Quantum Computing 101. ( Everything you wanted to know about quantum computers but were afraid to ask. )

Similar documents
Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation

quantum mechanics is a hugely successful theory... QSIT08.V01 Page 1

1.0 Introduction to Quantum Systems for Information Technology 1.1 Motivation

Shor s Algorithm. Polynomial-time Prime Factorization with Quantum Computing. Sourabh Kulkarni October 13th, 2017

Quantum Information Science (QIS)

Introduction to Quantum Computing

Quantum computing for beginners

Quantum Computing. Vraj Parikh B.E.-G.H.Patel College of Engineering & Technology, Anand (Affiliated with GTU) Abstract HISTORY OF QUANTUM COMPUTING-

My brief introduction to cryptography

CRYPTOGRAPHY AND LARGE PRIMES *

Theory of Computation Chapter 12: Cryptography

MAA509: Quantum Computing and Information Introduction

IBM Q: building the first universal quantum computers for business and science. Federico Mattei Banking and Insurance Technical Leader, IBM Italy

NUMBER THEORY AND CODES. Álvaro Pelayo WUSTL

Quantum Computers. Peter Shor MIT

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

Public Key Cryptography

Introduction to Quantum Computing

Quantum Computation and Communication

Introduction to Quantum Computing

Theme : Cryptography. Instructor : Prof. C Pandu Rangan. Speaker : Arun Moorthy CS

Introduction. What is RSA. A Guide To RSA by Robert Yates. Topics

phys4.20 Page 1 - the ac Josephson effect relates the voltage V across a Junction to the temporal change of the phase difference

Discrete Mathematics GCD, LCM, RSA Algorithm

RSA. Ramki Thurimella

Security Issues in Cloud Computing Modern Cryptography II Asymmetric Cryptography

Lecture 5: Arithmetic Modulo m, Primes and Greatest Common Divisors Lecturer: Lale Özkahya

Single and Entangled photons. Edward Pei

Public Key Cryptography. All secret key algorithms & hash algorithms do the same thing but public key algorithms look very different from each other.

The RSA cryptosystem and primality tests

Cryptography. pieces from work by Gordon Royle

RSA Algorithm. Factoring, EulerPhi, Breaking RSA. Çetin Kaya Koç Spring / 14

Algorithms for quantum computers. Andrew Childs Department of Combinatorics & Optimization and Institute for Quantum Computing University of Waterloo

Slides by Kent Seamons and Tim van der Horst Last Updated: Oct 1, 2013

Definition: For a positive integer n, if 0<a<n and gcd(a,n)=1, a is relatively prime to n. Ahmet Burak Can Hacettepe University

Hacking Quantum Cryptography. Marina von Steinkirch ~ Yelp Security

ICS141: Discrete Mathematics for Computer Science I

QUANTUM COMPUTING & CRYPTO: HYPE VS. REALITY ABHISHEK PARAKH UNIVERSITY OF NEBRASKA AT OMAHA

Lecture Quantum Information Processing II: Implementations. spring term (FS) 2017

Introduction to Quantum Algorithms Part I: Quantum Gates and Simon s Algorithm

The Impact of Quantum Computing

COMP424 Computer Security

1 Recommended Reading 1. 2 Public Key/Private Key Cryptography Overview RSA Algorithm... 2

Genomes Computing. Reminders. Cost of Synthesizing. Encoding the Problem B. Solving HAMPATH with DNA. cs3102: Theory of Computation

Quantum theory has opened to us the microscopic world of particles, atoms and photons..and has given us the keys of modern technologies

Circuit Complexity. Circuit complexity is based on boolean circuits instead of Turing machines.

A brief survey on quantum computing

Quantum Computing. Thorsten Altenkirch

10 Modular Arithmetic and Cryptography

Quantum Circuits and Algorithms

Errors, Eavesdroppers, and Enormous Matrices

An Introduction to Probabilistic Encryption

Quantum technology popular science description

Lemma 1.2. (1) If p is prime, then ϕ(p) = p 1. (2) If p q are two primes, then ϕ(pq) = (p 1)(q 1).

COMPARATIVE ANALYSIS ON TURING MACHINE AND QUANTUM TURING MACHINE

Limits and Future of Computing Where do we go from here?

Great Ideas in Theoretical Computer Science. Lecture 28: A Gentle Introduction to Quantum Computation

The Reality of Quantum Computing

The Future. Currently state of the art chips have gates of length 35 nanometers.

Public Key Algorithms

Ma/CS 6a Class 3: The RSA Algorithm

THE RSA ENCRYPTION SCHEME

Factoring. Number Theory # 2

Shor s Prime Factorization Algorithm

Entanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen

Computers of the Future? Moore s Law Ending in 2018?

10 Public Key Cryptography : RSA

Introduction to Quantum Computation

Quantum Computing. Separating the 'hope' from the 'hype' Suzanne Gildert (D-Wave Systems, Inc) 4th September :00am PST, Teleplace

RSA RSA public key cryptosystem

ECE297:11 Lecture 12

Cosmology Lecture 2 Mr. Kiledjian

Reversible and Quantum computing. Fisica dell Energia - a.a. 2015/2016

CIS 551 / TCOM 401 Computer and Network Security

A Gentle Introduction to Quantum Computing

dit-upm RSA Cybersecurity Cryptography

Ajit Narayanan and Mark Moore. University of Exeter

Quantum Cryptography. Marshall Roth March 9, 2007

Quantum Effect or HPC without FLOPS. Lugano March 23, 2016

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

Public Key Algorithms

Introduction to Quantum Computation

Semiconductors: Applications in spintronics and quantum computation. Tatiana G. Rappoport Advanced Summer School Cinvestav 2005

Simon s algorithm (1994)

INTRODUCTORY NOTES ON QUANTUM COMPUTATION

Limits of Computation. Antonina Kolokolova

Compute the Fourier transform on the first register to get x {0,1} n x 0.

Handouts. CS701 Theory of Computation

Introduction to Computer Science. Polly Huang NTU EE

1 What are Physical Attacks. 2 Physical Attacks on RSA. Today:

Quantum computing. Jan Černý, FIT, Czech Technical University in Prague. České vysoké učení technické v Praze. Fakulta informačních technologií

Foundations of

Innovation and Cryptoventures. Cryptography 101. Campbell R. Harvey. Duke University, NBER and Investment Strategy Advisor, Man Group, plc

Cryptography. P. Danziger. Transmit...Bob...

Mathematics of Public Key Cryptography

Adiabatic quantum computation a tutorial for computer scientists

Introduction to Quantum Information, Quantum Computation, and Its Application to Cryptography. D. J. Guan

Public-key Cryptography and elliptic curves

Lecture 14: Secure Multiparty Computation

Public Key Cryptography

Transcription:

Quantum Computing 101 ( Everything you wanted to know about quantum computers but were afraid to ask. ) Copyright Chris Lomont, 2004

2 67 1 = 193707721 761838257287 Took American Mathematician Frank Nelson Cole 20 years of Sunday afternoons to compute in 1903. Wrote on board to standing ovation. Famous since Mersenne Prime. Mersenne claimed it prime in 1644. Mathematica takes 0.031 seconds to do now. I offer $5 to the first person that can factor by hand (no calculators!) 95861 during this talk. Factoring can be very hard.

Who cares about factoring? It is the basis of RSA, the most widely used public-key encryption system in the world. Invented 1978 by Ron Rivest, Adi Shamir,, and Leonard Adleman. The RSA patent expired recently. RSA is a billion $ industry. Finding a way to factor integers quickly would allow you to break bank transactions, read secret messages all over the world, and get you a one-way trip to the National Security Agency. (And make you famous. Or dead.)

How RSA Works We encrypt a message T (as a number) into ciphertext C (another number): 1. Find P and Q, two large (e.g., 1024-bit) prime numbers. 2. Pick 1< E < PQ, and E and (P-1)(Q 1)(Q-1)=F 1)=F relatively prime. 3. Compute D, inverse of E, such that F divides (DE - 1). 4. Encryption C = (T^E) mod PQ. 5. Decryption T = (C^D) mod PQ. Public key is the pair (PQ, E). Private key is D. Publish public key. There are no known easy methods of calculating D, P, or Q given only public key. If P and Q are each 1024 bits long, the sun will burn out before the most powerful computers presently in existence can factor PQ.

RSA Example Easy as 1,2,3 1. I pick P=3, Q=11, E= 3, and D=7. Notice E and F=(P- 1)(Q-1)=20 1)=20 have no common factors, and DE=21 divided by F=20 has remainder 1. Now I publish my Public Key (PQ,E) which is (33,3). D=7 is my private key which I use to decode messages encrypted with my public key. 2. You want to send me the message 9. Use my public key and compute the remainder when 9^3=729 is divided by 33, obtaining C=3, which you send me. 3. I use my private key D (which you could too, if you could factor PQ=77)to compute the remainder of C^D=3^7=2187 when divided by 33, and I get your message back, which is 9. Amazing!

The Point FACTORING INTEGERS IS VERY IMPORTANT AND HARD!! a a n= p p p k a 1 2 1 2... k

Origins of Computing To understand how hard factoring is, we must understand what an algorithm is. David Hilbert (1862-1943) 1943) Posed 23 problems in mathematics at the Second International Congress in Paris on August 8, 1900. Over the past 100 years, many have been solved. #10: Does there exist a universal algorithm solving Diophantine equations? Alan Turing (1912-1954) 1954) Working on #10 in 1930 s, formulated what algorithm means. Gives sequence for pencil and paper calculations. Shows precisely what is computable. Forms basis of modern computing.

Origins of Computing, Take Two Church-Turing Thesis: All computers are created equal. Universal Turing Machine can simulate any other machine efficiently. Turing claimed any device which does computation is roughly as good as any other. Holds until now quantum computing seems to jump to a new level.

Computing Model John von Neumann developed a simple model of how to put together electronic circuits to implement a Turing machine. 1947 - John Bardeen,, Walter Brittain, and Will Shockley invented the transistor, for which they received the 1956 Nobel Prize in Physics. 1965 - Gordon Moore (founder of Intel) states Moore s Law: Computing power will double for constant cost every 18 months, which has held until now.

Computing Model, Part Deux Turing machine Mental construct to describe algorithms. Idea is an infinite tape. Describe how computer works: 0 s and 1 s idea. Each cell is a bit,, stores 0 or 1. Basic component: Physically: transistor. Conceptually: NAND gate.

Physical Computing Limits Quantum effects As circuits get small, electrons jump out of wires and cause problems Some problems just too hard 1982: Richard Feynman in pointed out that classical computers cannot simulate quantum systems,, since in general describing n quantum particles require 2^n complex numbers. He suggested building quantum systems to run these simulations. Example: Simulating 50 particles requires 2^50=1,125,899,906,842,624 numbers to be stored in the computer. Richard Feynman 1918-1988

The 2-Slide 2 Quantum Mechanics To understand quantum computers, we must explain some quantum theory. Created from about 1900 through 1940. Plank (1900), Einstein(1905), Bohr(1913), Schrodinger(1926), Heisenberg(1925), Pauli(1933), Dirac(1928), von Neumann (1932). Primer

2-Slide Quantum Mechanics Primer Classical particles Certainty in momentum and position Observing does not change them Atomic particles (Slide 2) Uncertainty in momentum and position Observing changes them Examples: electron, proton, neutron, photon Statistical in nature spread out Tunneling.

Quantum Computing Origins The shrinking component size in recent chip design is running against quantum effects, so researchers were wondering how to avoid them. It turns out that they might actually help computation, on, if used properly. Feynman labeled above noticed QM not possible on TM. David Deutsch In 1985, trying to derive Church-Turing Thesis from physical law led to quantum systems. Defined notion of Universal Quantum Computer: capable of efficiently simulating any QTM. Found a problem that QTM could solve efficiently, but TM could not. n Unknown if any physical system can be efficiently simulated on QTM. Q Peter Shor - 1994 - integer factoring algorithm, N digit number. Exponential speedup over best known integer factoring algorithm (GNFS) search reduced from O( N) ( ) to O N Lov Grover 1994 search reduced from to

Quantum Computing Model Classically, a bit is the smallest piece of information a computer can store, which is labeled 0 and 1. Classical bits are 0 OR 1, never both, never somewhat of a mix.. [0] OR [1]. Quantum bits ( qubits qubits ) are allowed to be a mix of states 0 and 1, each with some probability [0] + [1] at the same time. Qubits can be entangled in a manner not possible with classical bits.

Deutsch s Algorithm 1. Problem : Given a black box that takes as input 0 or 1, and outputs 0 or 1 deterministically, decide if the box outputs the same value for different inputs. 2. Classically, this box needs to be interrogated twice. 3. If it is a quantum box, handling superpositions of states, it only needs to be interrogated once.

Simon s Algorithm Generalized Deutsch s algorithm to many questions at once. Showed a problem that requires exponential time on any Turing machine, but is polynomial time on a quantum Turing machine. Result: Quantum Computers are MORE powerful than any classical computer can be.

Shor s Factoring Algorithm 1 2 exp c N log N N log N log log N 2 ( ) 3( ) 3 ( )( ) Obtained from studying Deutsch s and Simon s algorithms. Reduces factoring to period finding. Exponentially faster than best known classical algorithm. For example, it would require 1000 workstations 10 29 years to factor a 4096 bit number using GNFS, but take a 100 MHZ quantum computer only 4.8 hours. Algorithm was experimentally verified in 2001 by IBM, using 7 qubits to factor 15 = 3 x 5.

Factoring Comparison Year vs bitsize 1024 bits 2048 bits 4096 bits 2006 10 5 5x10 15 3x10 29 Bits 1024 2048 4096 Qubits 5,124 10,244 20,484 2024 38 10 12 7x10 25 Gates 3x10 9 2x10 11 2x10 12 2042 3 days 3x10 8 2x10 22 Time 4.5 36 288 Years required, assuming Moore s Law, no new theorems, GNFS, and 1000 workstations Minutes required and physical requirements, assuming a 100 MHZ QC

Grover s Algorithm Finds items in an unsorted list faster than any classical computer. Instead of using N steps, only uses Sqrt[N], by using quantum entanglement to search many places at once. Example: Find one item from a million Expect to look at 500,000 items (classical). Expect to look 1,000 items (quantum).

The Grand Challenge Graph Isomorphism Current research seeks a quantum algorithm that would give an efficient graph isomorphism algorithm.

Future Directions P=NP? Solution worth over $1,000,000. String computing? Does adding relativity increase power? Engineering problems Error correction The most beautiful thing we can experience is the mysterious.