Introducing
Your new presentation assistant.
Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.
Trending searches
To describe the quantum state of this collection of particles, one must specify a number for every possible result of measuring the particles.
These numbers are the amplitudes of the possible outcomes and relate to the probability of the outcome.
To perform operations on the particles:
BUT when we measure we will pick out just one possibility at random
Quantum Algorithms
The amplitudes can be positive or negative and can combine SO a good quantum algorithm takes advantage of this:
Alternative cryptography is needed
Confidence
Usability
Efficiency
“The more precisely the position is determined, the less precisely the momentum is known in this instant, and vice versa.”
Heisenberg, Uncertainty Paper, 1927
2009 researchers at Yale University created the first rudimentary solid-state quantum processor two-qubit superconducting chip was able to run elementary algorithms.
2011 University of Bristol created an all-bulk optics system able to run an iterative version of Shor's algorithm and factorised 21
2011 D-Wave Systems announced the first commercial quantum annealer on the market by the name D-Wave One. The company claims this system uses a 128 qubit processor chipset.
BQP
Factoring
P
Solve in polynomial time
Number of steps increases in proportion to n^2 Classical computers solve these efficiently.
Test if a number is prime
An efficient solution to one would provide an efficient solution to all.
Effectively the hardest NP problems as no known algorithm is known to solve them efficiently
n x n Suduko
NP-complete
Superposition of states 'collapses' leading to classical behaviour.
Systems need to be isolated from the environment to prevent decoherence
Number of steps to solve increases exponentially
NP
polynomial memory, exponential steps
n x n Chess
n x n Go
PSPACE
Prepare state
Manipulate the state
Measure state
Graeme Neilson
Aura Information Security
New Zealand
My specialities are cryptanalysis, reverse engineering, networks.
I am not a quantum physicist (in this universe at least)
Questions anytime
A physical system exists partly in all its particular, theoretically possible states simultaneously.
When measured, it gives a result corresponding to only one of the possible configurations
cats
Quantum Computer requirements
Scalability not yet proved but...
...how long do you need your data to be secret?
Qubits
Classical 3 Bit Register
{000} or {001} or {010} or {011} or {100} or {101} or {110} or 111 }
Quantum ( Qubit) 3 Bit Register
{ 000 001 010 011 100 101 110 111 }
Qubits = controlled particles + the means of control
A system of n qubits can perform 2^n operations at once
Imagine a 1000-qubit quantum computer. It's state is described by 2^1000 complex numbers...that is a BIG number
thank you for listening
this talk may be completely unnecessary as there may never be a successful large scale quantum computer built...in this universe...but somewhere in the multiverse it is necessary
5487-4228-4931-6764-6721
Quantum Key Exchange Eavesdropping
2009: Vadim Makarov, Qin Liu, Ilja Gerhardt, Antía Lamas-Linares, Christian Kurtsiefer
Norwegian Institute of Science & Technology
Centre for Quantum Technologies, Singapore
Crypto weaknesses are rarely in theory usually in practice (implementation)
Post Quantum Cryptography Status
Shors Algorithm 1994 [Asymmetric Crypto]
Protocol BB84 (Bennett & Brassard 1984)
Prepare and measure individual quantum states of photons.
Protocol E91 (Eckert 1991)
Entagle pairs of photons so they are described by a combined quantum state.
Any eavesdropper measurement of the photons will change their quantum state (Heisenberg Uncertainty Principle).
I think I want a quantum key generator...
except
.
..but I KNOW I want a Quantum Hack Case...
Commercially available for ~ US $50,000
Cool names:
Keys are regenerated frequently...unhackable...?
Grover's Algorithm 1996 [Symmetric Crypto]
Exploit component imperfections in the single photon detectors.
Send background light to blind detectors and they now work in classical mode (blind to single photons).
Make the detector 'click' by supplying enough light above a threshold.
Fake state above intensity threshold to make detector “click”
Hashing
Any quantum algorithm needs exponential time to solve the collision problem.
Approaches