CSI 789 002 Quantum Computation - PowerPoint PPT Presentation

1 / 30
About This Presentation
Title:

CSI 789 002 Quantum Computation

Description:

If the photon is traveling along the x-axis then the electric field can be in any plane ... A photon which is polarized at either 0 or 45 degrees of the line is a 0 ... – PowerPoint PPT presentation

Number of Views:60
Avg rating:3.0/5.0
Slides: 31
Provided by: drrichar90
Category:

less

Transcript and Presenter's Notes

Title: CSI 789 002 Quantum Computation


1

Quantum Computation
Dr. Richard B. Gomez rgomez_at_gmu.edu

Introduction to Quantum Computing
Lecture 4
George Mason University School of Computational
Sciences
2
Last Lecture Topics
  • Quantum Logic Gates
  • Quantum Dots
  • Quantum Error Correction

3
Review Quantum Gates
  • There are two types of quantum logic gates

4
OUTLINE
  • Quantum Cryptography
  • Quantum Algorithms

5
Quantum Cryptography
6
Secure Cipher
  • A secure cryptosystem can be produced from a
    random key which is as long as a message.
  • Process The cipher text is the XOR of the
    random bits with the plain text bits

Plaintext 0 1 1 0 1 0 1 0 1 1 0 1 0 0 0
KEY 1 1 0 0 1 1 1 0 0 1 0 0 1 0 1
Ciphertext 1 0 1 0 0 1 0 0 1 0 0 1 1 0 1
KEY 1 1 0 0 1 1 1 0 0 1 0 0 1 0 1
Plaintext 0 1 1 0 1 0 1 0 1 1 0 1 0 0 0
7
Key Distribution
  • The problem with a stream cipher of this form is
    the distribution of a key
  • If the key is short so everyone can easily
    remember it, then it is also easy to break
  • If the key is long, so it has to sent between the
    users, it could be intercepted and compromised

8
Quantum Key Distribution
  • Quantum effects can be used to distribute a long
    key with assurances that the key has not be
    intercepted
  • To understand this process
  • Consider another form of a qubit
  • The standard key distribution format
  • Quantum effects

9
Photons
  • Another form of a qubit could be a photon
  • A photon is an electromagnetic wave (we know it
    as light)
  • A photon consists of an oscillating electric
    field and an oscillating magnetic field which lie
    in perpendicular planes

10
Polarization
  • One property of a photon that is of interest is
    its polarization
  • Polarization is a relative term that describes
    the plane of the electrical field
  • If the photon is traveling along the x-axis then
    the electric field can be in any plane

11
Photon Qubits
  • Define a reference line
  • A photon which is polarized at either 0 or 45
    degrees of the line is a 0
  • A photon which is polarized at either 90 or 135
    degrees of the line is a 1

0 and 90 degrees are called rectilinear
polarization 45 and 135 degrees are called
diagonal polarization
12
Crypto Definitions
  • It is a standard in cryptography to define the
    sender, receiver, and interceptor as
  • Alice is the one who sends the ciphertext
  • Bob is the one who receives the ciphertext
  • Eve is the (evil) one who tries to steal the
    plaintext or key

13
Quantum Key Distribution I
  • Alice and Bob want to exchange a key on a quantum
    channel and ciphertext on a normal channel

If photons are exchanged, then the quantum
channel could be a fiber optics link
14
Set Up
  • Alice selects a random sequence of bits
  • Out of this sequence, Alice and Bob will
    ultimately construct a common key
  • Example

1 1 1 1 1 0 0 1 0 1 0 0 0 0 1 0 0 0 0 1 0 0 0 0 0
0 1 0 1 1
Alice must encode these into polarized photons
and send them to Bob along the quantum channel
15
Encoding Process
  • Alice chooses to encode each bit in either the
    rectilinear polarization () form or the diagonal
    polarization (x) form
  • Summary of polarization forms

1 x / - 0 x \
16
Alices Choice
  • Say Alice sends the random bits with the
    following choice of polarization

1 1 1 1 1 0 0 1 0 1 0 0 0 0 1 0 0 0 0 1 0 0 0 0 0
0 1 0 1 1
x x x x x x x x x x x x x
x x x x
\ - \ \ \ / / - / \ \ / / - / /
/ \ \ \
Alice sends this sequence of polarized photons to
Bob
17
Bobs Task
  • Bob must measure the direction of the
    polarization of Alices photons to reconstruct
    the set of bits
  • However, Bob does not know when Alice used
    rectilinear or diagonal polarization so he has to
    guess
  • If his guess is correct then he will recover the
    correct bit
  • If his guess is wrong, he has only a 50-50 chance
    of recovering the correct bit

18
Decoding
  • Bob receives Alices polarized photons

\ - \ \ \ / / - / \ \ / / - / /
/ \ \ \


x x x x x x x x x x x x x
x
0
1
1 1 1 0 0 0 1 1 0 0 0 1 0 0 0 0 0 1 1 1 1 0 1 1 1
0 1 0
19
Eavesdropping Test
  • Now Alice tells Bob the polarizer orientation for
    a subset of the bits and Bob tells Alice the
    orientations he used on that same subset
  • For those cases where Alice and Bob agreed, Alice
    tells him what bit values he should have received

x x x x x x
x x
x x x x

1 0 0
0
1 0 0
0
They agree so there was no eavesdropping
20
Common Key
  • Since the channel is secure, Alice sends Bob the
    polarization orientation for another subset of
    the bits
  • Bob compares the actual polarization with his
    guess
  • He only uses the bits for which the two
    polarizations match (and so does Alice)

x x x x x x x x x
x x x
x x x x x x x x
x
1 0 0 0
1
21
The Effect of Eve
  • If Eve intercepts and measures the photons, she
    has to send her measured values on to Bob

0 1 1 1 1 0 0 1 0 0 0 0 1 0 0 0 0 0 1 1 1 0 1 1 0
0 1 0 1 0
22
Bobs Test
  • Bob, unaware of Eves presence, decodes the
    photons

0 1 1 1 1 1 0 1 1 1 0 0 1 0 0 0 0 0 1 1 1 1 1 0 0
0 1 0 1 0
23
Quantum Algorithms
24
Quantum Algorithms
  • There have been a number of applications of
    quantum computing that have been developed over
    the last few years
  • High speed parallel search
  • Factoring
  • Key Exchange
  • Logic Gate Structures
  • . . .

25
Factoring
  • Given two large prime numbers p and q it is easy
    to calculate their product
  • p 15485863 and q 15485867 thenp x q
    239813014798221
  • On the other hand, given a large number n it is
    very difficult to find two integers p and q such
    that n p x q

26
Number Theory Trick
  • Given an integer n to factor, create a function
  • fn(a) xa mod n
  • x is a random integer such that gcd(x,n) 1
  • It turns out that fn(a) is periodic
  • For successive inputs a 0, 1, 2, . . . The
    function values fn(0), fn(1), . . . will repeat
    (different x values will produce different
    patterns)
  • For a given x, the period of the pattern is r

There is a very good chance that the gcd(n,xr/2
1) is a factor of n
27
Example
  • Find a factor of 15

Select x 8 then f15(a) 8a mod 15
82 1 63
Find the gcd(63, 15)
3
3 is a factor of 15
This does not always work.
28
Quantum Approach
  • Goal Find the period of fn(a)
  • PROCESS construct a single quantum register
    then partition it into two parts
  • R1 and R2
  • Store a superposition of all values of a in R1
  • Evaluate fn(a) and place the result in R2

29
Effect
  • Now R2 is a superposition of all possible
    function values (it only took 1 evaluation)
  • Measure R2 this causes it to collapse to a
    single value, say k
  • This means that for some a, xa mod n k
  • Because R1 and R2 are entangled, R1 now contains
    a superposition of only those values of a such
    that xa mod n k

30
Final Effort
  • Perform a Fourier Transform on R1 to find the
    period r
  • Calculate the gcd to find a possible factor
Write a Comment
User Comments (0)
About PowerShow.com