quantum computing and qbit cryptography patrick lii 5 may 2009 physics 138

33
Quantum Computing and Qbit Cryptography Patrick Lii 5 May 2009 Physics 138

Upload: estefani-filby

Post on 31-Mar-2015

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Quantum Computing and Qbit Cryptography Patrick Lii 5 May 2009 Physics 138

Quantum Computing and Qbit CryptographyPatrick Lii5 May 2009Physics 138

Page 2: Quantum Computing and Qbit Cryptography Patrick Lii 5 May 2009 Physics 138

Outline

•Motivation for Quantum Computing•A Review of Classical Computers•Qbits and Quantum Algorithms•Quantum Cryptography•Conclusion

Page 3: Quantum Computing and Qbit Cryptography Patrick Lii 5 May 2009 Physics 138

What is a Quantum Computer?• A quantum computer (QC)

is a computational device which operates on data using quantum algorithms

• QC in proof-of-concept stage

• Current motivations:▫ Cryptography▫ Factorization▫ Database searching http://www.acceleratingfuture.com/michael/blog/category/random/

page/2/

Page 4: Quantum Computing and Qbit Cryptography Patrick Lii 5 May 2009 Physics 138

Classical versus Quantum Computers

• Example: Large number factorization

• QCs ->advantage of parallelism▫ qbits are in superpositions

of states

• ‘backwards compatible’ w/ classical algorithms

Page 5: Quantum Computing and Qbit Cryptography Patrick Lii 5 May 2009 Physics 138

Performance Advantage of QCs• classical: ~1-10 gflops of

computing power• quantum: ~10 tflops

• Factorization speed:▫ for an integer N with size:

▫ the factorization time of a classical comp is:

▫ For a QC

𝑛 = log2 𝑁

𝑡𝐶𝐶 = 𝐴∗2ξ𝑛

𝑡𝑄𝐶 = 𝐵∗𝑛3

ORNL’s Jaguar Supercomputer

Page 6: Quantum Computing and Qbit Cryptography Patrick Lii 5 May 2009 Physics 138

Speed Comparison

Classical Computer

Quantum Computer

• 1 hr• 4.11 days• 7.47 years• ~73000 years

• 1 hr• 8 hrs• 2.76 days• 21.3 days

• Assume CC and QC can factor a 78 digit number (n = 256) in 1 hour

• QC easily defeats RSA encryption!

• n = 256 (AES)• n = 512• n = 1024• n = 2048 (RSA)

Page 7: Quantum Computing and Qbit Cryptography Patrick Lii 5 May 2009 Physics 138

Outline

•Motivation for Quantum Computing•A Review of Classical Computers•Qbits and Quantum Algorithms•Quantum Cryptography•Conclusion

Page 8: Quantum Computing and Qbit Cryptography Patrick Lii 5 May 2009 Physics 138

The Classical Computer• Classical bits (cbits): 0 or 1• 2 cbits 4 states, • 3 cbits 8 states• n cbits 2n states

• data is represented in binary▫ 138 10001010▫ q 01110001

Page 9: Quantum Computing and Qbit Cryptography Patrick Lii 5 May 2009 Physics 138

Classical Operations• Based on logic gates

• Example: 1-bit gate ▫ NOT gate▫ X:0 1▫ X:1 0

• 2-bit gates:▫ AND/NAND▫ OR/NOR▫ XOR/XNOR

AND Gate

Bit 1 Bit 2 Output

1 1 1

1 0 0

0 1 0

0 0 0

XOR Gate

Bit 1 Bit 2 Output

1 1 0

1 0 1

0 1 1

0 0 0

Page 10: Quantum Computing and Qbit Cryptography Patrick Lii 5 May 2009 Physics 138

Classical Algorithms• All 1, 2, 3-cbit gates together

form universal set

• classical algorithm: a complex operation that uses a sequence of classical gates

http://www.inetdaemon.com/img/gates.gif

Page 11: Quantum Computing and Qbit Cryptography Patrick Lii 5 May 2009 Physics 138

Outline

•Motivation for Quantum Computing•A Review of Classical Computers•Qbits and Quantum Algorithms•Quantum Cryptography•Conclusion

Page 12: Quantum Computing and Qbit Cryptography Patrick Lii 5 May 2009 Physics 138

The Quantum Bit (Qbit)• Unlike cbits, state of a qbit

is a superposition of 1 and 0:

• w/ normalization condition:

• In matrix form:

• n qbits are in superposition of 2n states

• qbits can be any two-level quantum system

ȁ�𝜓⟩ = 𝛼0ȁ�0⟩ + 𝛼1|1⟩ ȁ�𝛼0ȁ�2 + ȁ�𝛼1ȁ�2 = 1

ȁ�0ۧ = ൬10൰ 𝑎𝑛𝑑 ȁ�1ۧ = ൬01൰

Page 13: Quantum Computing and Qbit Cryptography Patrick Lii 5 May 2009 Physics 138

The Quantum Bit

• In general, for n bits:

•w/ normalization:

ȁ�Ψۧ = 𝛼𝑥ȁ��ۧ� 𝑛0≤𝑥<2𝑛

ȁ�𝛼𝑥ȁ�20≤𝑥<2𝑛 = 1

Page 14: Quantum Computing and Qbit Cryptography Patrick Lii 5 May 2009 Physics 138

•Purely quantum property of qbit

•Two qbits are entangled if wavefunction cannot be written as product of 1 qbit states

Qbit Entanglement

ȁ�Ψۧ = 𝛼00ȁ�00ۧ + 𝛼01ȁ�01ۧ + 𝛼10ȁ�10ۧ + 𝛼11ȁ�11ۧ

Page 15: Quantum Computing and Qbit Cryptography Patrick Lii 5 May 2009 Physics 138

Quantum Logic Gates• All quantum operations are unitary

▫ UU† = U†U = 1

• Gate can be any unitary quantum operator

• Ex: quantum NOT gate

• 2-bit gates can operate on entangled pairs

𝐗ȁ�0ۧ = ቂ0 11 0ቃቂ10ቃ= ቂ

01ቃ= |1⟩ Quantum logic gate using lasers

Page 16: Quantum Computing and Qbit Cryptography Patrick Lii 5 May 2009 Physics 138

Important Quantum Gates• Conditional Not

• Hadamard Transformation

CNOT Gate

Bit 1 In Bit 2 In Bit 1 Out

Bit 2 Out

1 1 1 0

1 0 1 1

0 1 0 1

0 0 0 0

𝐇= 1ξ2ቂ1 11 −1ቃ 𝐇|0⟩ = 1ξ2(|0⟩+ |1⟩) 𝐇|1⟩ = 1ξ2(|0⟩− |1⟩)

• π/8 Phase Gate

𝐓= 1 00 𝑒𝑖𝜋4൨ 𝐓ȁ�1ۧ = eiπ4|1⟩ 𝐓ȁ�0ۧ = |0⟩ These 3 gates form a universal set

Page 17: Quantum Computing and Qbit Cryptography Patrick Lii 5 May 2009 Physics 138

p(1) = ȁ�𝛼1ȁ�2

The Measurement Gate• Born’s Law

▫ Given qbit:

▫ Probability of measuring state = amplitude squared

• M gate Most important gate in QC▫ Collapses qbit

wavefunction

• Result based on probability▫ We may not always get

“correct” answer• Irreversible!

ȁ�𝜓⟩ = 𝛼0ȁ�0⟩ + 𝛼1|1⟩

p(0) = ȁ�𝛼0ȁ�2

Page 18: Quantum Computing and Qbit Cryptography Patrick Lii 5 May 2009 Physics 138

Quantum Algorithms

•Similarly to classical algorithms, quantum algorithms are sequences of quantum gates

• In general, QCs have a simple processing structure:

•Complex processing lies in the U Gates

ȁ�Ψۧ = 𝛼0ȁ�0ۧ + 𝛼1ȁ�1ۧ →ሾ𝐔 𝐆𝐚𝐭𝐞𝐬ሿ→ 𝛽0ȁ�0ۧ + 𝛽1ȁ�1ۧ →ሾ𝐌 𝐆𝐚𝐭𝐞ሿ→𝑟𝑒𝑠𝑢𝑙𝑡

Page 19: Quantum Computing and Qbit Cryptography Patrick Lii 5 May 2009 Physics 138

Shor’s Algorithm• Developed by Peter Shor in 1994• Efficient factorization of large

numbers

• RSA Encryption▫ Based on multiplying 2 very

large prime numbers (~200 digits each)

• CCs cannot factor this in a reasonable time

• However, using Shor’s algorithm, a QC can▫ Lots of interest from

government

Page 20: Quantum Computing and Qbit Cryptography Patrick Lii 5 May 2009 Physics 138

Physical Implementations of QCs• In 2001, a group at IBM led

by Vandersypen created a 7-qbit QC▫ NMR implementation▫ Used it to demonstrate

Shor’s algorithm by factoring 15 into 3 and 5

• Other possibilities▫ Optical lattices▫ Polarized light▫ Diamond based▫ Superconductor (SQUIDs)▫ Trapped ion▫ any two level system w/

orthogonal bases

Biggest problem in implementation of QC: controlling decoherence of qbits

Page 21: Quantum Computing and Qbit Cryptography Patrick Lii 5 May 2009 Physics 138

Outline

•Motivation for Quantum Computing•A Review of Classical Computers•Qbits and Quantum Algorithms•Quantum Cryptography•Conclusion

Page 22: Quantum Computing and Qbit Cryptography Patrick Lii 5 May 2009 Physics 138

Quantum Cryptography (BB84)• Called BB84: Bennett and

Brassard 1984• Method of secure key

distribution▫ Created using only 1-qbit

gates▫ Can be implemented

using current tech (transmission w/ polarized light)

▫ interception can be detected

Page 23: Quantum Computing and Qbit Cryptography Patrick Lii 5 May 2009 Physics 138

Message Security• Say we want to transmit the number 83▫ In binary: 1010011 (7-bits)

• We securely (and randomly) generate a key w/ equal bit-length▫ take: 1011011

• We then use this key to encode the message▫ “flip” message bits everywhere the key equals 1▫Message becomes 0001000

• impossible for someone w/o a key to unencrypt this• Cryptography comes down to:▫ Random key generation▫ Secure key distribution

Page 24: Quantum Computing and Qbit Cryptography Patrick Lii 5 May 2009 Physics 138

Key Generation I• Alice sends Bob a long stream of photons (qbits)

▫ She randomly assigns each a type: circular or linear pol▫ Then, randomly assigns a polarization sub-state based on

the type LH or RH for circ X or Y for linear

• Example: Alice sends 8 qbits

▫−|<−<|<−▫ Legend:

— X, 0 bit | Y, 1 bit > RHCP, 0 bit < LHCP, 1 bit

Page 25: Quantum Computing and Qbit Cryptography Patrick Lii 5 May 2009 Physics 138

Key Generation II• Bob randomly decides on a linear or circular measurement

of each incoming photon

• For measurement, Bob chooses:

▫O+O++OOO▫ Legend:

+ Linear O Circular

• And he measures:▫<|<−−><>▫ for reference, Alice sent: −|<−<|<−

Page 26: Quantum Computing and Qbit Cryptography Patrick Lii 5 May 2009 Physics 138

Key Generation III•Bob calls Alice and tells her his choice of

measurement (circ or lin) for each photon▫Alice then tells Bob which of his types agree

with her transmission types NYYYNNYN

•They then use the agreeing values as a key▫In example, A&B have 4 agreeing qbits: |<-<▫Their key is: 1101

Page 27: Quantum Computing and Qbit Cryptography Patrick Lii 5 May 2009 Physics 138

Eavesdropping• for ‘Eve’ to eavesdrop on

A&B’s transmission, she must also randomly make circ or lin measurements of each photon▫ This changes polarization

of about half the qbits

• 1/4th of Bob’s result will not agree w/ Alice’s prep▫ A&B can compare some

‘check bits’ over the phone to see if anyone is eavesdropping

Page 28: Quantum Computing and Qbit Cryptography Patrick Lii 5 May 2009 Physics 138

Qbit Interception• Suppose Eve uses a more sophisticated attack:▫ intercepts the transmission▫processes it in a QC ▫ restores it to original state and sends it back off

to Bob

• This is defeated by the no-cloning theorem▫Forbids creation of identical copy of an arbitrary

state• Eve gets no useful information from her

interception

Page 29: Quantum Computing and Qbit Cryptography Patrick Lii 5 May 2009 Physics 138

Outline

•Motivation for Quantum Computing•A Review of Classical Computers•Qbits and Quantum Algorithms•Quantum Cryptography•Conclusion

Page 30: Quantum Computing and Qbit Cryptography Patrick Lii 5 May 2009 Physics 138

Future Developments in QC

•Largely in proof-of-concept stage▫formidable technological obstacles

•Still need to:▫discover more algorithms▫overcome decoherence of qbits

•Deeper understanding of QM may make it easier to do this

•We are decades away from truly powerful QC (~2050?)

Page 31: Quantum Computing and Qbit Cryptography Patrick Lii 5 May 2009 Physics 138

Conclusion1. Quantum computers are based on enacting quantum

operations on qbits2. Quantum operations are simply unitary operators in

the Hilbert space of the system3. QCs have the potential to vastly outperform classical

computers because of the QM nature of their operations

4. QCs are still many years off; however, they will fundamentally change computation as we know it

5. Qbits can also be employed in generating an undefeatable cryptography scheme which may prove useful once RSA encryption is defeated by QCs

Page 32: Quantum Computing and Qbit Cryptography Patrick Lii 5 May 2009 Physics 138

ReferencesQuantum Computing (General)Kaye, Phillip, Raymond Laflamme, and Michele Mosca. An Introduction to Quantum Computing. 1st ed.

Oxford: Oxford University Press, 2007. Print. Lieven M.K. Vandersypen et al. (1999). "Separability of Very Noisy Mixed States and Implications for NMR

Quantum Computing". Phys. Rev. Lett 83: 1054–1057.Mermin, David. Quantum Computer Science. 1st Ed. Cambridge: Cambridge University Press, 2007. Print.

[great introductory resource for Quantum Computers from a professor at Cornell, not rigorous however]

Classical Computinghttp://joshblog.net/projects/logic-gate-simulator/Logicly.html [cool logic gate simulator]

Quantum CryptographyC. H. Bennet and G. Brassard, “Quantum Cryptography: Public key distribution and coin tossing”, in

Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, p. 175 (1984)

http://fredhenle.net/bb84/ [BB84 transmission simulator]

Shor’s AlgorithmShor, P. (1994) Algorithms for Quantum Computation: Discrete Logarithms and Factoring.

Proceedings of the 35th Annual IEEE Symposium on Foundations of Computer Science, Santa Fe, NM, Nov. 20-22, 1994.

Page 33: Quantum Computing and Qbit Cryptography Patrick Lii 5 May 2009 Physics 138

•Let:▫ |Фμ>, μ = 0, …, 3 = four states of Alice’s

qbits (X, Y, RH, LH)▫|ψ> = initial state of qbits on Eve’s QC

•Since qbit must emerge in original state:

•Eve must find a U that yields four distinct |ψμ>

𝐔(|ϕμ⟩⊗ |Φ⟩) = |𝜙𝜇⟩ ⊗ |Ψ𝜇⟩ ൻ𝜙𝜈ห𝜙𝜇ൿۦΦȁ�Φۧ =ൻ𝜙𝜈ห𝜙𝜇ൿൻΨ𝜈หΨ𝜇ൿ