martin Ostermeyer, Nino Walenta University of Potsdam, Institute of Physics, Nonlinear

More information

1 1D Schrödinger equation: Particle in an infinite box

1 1D Schrödinger equation: Particle in an infinite box 1 OF 5 NOTE: This problem set is to be handed in to my mail slot (SMITH) located in the Clarendon Laboratory by 5:00 PM (noon) Tuesday, 24 May. 1 1D Schrödinger equation: Particle in an infinite box Consider

More information

Basics on quantum information

Basics on quantum information Basics on quantum information Mika Hirvensalo Department of Mathematics and Statistics University of Turku mikhirve@utu.fi Thessaloniki, May 2016 Mika Hirvensalo Basics on quantum information 1 of 52 Brief

More information

DEVIL PHYSICS THE BADDEST CLASS ON CAMPUS IB PHYSICS

DEVIL PHYSICS THE BADDEST CLASS ON CAMPUS IB PHYSICS DEVIL PHYSICS THE BADDEST CLASS ON CAMPUS IB PHYSICS TSOKOS LESSON 1-1B: THE INTERACTION OF MATTER WITH RADIATION Introductory Video Quantum Mechanics Essential Idea: The microscopic quantum world offers

More information

Massachusetts Tests for Educator Licensure (MTEL )

Massachusetts Tests for Educator Licensure (MTEL ) Massachusetts Tests for Educator Licensure (MTEL ) FIELD 11: PHYSICS TEST OBJECTIVES Subarea Multiple-Choice Range of Objectives Approximate Test Weighting I. Nature of Science 01 05 12% II. Force and

More information

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1 Cryptography CS 555 Topic 25: Quantum Crpytography CS555 Topic 25 1 Outline and Readings Outline: What is Identity Based Encryption Quantum cryptography Readings: CS555 Topic 25 2 Identity Based Encryption

More information

State Decoding in Multi-Stage Cryptography Protocols

State Decoding in Multi-Stage Cryptography Protocols State Decoding in Multi-Stage Cryptography Protocols Sindhu Chitikela Abstract. This paper presents a practical method of quantum tomography for decoding the state of photons in a multistage cryptography

More information

Quantum Entanglement and Cryptography. Deepthi Gopal, Caltech

Quantum Entanglement and Cryptography. Deepthi Gopal, Caltech + Quantum Entanglement and Cryptography Deepthi Gopal, Caltech + Cryptography Concisely: to make information unreadable by anyone other than the intended recipient. The sender of a message scrambles/encrypts

More information

Quantum Computing. Vraj Parikh B.E.-G.H.Patel College of Engineering & Technology, Anand (Affiliated with GTU) Abstract HISTORY OF QUANTUM COMPUTING-

Quantum Computing. Vraj Parikh B.E.-G.H.Patel College of Engineering & Technology, Anand (Affiliated with GTU) Abstract HISTORY OF QUANTUM COMPUTING- Quantum Computing Vraj Parikh B.E.-G.H.Patel College of Engineering & Technology, Anand (Affiliated with GTU) Abstract Formerly, Turing Machines were the exemplar by which computability and efficiency

More information

Quantum High Performance Computing. Matthias Troyer Station Q QuArC, Microsoft

Quantum High Performance Computing. Matthias Troyer Station Q QuArC, Microsoft Quantum High Performance Computing Station Q QuArC, Microsoft 2000 2006 Station Q A worldwide consortium Universi ty Partner s ETH Zurich University of Copenhagen TU Delft University of Sydney QuArC Station

More information

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009 An Dr Nick Papanikolaou Research Fellow, e-security Group International Digital Laboratory University of Warwick http://go.warwick.ac.uk/nikos Seminar on The Future of Cryptography The British Computer

More information

Practical quantum-key. key- distribution post-processing

Practical quantum-key. key- distribution post-processing Practical quantum-key key- distribution post-processing processing Xiongfeng Ma 马雄峰 IQC, University of Waterloo Chi-Hang Fred Fung, Jean-Christian Boileau, Hoi Fung Chau arxiv:0904.1994 Hoi-Kwong Lo, Norbert

More information

Asymptotic Analysis of a Three State Quantum Cryptographic Protocol

Asymptotic Analysis of a Three State Quantum Cryptographic Protocol Asymptotic Analysis of a Three State Quantum Cryptographic Protocol Walter O. Krawec walter.krawec@gmail.com Iona College Computer Science Department New Rochelle, NY USA IEEE ISIT July, 2016 Quantum Key

More information

Other Topics in Quantum Information

Other Topics in Quantum Information p. 1/23 Other Topics in Quantum Information In a course like this there is only a limited time, and only a limited number of topics can be covered. Some additional topics will be covered in the class projects.

More information

Course Title: Physics I : MECHANICS, THERMODYNAMICS, AND ATOMIC PHYSICS Head of Department:

Course Title: Physics I : MECHANICS, THERMODYNAMICS, AND ATOMIC PHYSICS Head of Department: Course Title: Physics I : MECHANICS, THERMODYNAMICS, AND ATOMIC PHYSICS Head of Department: Nadia Iskandarani Teacher(s) + e-mail: Cycle/Division: Ms.Shewon Nasir: Shewon.n@greenwood.sch.ae High School

More information

QUANTUM COMPUTING & CRYPTO: HYPE VS. REALITY ABHISHEK PARAKH UNIVERSITY OF NEBRASKA AT OMAHA

QUANTUM COMPUTING & CRYPTO: HYPE VS. REALITY ABHISHEK PARAKH UNIVERSITY OF NEBRASKA AT OMAHA QUANTUM COMPUTING & CRYPTO: HYPE VS. REALITY ABHISHEK PARAKH UNIVERSITY OF NEBRASKA AT OMAHA QUANTUM COMPUTING: I CAN SUM IT UP IN ONE SLIDE Pure Magic! 2 SERIOUSLY: HOW DOES IT WORK? That s simple: Even

More information

A Piggybank Protocol for Quantum Cryptography

A Piggybank Protocol for Quantum Cryptography Piggybank Protocol for Quantum Cryptography Navya Chodisetti bstract This paper presents a quantum mechanical version of the piggy-bank cryptography protocol. The basic piggybank cryptography idea is to

More information

Quantum Computing. Separating the 'hope' from the 'hype' Suzanne Gildert (D-Wave Systems, Inc) 4th September :00am PST, Teleplace

Quantum Computing. Separating the 'hope' from the 'hype' Suzanne Gildert (D-Wave Systems, Inc) 4th September :00am PST, Teleplace Quantum Computing Separating the 'hope' from the 'hype' Suzanne Gildert (D-Wave Systems, Inc) 4th September 2010 10:00am PST, Teleplace The Hope All computing is constrained by the laws of Physics and

More information

Quantum Computing. The Future of Advanced (Secure) Computing. Dr. Eric Dauler. MIT Lincoln Laboratory 5 March 2018

Quantum Computing. The Future of Advanced (Secure) Computing. Dr. Eric Dauler. MIT Lincoln Laboratory 5 March 2018 The Future of Advanced (Secure) Computing Quantum Computing This material is based upon work supported by the Assistant Secretary of Defense for Research and Engineering and the Office of the Director

More information

MSc Physics - SC530 (Under Review)

MSc Physics - SC530 (Under Review) MSc Physics - SC530 (Under Review) 1. Specific Titles 1) MSc Physics 2) Postgraduate Diploma in Physics 3) Postgraduate Certificate in Physics 2. Objectives This Programme aims at enhancing the knowledge

More information

Implementing an Intelligent Error Back Propagation (EBP) Relay in PSCAD TM /EMTDC 4.2.1

Implementing an Intelligent Error Back Propagation (EBP) Relay in PSCAD TM /EMTDC 4.2.1 1 Implementing an Intelligent Error Back Propagation (EBP) Relay in PSCAD TM /EMTDC 4.2.1 E. William, IEEE Student Member, Brian K Johnson, IEEE Senior Member, M. Manic, IEEE Senior Member Abstract Power

More information

Challenges in Quantum Information Science. Umesh V. Vazirani U. C. Berkeley

Challenges in Quantum Information Science. Umesh V. Vazirani U. C. Berkeley Challenges in Quantum Information Science Umesh V. Vazirani U. C. Berkeley 1 st quantum revolution - Understanding physical world: periodic table, chemical reactions electronic wavefunctions underlying

More information

Linear-optical quantum information processing: A few experiments

Linear-optical quantum information processing: A few experiments Linear-optical quantum information processing: A few experiments Miloslav Dušek Lucie Čelechovská, Karel Lemr, Michal Mičuda, Antonín Černoch, Jaromír Fiurášek, Miroslav Ježek, ek, Jan Soubusta, Radim

More information

An Architectural Framework For Quantum Algorithms Processing Unit (QAPU)

An Architectural Framework For Quantum Algorithms Processing Unit (QAPU) An Architectural Framework For Quantum s Processing Unit (QAPU) Mohammad Reza Soltan Aghaei, Zuriati Ahmad Zukarnain, Ali Mamat, and ishamuddin Zainuddin Abstract- The focus of this study is developing

More information

Quantum Computers. Peter Shor MIT

Quantum Computers. Peter Shor MIT Quantum Computers Peter Shor MIT 1 What is the difference between a computer and a physics experiment? 2 One answer: A computer answers mathematical questions. A physics experiment answers physical questions.

More information

CHAPTER 6 Quantum Mechanics II

CHAPTER 6 Quantum Mechanics II CHAPTER 6 Quantum Mechanics II 6.1 6.2 6.3 6.4 6.5 6.6 6.7 The Schrödinger Wave Equation Expectation Values Infinite Square-Well Potential Finite Square-Well Potential Three-Dimensional Infinite-Potential

More information

Compute the behavior of reality even if it is impossible to observe the processes (for example a black hole in astrophysics).

Compute the behavior of reality even if it is impossible to observe the processes (for example a black hole in astrophysics). 1 Introduction Read sections 1.1, 1.2.1 1.2.4, 1.2.6, 1.3.8, 1.3.9, 1.4. Review questions 1.1 1.6, 1.12 1.21, 1.37. The subject of Scientific Computing is to simulate the reality. Simulation is the representation

More information

Security of Quantum-Readout PUFs against quadrature based challenge estimation attacks

Security of Quantum-Readout PUFs against quadrature based challenge estimation attacks Security of Quantum-Readout PUFs against quadrature based challenge estimation attacks Boris Škorić, Allard P. Mosk, Pepijn W.H. Pinkse Abstract The concept of quantum-secure readout of Physical Unclonable

More information

CHAPTER 6 Quantum Mechanics II

CHAPTER 6 Quantum Mechanics II CHAPTER 6 Quantum Mechanics II 6.1 The Schrödinger Wave Equation 6.2 Expectation Values 6.3 Infinite Square-Well Potential 6.4 Finite Square-Well Potential 6.5 Three-Dimensional Infinite-Potential Well

More information

Lecture 18 - Secret Sharing, Visual Cryptography, Distributed Signatures

Lecture 18 - Secret Sharing, Visual Cryptography, Distributed Signatures Lecture 18 - Secret Sharing, Visual Cryptography, Distributed Signatures Boaz Barak November 27, 2007 Quick review of homework 7 Existence of a CPA-secure public key encryption scheme such that oracle

More information

Introduction to Quantum Dynamics and Control

Introduction to Quantum Dynamics and Control EE 290O. Advanced Topics in Control: Introduction to Quantum Dynamics and Control Instructor: Alireza Shabani Contact : shabani@berkeley.edu Office: Gilman, Room 19 Cory 278 Office Hours: Wednesdays 3-4

More information

CHAPTER 5 Wave Properties of Matter and Quantum Mechanics I

CHAPTER 5 Wave Properties of Matter and Quantum Mechanics I CHAPTER 5 Wave Properties of Matter and Quantum Mechanics I 5.1 X-Ray Scattering 5. De Broglie Waves 5.3 Electron Scattering 5.4 Wave Motion 5.5 Waves or Particles? 5.6 Uncertainty Principle Many experimental

More information

Bell s inequalities and their uses

Bell s inequalities and their uses The Quantum Theory of Information and Computation http://www.comlab.ox.ac.uk/activities/quantum/course/ Bell s inequalities and their uses Mark Williamson mark.williamson@wofson.ox.ac.uk 10.06.10 Aims

More information

Technical Report Communicating Secret Information Without Secret Messages

Technical Report Communicating Secret Information Without Secret Messages Technical Report 013-605 Communicating Secret Information Without Secret Messages Naya Nagy 1, Marius Nagy 1, and Selim G. Akl 1 College of Computer Engineering and Science Prince Mohammad Bin Fahd University,

More information

Lecture 1: Introduction to Public key cryptography

Lecture 1: Introduction to Public key cryptography Lecture 1: Introduction to Public key cryptography Thomas Johansson T. Johansson (Lund University) 1 / 44 Key distribution Symmetric key cryptography: Alice and Bob share a common secret key. Some means

More information

Quantum Computers. Todd A. Brun Communication Sciences Institute USC

Quantum Computers. Todd A. Brun Communication Sciences Institute USC Quantum Computers Todd A. Brun Communication Sciences Institute USC Quantum computers are in the news Quantum computers represent a new paradigm for computing devices: computers whose components are individual

More information

Highland Park Physics I Curriculum Semester II weeks 12-18

Highland Park Physics I Curriculum Semester II weeks 12-18 NAME OF UNIT: Magnetism NAME OF UNIT: Modern Physics Components Weeks 12-14 Weeks 15-18 Unit Name Magnetism and Electromagnetic Induction Quantum Theory Introduction Electricity can be generated through

More information

Lecture PowerPoint. Chapter 28 Physics: Principles with Applications, 6 th edition Giancoli

Lecture PowerPoint. Chapter 28 Physics: Principles with Applications, 6 th edition Giancoli Lecture PowerPoint Chapter 28 Physics: Principles with Applications, 6 th edition Giancoli 2005 Pearson Prentice Hall This work is protected by United States copyright laws and is provided solely for the

More information

ON THE POSSIBILITY OF NONLINEAR QUANTUM EVOLUTION AND SUPERLUMINAL COMMUNICATION

ON THE POSSIBILITY OF NONLINEAR QUANTUM EVOLUTION AND SUPERLUMINAL COMMUNICATION ON THE POSSIBILITY OF NONLINEAR QUANTUM EVOLUTION AND SUPERLUMINAL COMMUNICATION Shan Gao Institute for the History of Natural Sciences, Chinese Academy of Sciences Beijing 100190, People's Republic of

More information

It Was Probably Heisenberg

It Was Probably Heisenberg Name Partners Date Visual Quantum Mechanics The Next Generation It Was Probably Heisenberg Goal We will use our knowledge of wave functions to create wave packets to describe an electron. We will discover

More information