SlideShare uma empresa Scribd logo
1 de 28
PREPARED BY:
FENNY THAKRAR
Quantum information theory is the study of
how to integrate information theory with
quantum mechanics, by studying how
information can be stored with (and
retrieved from) a quantum mechanical
system.
QUANTUM INFORMATION TECHNOLOGY
 IS NOTHING BUT DEALING WITH
 COMPUTERS USING QUANTUM
 PHYSICS…
AND HENCE ITS ALSO CALLED
 QUANTUM COMPUTING…
   Computation with coherent atomic-scale
    dynamics.

   The behavior of a quantum computer is
    governed by the laws of quantum
    mechanics.
 In
   quantum systems possibilities
 count, even if they never happen! -like
 particle theory.


 Eachof exponentially many possibilities
 can be used to perform a part of a
 computation at the same time.
Moore’s Law:
    We hit the quantum level 2010~2020.

  Quantum computation is more powerful
than classical computation.

  More can be computed in less time—the
complexity classes are different!
 Digital
        systems have – bit
 Quantum systems have – qubit
   The primary piece of information in quantum
    information theory is the qubit, an analog to the
    bit (1 or 0) in classical information theory.


 The  two position states of a photon in a
    Mach-Zehnder apparatus is just one
    example of a quantum bit or qubit
 Theparticle can exist in a linear
 combination or superposition of the two
 paths

 This
    concept is applied here using qubits for
 computations.
    Quantum Gates are similar to classical
    gates, but do not have a degenerate output.
    i.e. their original input state can be derived
    from their output state, uniquely. They
    must be reversible.

   This means that a deterministic computation
    can be performed on a quantum computer
    only if it is reversible.
The following quantum physics concepts are
  used in Quantum Computing.
 superposition
 Interference(constructive & destructive)
 Coherence
 Entanglement
 Superposition   is a principle of quantum
 theory

 Theprinciple of superposition claims that
 while we do not know what the state of any
 object is, it is actually in all possible states
 simultaneously.

 Mathematically, it refers to a property of
 solutions to the Schrödinger equation
 In physics, interference is the phenomenon
  in which two waves superpose each other to
  form a resultant wave of greater or lower
  amplitude.
In physics, coherence is a property of waves
 that enables stationary (i.e. temporally and
 spatially constant) interference.
Entanglement is a term used in quantum
theory to describe the way that particles of
energy/matter can become correlated to
predictably interact with each other
regardless of how far apart they are.
CRYPTOGRAPHY:-
 Transmitting information with access
 restricted to the intended recipient even if
 the message is intercepted by others.
The process
• Sender      Plaintext                 Key
Encryption

                                   Secure
              Cryptotext           transmission

 Decryption

Recipient      Plaintext
                                  Key ready for use
        Message encryption
                               Secure key distribution
                             Hard Problem for conventional
                             encryption
 Encryption  algorithm and related key are
  kept secret.
 Breaking the system is hard due to large
  numbers of possible keys.
 For example: for a key 128 bits long there
      128          38
   2          10         are keys to check
  using brute force.
 The fundamental difficulty is key
  distribution to parties
   who want to exchange messages.
   In 1970s the Public Key Cryptography
    emerged.
   Each user has two mutually inverse
    keys.
   The encryption key is published;
   The decryption key is kept secret.
   Eg:- Anybody can send a message to Bob
     but only Bob can read it.
   The most widely used PKC is the RSA algorithm
    based on the difficulty of factoring a product
    of two large primes.
   EASY PROBLEM:- Given two large primes p and
    q and compute
                      n     p    q
   HARD PROBLEM:- Given n compute p and q.
   The best known conventional algorithm
    requires the solution time proportional to:

                               1/ 3                2/3
T (n)        exp[ c (ln n )           (ln ln n )         ]
   For p & q 65 digits long T(n) is approximately
    one month using cluster of workstations
                      and
    For p&q 200 digits long T(n) is astronomical.
   In 1994 Peter Shor from the AT&T Bell
    Laboratory showed that in principle a
    quantum computer could factor a very long
    product of primes in seconds.



Shor’s algorithm time computational complexity
  is                      3
       T (n)     O [(ln n ) ]
 It solved THE KEY DISTRIBUTION problem.
 It unconditionally secured the key
  distribution method proposed by Charles
  Bennett and Gilles Brassard in 1984.
 The method is called BB84.
 This
     makes impossible to intercept message
 without being detected.
    Potential (benign) applications
    - Faster combinatorial search
    - Simulating quantum systems

 ‘Spinoff’in quantum optics, chemistry, etc.
 Makes QM accessible to non-physicists
 Surprising connections between physics and
 CS
 New insight into mysteries of the quantum
    Key technical challenge:
    prevent decoherence , or unwanted
    interaction with environment.

    Approaches: NMR, ion trap, quantum dot,
    Josephson junction, opticals,etc….
Quantum Information Technology

Mais conteúdo relacionado

Mais procurados

Quantum computer
Quantum computerQuantum computer
Quantum computer
Nikhil Eg
 
Quantum computation - Introduction
Quantum computation - IntroductionQuantum computation - Introduction
Quantum computation - Introduction
Aakash Martand
 

Mais procurados (20)

Quantum computing - Introduction
Quantum computing - IntroductionQuantum computing - Introduction
Quantum computing - Introduction
 
What is quantum computing
What is quantum computingWhat is quantum computing
What is quantum computing
 
Quantum Computation: What is it and Why?
Quantum Computation: What is it and Why?Quantum Computation: What is it and Why?
Quantum Computation: What is it and Why?
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Quantum computing seminar
Quantum computing seminarQuantum computing seminar
Quantum computing seminar
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum Computing
 
Quantum Computing: Welcome to the Future
Quantum Computing: Welcome to the FutureQuantum Computing: Welcome to the Future
Quantum Computing: Welcome to the Future
 
Quantum computation - Introduction
Quantum computation - IntroductionQuantum computation - Introduction
Quantum computation - Introduction
 
Introduction to Quantum Computer
Introduction to Quantum ComputerIntroduction to Quantum Computer
Introduction to Quantum Computer
 

Semelhante a Quantum Information Technology

Quantum communication and quantum computing
Quantum communication and quantum computingQuantum communication and quantum computing
Quantum communication and quantum computing
IOSR Journals
 

Semelhante a Quantum Information Technology (20)

Quantum Information
Quantum InformationQuantum Information
Quantum Information
 
Quantum communication and quantum computing
Quantum communication and quantum computingQuantum communication and quantum computing
Quantum communication and quantum computing
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Presentation on quantum computers
Presentation on quantum computersPresentation on quantum computers
Presentation on quantum computers
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implications
 
Cryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptxCryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptx
 
Ibm quantum computing
Ibm quantum computingIbm quantum computing
Ibm quantum computing
 
Quantum Information FINAL.pptx
Quantum Information FINAL.pptxQuantum Information FINAL.pptx
Quantum Information FINAL.pptx
 
Quantum computers by Emran
Quantum computers by EmranQuantum computers by Emran
Quantum computers by Emran
 
An Introduction to Quantum computing
An Introduction to Quantum computingAn Introduction to Quantum computing
An Introduction to Quantum computing
 
Quantum Internet Explained
Quantum Internet ExplainedQuantum Internet Explained
Quantum Internet Explained
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
 
The second quantum revolution: the world beyond binary 0 and 1
The second quantum revolution: the world beyond binary 0 and 1The second quantum revolution: the world beyond binary 0 and 1
The second quantum revolution: the world beyond binary 0 and 1
 
osama-quantum-computing.ppt
osama-quantum-computing.pptosama-quantum-computing.ppt
osama-quantum-computing.ppt
 
Quantum & AI in Finance
Quantum & AI in FinanceQuantum & AI in Finance
Quantum & AI in Finance
 
Seminar
SeminarSeminar
Seminar
 
quantum-computing.ppt
quantum-computing.pptquantum-computing.ppt
quantum-computing.ppt
 
Quantum Implementation of RSA Crypto-algorithm using IBM-QISKIT
Quantum Implementation of RSA Crypto-algorithm using IBM-QISKITQuantum Implementation of RSA Crypto-algorithm using IBM-QISKIT
Quantum Implementation of RSA Crypto-algorithm using IBM-QISKIT
 
osama-quantum-computing and its uses and applications
osama-quantum-computing and its uses and applicationsosama-quantum-computing and its uses and applications
osama-quantum-computing and its uses and applications
 
Quantum & AI in Finance
Quantum & AI in FinanceQuantum & AI in Finance
Quantum & AI in Finance
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Quantum Information Technology

  • 2. Quantum information theory is the study of how to integrate information theory with quantum mechanics, by studying how information can be stored with (and retrieved from) a quantum mechanical system.
  • 3. QUANTUM INFORMATION TECHNOLOGY IS NOTHING BUT DEALING WITH COMPUTERS USING QUANTUM PHYSICS… AND HENCE ITS ALSO CALLED QUANTUM COMPUTING…
  • 4. Computation with coherent atomic-scale dynamics.  The behavior of a quantum computer is governed by the laws of quantum mechanics.
  • 5.  In quantum systems possibilities count, even if they never happen! -like particle theory.  Eachof exponentially many possibilities can be used to perform a part of a computation at the same time.
  • 6. Moore’s Law: We hit the quantum level 2010~2020.  Quantum computation is more powerful than classical computation.  More can be computed in less time—the complexity classes are different!
  • 7.  Digital systems have – bit  Quantum systems have – qubit  The primary piece of information in quantum information theory is the qubit, an analog to the bit (1 or 0) in classical information theory.  The two position states of a photon in a Mach-Zehnder apparatus is just one example of a quantum bit or qubit
  • 8.  Theparticle can exist in a linear combination or superposition of the two paths  This concept is applied here using qubits for computations.
  • 9. Quantum Gates are similar to classical gates, but do not have a degenerate output. i.e. their original input state can be derived from their output state, uniquely. They must be reversible.  This means that a deterministic computation can be performed on a quantum computer only if it is reversible.
  • 10. The following quantum physics concepts are used in Quantum Computing.  superposition  Interference(constructive & destructive)  Coherence  Entanglement
  • 11.  Superposition is a principle of quantum theory  Theprinciple of superposition claims that while we do not know what the state of any object is, it is actually in all possible states simultaneously.  Mathematically, it refers to a property of solutions to the Schrödinger equation
  • 12.  In physics, interference is the phenomenon in which two waves superpose each other to form a resultant wave of greater or lower amplitude.
  • 13. In physics, coherence is a property of waves that enables stationary (i.e. temporally and spatially constant) interference.
  • 14. Entanglement is a term used in quantum theory to describe the way that particles of energy/matter can become correlated to predictably interact with each other regardless of how far apart they are.
  • 15.
  • 16. CRYPTOGRAPHY:- Transmitting information with access restricted to the intended recipient even if the message is intercepted by others.
  • 17. The process • Sender Plaintext Key Encryption Secure Cryptotext transmission Decryption Recipient Plaintext Key ready for use Message encryption Secure key distribution Hard Problem for conventional encryption
  • 18.  Encryption algorithm and related key are kept secret.  Breaking the system is hard due to large numbers of possible keys.  For example: for a key 128 bits long there 128 38 2 10 are keys to check using brute force.  The fundamental difficulty is key distribution to parties who want to exchange messages.
  • 19. In 1970s the Public Key Cryptography emerged.  Each user has two mutually inverse keys.  The encryption key is published;  The decryption key is kept secret.  Eg:- Anybody can send a message to Bob but only Bob can read it.
  • 20. The most widely used PKC is the RSA algorithm based on the difficulty of factoring a product of two large primes.  EASY PROBLEM:- Given two large primes p and q and compute n p q  HARD PROBLEM:- Given n compute p and q.
  • 21. The best known conventional algorithm requires the solution time proportional to: 1/ 3 2/3 T (n) exp[ c (ln n ) (ln ln n ) ]  For p & q 65 digits long T(n) is approximately one month using cluster of workstations and For p&q 200 digits long T(n) is astronomical.
  • 22. In 1994 Peter Shor from the AT&T Bell Laboratory showed that in principle a quantum computer could factor a very long product of primes in seconds. Shor’s algorithm time computational complexity is 3 T (n) O [(ln n ) ]
  • 23.  It solved THE KEY DISTRIBUTION problem.  It unconditionally secured the key distribution method proposed by Charles Bennett and Gilles Brassard in 1984.  The method is called BB84.
  • 24.
  • 25.  This makes impossible to intercept message without being detected.
  • 26. Potential (benign) applications - Faster combinatorial search - Simulating quantum systems  ‘Spinoff’in quantum optics, chemistry, etc.  Makes QM accessible to non-physicists  Surprising connections between physics and CS  New insight into mysteries of the quantum
  • 27. Key technical challenge: prevent decoherence , or unwanted interaction with environment.  Approaches: NMR, ion trap, quantum dot, Josephson junction, opticals,etc….