Quantum Mechanics; a Blessing and a Curse
By Elias Marcopoulos
Quantum Mechanics; a Blessing and a Curse By Elias Marcopoulos - - PowerPoint PPT Presentation
Quantum Mechanics; a Blessing and a Curse By Elias Marcopoulos Quantum Computers Quantum Computers are just like regular computers, they crunch numbers Quantum Computers Quantum Computers are just like regular computers, they crunch
By Elias Marcopoulos
numbers
numbers
multiple numbers at the same time
numbers
multiple numbers at the same time
that their waves are additively combined
instance.
high school physics course
high school physics course
This might represent a 1
high school physics course
This might represent a 1 And This might represent a 0
high school physics course
This might represent a 1 And This might represent a 0 And this would be the resultant superposition (In quantum computers, waves do not look like This, but the concept is the same)
Each of these gold things are called a qubit, or quantum bit
Each of these gold things are called a qubit, or quantum bit Each qubit contains a particle, like an atom
Each of these gold things are called a qubit, or quantum bit Each qubit contains a particle, like an atom Every atom describes a wave, which can Interfere with all the waves described by the Other atoms from the other qubits
each other qubit is also in a 1 and a 0
each other qubit is also in a 1 and a 0
qubits
have to be tried iteratively, which would take forever
have to be tried iteratively, which would take forever
password at once
have to be tried iteratively, which would take forever
password at once
with the quantum computer, it would be opened immediately
2n computers?
2n computers? Or n qubits?
2n computers? Or n qubits?
2n computers? Or n qubits?
That’s why so many big companies are investing in quantum technology
can’t be used as the ultimate hacking devices.
can’t be used as the ultimate hacking devices.
password at once, they have to take turns entering it into the server.
can’t be used as the ultimate hacking devices.
password at once, they have to take turns entering it into the server.
mathematical functions
data and send it to the server, where it can be decrypted with the secret key
data and send it to the server, where it can be decrypted with the secret key
math!
together
Much bigger than this!!!!
together
(currently no polynomial time algorithm exists for a classical computer)
together
(currently no polynomial time algorithm exists for a classical computer)
with a polynomial time algorithm that has already been used to factor small prime numbers
Most Public Key Systems are compromised, so we need another type of system to remain secure
Each character in the message is given its own random key, Which is added to the original message
secret message
secret message
secret message
What this means is that there are certain processes that are truly unpredictable. We can never be entirely certain about the outcome of a measurement because of this.
that are guaranteed to be unpredictable.
that are guaranteed to be unpredictable.
about the outcome of the event, which contradicts the laws of nature!
Two particles, although separated by a distance, when measured give correlated results. For instance, when two particles are entangled, and in an unknown up or down state, when one is measured, the other will assume the
particle measurement can be detected. Therefore, if an eavesdropper tries to listen in on a key, the attack can be detected and another key can be sent.
mechanics for the transmission of keys
mechanics for the transmission of keys
precision one aspect of a particle, then measuring the particle removes all knowledge of another aspect, effectively changing the state of the particle
mechanics for the transmission of keys
precision one aspect of a particle, then measuring the particle removes all knowledge of another aspect, effectively changing the state of the particle
same measurement, meaning the attacker’s observed key is useless since the intended receiver gets a different key in the end
secured
secured
systems are notorious for being too short ranged to be practical commercially
Quantum Computers (enable attacking)
Quantum Computers Quantum Cryptography (enable attacking) (enable defense)
Depending on which technology comes first, the world could be in a lot
Banking information, government secrets, and more sensitive information would be easily available if quantum computers are developed first.
Depending on which technology comes first, the world could be in a lot
Banking information, government secrets, and more sensitive information would be easily available if quantum computers are developed first. Thankfully, the defensive quantum systems seem more sophisticated and viable for commercial distribution at this point in time.
ibm-shows-off-the-worlds-largest-quantum-computer.htm>
https://computer.howstuffworks.com/quantum-computer1.htm>
2016
talk/computing/hardware/intels-49qubit-chip-aims-for-quantum-supremacy>
https://www.forbes.com/sites/juniper/2017/11/01/cybersecurity-in-the-age-of-quantum-computing/#210db0a423cd>
breakthrough