quantum mechanics a blessing and a curse
play

Quantum Mechanics; a Blessing and a Curse By Elias Marcopoulos - PowerPoint PPT Presentation

Quantum Mechanics; a Blessing and a Curse By Elias Marcopoulos Quantum Computers Quantum Computers are just like regular computers, they crunch numbers Quantum Computers Quantum Computers are just like regular computers, they crunch


  1. Quantum Mechanics; a Blessing and a Curse By Elias Marcopoulos

  2. Quantum Computers • Quantum Computers are just like regular computers, they crunch numbers

  3. Quantum Computers • Quantum Computers are just like regular computers, they crunch numbers • The difference lies in the fact that Quantum Computers can crunch multiple numbers at the same time

  4. Quantum Computers • Quantum Computers are just like regular computers, they crunch numbers • The difference lies in the fact that Quantum Computers can crunch multiple numbers at the same time

  5. Superposition • They do this through a phenomena known as superposition

  6. Superposition • They do this through a phenomena known as superposition • Superposition is when two waves occupy the same physical space, so that their waves are additively combined • This allows a wave to be both a 0 and a 1 at the same time, for instance.

  7. Superposition • You may remember a picture that looks like this, if you ever took a high school physics course

  8. Superposition • You may remember a picture that looks like this, if you ever took a high school physics course This might represent a 1

  9. Superposition • You may remember a picture that looks like this, if you ever took a high school physics course This might represent a 1 And This might represent a 0

  10. Superposition • You may remember a picture that looks like this, if you ever took a high school physics course This might represent a 1 And this would be the resultant superposition And This might represent a 0 (In quantum computers, waves do not look like This, but the concept is the same)

  11. What a Quantum Computer Looks Like

  12. What a Quantum Computer Looks Like Each of these gold things are called a qubit, or quantum bit

  13. What a Quantum Computer Looks Like Each of these gold things are called a qubit, or quantum bit Each qubit contains a particle, like an atom

  14. What a Quantum Computer Looks Like Each of these gold things are called a qubit, or quantum bit Each qubit contains a particle, like an atom Every atom describes a wave, which can Interfere with all the waves described by the Other atoms from the other qubits

  15. Wait, If they all superposition together… • Then for each qubit which is in a superposition between a 1 and a 0, each other qubit is also in a 1 and a 0

  16. Wait, If they all superposition together… • Then for each qubit which is in a superposition between a 1 and a 0, each other qubit is also in a 1 and a 0 • So in total, 2 n states exist simultaneously, where n is the number of qubits

  17. What’s So Great About Being in Exponential States?

  18. What’s So Great About Being in Exponential States? • Image you are guessing someone’s password

  19. What’s So Great About Being in Exponential States? • Image you are guessing someone’s password • Lets imagine their password is 150 bits long

  20. What’s So Great About Being in Exponential States? • Image you are guessing someone’s password • Lets imagine their password is 150 bits long • With one computer, there are 1.4272477 x 10 45 passwords that would have to be tried iteratively, which would take forever

  21. What’s So Great About Being in Exponential States? • Image you are guessing someone’s password • Lets imagine their password is 150 bits long • With one computer, there are 1.4272477 x 10 45 passwords that would have to be tried iteratively, which would take forever • A Quantum Computer with 150 qubits could represent each possible password at once

  22. What’s So Great About Being in Exponential States? • Image you are guessing someone’s password • Lets imagine their password is 150 bits long • With one computer, there are 1.4272477 x 10 45 passwords that would have to be tried iteratively, which would take forever • A Quantum Computer with 150 qubits could represent each possible password at once • If the place to enter the password was a physical device compatible with the quantum computer, it would be opened immediately

  23. So it can try a lot of things at once?

  24. So it can try a lot of things at once? • Basically

  25. So it can try a lot of things at once? • Basically • In fact, with 2 n computers, you can simulate a quantum computer

  26. What do you think is less expensive, more efficient and more reliable?

  27. What do you think is less expensive, more efficient and more reliable? 2 n computers?

  28. What do you think is less expensive, more efficient and more reliable? 2 n computers? Or n qubits?

  29. What do you think is less expensive, more efficient and more reliable? 2 n computers? Or n qubits?

  30. What do you think is less expensive, more efficient and more reliable? 2 n computers? Or n qubits? That’s why so many big companies are investing in quantum technology

  31. I don’t know any places to enter a password that are “quantum enabled”

  32. I don’t know any places to enter a password that are “quantum enabled” • There aren’t any, as far as I know! So thankfully quantum computers can’t be used as the ultimate hacking devices.

  33. I don’t know any places to enter a password that are “quantum enabled” • There aren’t any, as far as I know! So thankfully quantum computers can’t be used as the ultimate hacking devices. • Think of it this way: Even with 2 n computers, they all can’t try their password at once, they have to take turns entering it into the server.

  34. I don’t know any places to enter a password that are “quantum enabled” • There aren’t any, as far as I know! So thankfully quantum computers can’t be used as the ultimate hacking devices. • Think of it this way: Even with 2 n computers, they all can’t try their password at once, they have to take turns entering it into the server. • The area that quantum computers can actually break things is in hard mathematical functions

  35. Breaking RSA • RSA is a popular public encryption model.

  36. Breaking RSA • RSA is a popular public encryption model. • There is a secret key and a public key, the public key is used to encrypt data and send it to the server, where it can be decrypted with the secret key

  37. Breaking RSA • RSA is a popular public encryption model. • There is a secret key and a public key, the public key is used to encrypt data and send it to the server, where it can be decrypted with the secret key • The public and private keys must be correlated, and they are with math!

  38. Prime Number Factorization • The math RSA is based on is multiplying very large prime numbers together Much bigger than this!!!!

  39. Prime Number Factorization • The math RSA is based on is multiplying very large prime numbers together • Factoring the resultant number is difficult to do without brute force (currently no polynomial time algorithm exists for a classical computer)

  40. Prime Number Factorization • The math RSA is based on is multiplying very large prime numbers together • Factoring the resultant number is difficult to do without brute force (currently no polynomial time algorithm exists for a classical computer) • But this is no problem for a quantum computer! Peter Shor came up with a polynomial time algorithm that has already been used to factor small prime numbers

  41. (Incomplete) List of Public Key Systems Vulnerable to Quantum Computing • RSA • DSA • ECHD • ECDSA • BLISS • NTRU

  42. (Incomplete) List of Public Key Systems Vulnerable to Quantum Computing • RSA • DSA • ECHD • ECDSA • BLISS • NTRU

  43. (Incomplete) List of Public Key Systems Vulnerable to Quantum Computing • RSA • DSA • ECHD • ECDSA • BLISS • NTRU Most Public Key Systems are compromised, so we need another type of system to remain secure

  44. The One Time Pad • Symmetric key systems are quantum resistant!

  45. The One Time Pad • Symmetric key systems are quantum resistant! • The One Time Pad is the most unbreakable symmetric key system

  46. The One Time Pad • Symmetric key systems are quantum resistant! • The One Time Pad is the most unbreakable symmetric key system Each character in the message is given its own random key, Which is added to the original message

  47. Problems with the One Time Pad • A new key needs to be transmitted between the two users each time

  48. Problems with the One Time Pad • A new key needs to be transmitted between the two users each time • Anyone can eavesdrop on network traffic and just steal the key, then read the secret message

  49. Problems with the One Time Pad • A new key needs to be transmitted between the two users each time • Anyone can eavesdrop on network traffic and just steal the key, then read the secret message • The key needs to be truly random, or an attacker can find a pattern

  50. Problems with the One Time Pad • A new key needs to be transmitted between the two users each time • Anyone can eavesdrop on network traffic and just steal the key, then read the secret message • The key needs to be truly random, or an attacker can find a pattern • Currently, random numbers generators are all pseudo-random • That means they are deterministic and can be predicted by an attacker

  51. The Quantum One Time Pad • Both of these problems can be fixed using quantum mechanics!

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend