Title: CSI 789 002 Quantum Computation
1 Quantum Computation
Dr. Richard B. Gomez rgomez_at_gmu.edu
Introduction to Quantum Computing
Lecture 4
George Mason University School of Computational
Sciences
2Last Lecture Topics
- Quantum Logic Gates
- Quantum Dots
- Quantum Error Correction
3Review Quantum Gates
- There are two types of quantum logic gates
4OUTLINE
- Quantum Cryptography
- Quantum Algorithms
5Quantum Cryptography
6Secure Cipher
- A secure cryptosystem can be produced from a
random key which is as long as a message. - Process The cipher text is the XOR of the
random bits with the plain text bits
Plaintext 0 1 1 0 1 0 1 0 1 1 0 1 0 0 0
KEY 1 1 0 0 1 1 1 0 0 1 0 0 1 0 1
Ciphertext 1 0 1 0 0 1 0 0 1 0 0 1 1 0 1
KEY 1 1 0 0 1 1 1 0 0 1 0 0 1 0 1
Plaintext 0 1 1 0 1 0 1 0 1 1 0 1 0 0 0
7Key Distribution
- The problem with a stream cipher of this form is
the distribution of a key - If the key is short so everyone can easily
remember it, then it is also easy to break - If the key is long, so it has to sent between the
users, it could be intercepted and compromised
8Quantum Key Distribution
- Quantum effects can be used to distribute a long
key with assurances that the key has not be
intercepted - To understand this process
- Consider another form of a qubit
- The standard key distribution format
- Quantum effects
9Photons
- Another form of a qubit could be a photon
- A photon is an electromagnetic wave (we know it
as light) - A photon consists of an oscillating electric
field and an oscillating magnetic field which lie
in perpendicular planes
10Polarization
- One property of a photon that is of interest is
its polarization - Polarization is a relative term that describes
the plane of the electrical field - If the photon is traveling along the x-axis then
the electric field can be in any plane
11Photon Qubits
- Define a reference line
- A photon which is polarized at either 0 or 45
degrees of the line is a 0 - A photon which is polarized at either 90 or 135
degrees of the line is a 1
0 and 90 degrees are called rectilinear
polarization 45 and 135 degrees are called
diagonal polarization
12Crypto Definitions
- It is a standard in cryptography to define the
sender, receiver, and interceptor as - Alice is the one who sends the ciphertext
- Bob is the one who receives the ciphertext
- Eve is the (evil) one who tries to steal the
plaintext or key
13Quantum Key Distribution I
- Alice and Bob want to exchange a key on a quantum
channel and ciphertext on a normal channel
If photons are exchanged, then the quantum
channel could be a fiber optics link
14Set Up
- Alice selects a random sequence of bits
- Out of this sequence, Alice and Bob will
ultimately construct a common key - Example
1 1 1 1 1 0 0 1 0 1 0 0 0 0 1 0 0 0 0 1 0 0 0 0 0
0 1 0 1 1
Alice must encode these into polarized photons
and send them to Bob along the quantum channel
15Encoding Process
- Alice chooses to encode each bit in either the
rectilinear polarization () form or the diagonal
polarization (x) form - Summary of polarization forms
1 x / - 0 x \
16Alices Choice
- Say Alice sends the random bits with the
following choice of polarization
1 1 1 1 1 0 0 1 0 1 0 0 0 0 1 0 0 0 0 1 0 0 0 0 0
0 1 0 1 1
x x x x x x x x x x x x x
x x x x
\ - \ \ \ / / - / \ \ / / - / /
/ \ \ \
Alice sends this sequence of polarized photons to
Bob
17Bobs Task
- Bob must measure the direction of the
polarization of Alices photons to reconstruct
the set of bits - However, Bob does not know when Alice used
rectilinear or diagonal polarization so he has to
guess - If his guess is correct then he will recover the
correct bit - If his guess is wrong, he has only a 50-50 chance
of recovering the correct bit
18Decoding
- Bob receives Alices polarized photons
\ - \ \ \ / / - / \ \ / / - / /
/ \ \ \
x x x x x x x x x x x x x
x
0
1
1 1 1 0 0 0 1 1 0 0 0 1 0 0 0 0 0 1 1 1 1 0 1 1 1
0 1 0
19Eavesdropping Test
- Now Alice tells Bob the polarizer orientation for
a subset of the bits and Bob tells Alice the
orientations he used on that same subset - For those cases where Alice and Bob agreed, Alice
tells him what bit values he should have received
x x x x x x
x x
x x x x
1 0 0
0
1 0 0
0
They agree so there was no eavesdropping
20Common Key
- Since the channel is secure, Alice sends Bob the
polarization orientation for another subset of
the bits - Bob compares the actual polarization with his
guess - He only uses the bits for which the two
polarizations match (and so does Alice)
x x x x x x x x x
x x x
x x x x x x x x
x
1 0 0 0
1
21The Effect of Eve
- If Eve intercepts and measures the photons, she
has to send her measured values on to Bob
0 1 1 1 1 0 0 1 0 0 0 0 1 0 0 0 0 0 1 1 1 0 1 1 0
0 1 0 1 0
22Bobs Test
- Bob, unaware of Eves presence, decodes the
photons
0 1 1 1 1 1 0 1 1 1 0 0 1 0 0 0 0 0 1 1 1 1 1 0 0
0 1 0 1 0
23Quantum Algorithms
24Quantum Algorithms
- There have been a number of applications of
quantum computing that have been developed over
the last few years - High speed parallel search
- Factoring
- Key Exchange
- Logic Gate Structures
- . . .
25Factoring
- Given two large prime numbers p and q it is easy
to calculate their product - p 15485863 and q 15485867 thenp x q
239813014798221 - On the other hand, given a large number n it is
very difficult to find two integers p and q such
that n p x q
26Number Theory Trick
- Given an integer n to factor, create a function
- fn(a) xa mod n
- x is a random integer such that gcd(x,n) 1
- It turns out that fn(a) is periodic
- For successive inputs a 0, 1, 2, . . . The
function values fn(0), fn(1), . . . will repeat
(different x values will produce different
patterns) - For a given x, the period of the pattern is r
There is a very good chance that the gcd(n,xr/2
1) is a factor of n
27Example
Select x 8 then f15(a) 8a mod 15
82 1 63
Find the gcd(63, 15)
3
3 is a factor of 15
This does not always work.
28Quantum Approach
- Goal Find the period of fn(a)
- PROCESS construct a single quantum register
then partition it into two parts - R1 and R2
- Store a superposition of all values of a in R1
- Evaluate fn(a) and place the result in R2
29Effect
- Now R2 is a superposition of all possible
function values (it only took 1 evaluation) - Measure R2 this causes it to collapse to a
single value, say k - This means that for some a, xa mod n k
- Because R1 and R2 are entangled, R1 now contains
a superposition of only those values of a such
that xa mod n k
30Final Effort
- Perform a Fourier Transform on R1 to find the
period r - Calculate the gcd to find a possible factor