SlideShare una empresa de Scribd logo
1 de 52
“If you think you understand quantum
mechanics, you don’t understand quantum
mechanics.”
~Richard Feynman
Today’s transistor based technology is reaching it’s physical
limits due to the laws of mother nature. The next sensible
step is find a way to harness the properties of quantum
mechanics to keep up with humanity’s increasing demand
for data and communications. Quantum computing and
communications is currently being developed in R&D labs
all over the world and the next generation of ‘disruptive
technology’ is already in use or projected to be
commercially available by 2021, and can be implemented
through existing fiber-optic lines and satellite laser
communication terminals… Or possibly something new.
• The Truth Table
• Quantum Computing Basics
• Quantum ‘Arms Race’
• Quantum Key Distribution
• Quantum Network
Communication
• The quantum technology revolution’s near-future impact
Q A
Will it create new industries? YES
Will make other industries obsolete? YES
Will it allow me to talk to a 35,000yr old Neanderthal named ‘Ramtha’? NO
Will it allow for deep-space imaging without spacial related time-delays? MAYBE
Will it help me to heal disease with the power of by mind? NO
Will it help develop more effective diagnostics and treatments for diseases? YES
Will it make humans dumber? NO
Will it make humans smarter? MAYBE
Will teenagers find a way to use it to have sex? YES
Superposition, Computation, Processors, Memory, Entanglement, Design
• From Bits, to Qubits
• The quantum bit (qubit) is the fundamental unit of quantum computation.
• Unlike conventional binary bits, a qubit can enter a “superposition state”
• Only one classical bit can be extracted from one qubit corresponding to
the measurement result.
Image; "How to Compute with Schrödinger's Cat: An Introduction to Quantum Computing“, StanfordOnline, 2016
• Quantum circuit model
• Start with a known quantum state (input data)
• Apply a sequence of 1 or 2 qubit logic gates
• Measure to obtain final answer
• Adiabatic quantum computation
• Define a Hamiltonian [ Hf ] with a ground state that is the solution
to a computational problem
• Evolve system slowly along a path between [ H0 => Hf ]
• Measure to obtain the answer
• Measurement based computation
• Start with highly entangled state
• Make a series of single qubit measurements
• Interpret of measurements to obtain answer
• Ion traps
• Use optical or magnetic fields (or a combination of both) to trap
ions
• Optical traps
• Use light waves to trap and control particles
• Quantum dots
• Are made of semiconductor material and are used to contain and
manipulate electrons
• Semiconductor impurities
• Contain electrons by using "unwanted" atoms found in
semiconductor material
• Superconducting circuits
• Allow electrons to flow with almost no resistance at very low
temperatures
• Diamond with nitrogen vacancies
• Room-temperature quantum memory based on the spin of the nitrogen
nucleus intrinsic to each nitrogen–vacancy.
• Yttrium silicate doped with europium
• Strong magnetic field creates a "frozen core" in which all the spins of the
europium atom's electrons stay put to slow decoherence. Maximum time
for storing quantum information in the spin-state is appox. 6 hours.
• Europium atoms receive the state of a photon and then emit a new photon
that's sent further down the communication chain, limiting the loss of
photons that naturally occur over longer fiber-optic connections.
• Current suggestions include a sneakernet approach for transporting
quantum memory between localized networks.
Image; “Quantum imaging finally saves Schrödinger's cat“ Belfast, 11 September, 2014. Andor.com
• Spontaneous Parametric Down Conversion (SPDC) is a process in which a laser
beam incident on a nonlinear crystal leads to the emission of correlated photon pairs
called signal and idler.
• SPDC creates harmonic orders for coherent energy frequencies.
• Entangled qmode frequency comb processing uses an Optical Parametric Oscillator
(OPO) and involves weaving quantum optical frequency combs into continuous-
variable hypercubic cluster states.
• This particular approach is intriguing in that it’s using interference via ‘quantum-wire’
sequences for one-way computing.
Image from: “Time- and frequency-resolved quantum optics for large-scale quantum computing” 25 February 2016, spie.com
Image from: “weaving quantum optical frequency combs into continuous-variable hypercubic cluster states”24 Sept. 2014, Physical Review
• Simple circuits based around the light-splitter create the logic gates
• University of Bristol’s 2-Qubit chip
• Future chip designs are based on these circuits
Image; “Bristol University Offers Cloud Access To Quantum Chip“ 6 Sept., 2013. techweekeurope.co.uk
• Usable large-scale processors require Greenberger-Horne-Zeilinger (GHZ) states, in
which more than two photons are entangled.
• Due to the nature of quantum mechanics, scientists must sometimes randomly guess
the best hardware configuration is to obtain this.
• Utilizing AI to do all the random guessing is a more efficient design approach.
Image; “Quantum mechanics is so weird that scientists need AI to design experiments“ 6 March, 2016. cnet.com
• There’s only one thing weirder than quantum mechanics, and better than AI at
assisting in the design of quantum computers. People from the internet.
• Some of the problems slowing down the design of reliable quantum technologies have
the potential of being solved by anyone. Even your cat.
Image; Somebody from the internet
• meQuanics game for quantum hardware design
• Quantum Moves game simulating photon teleportation
Images; mequanics.com.au &
scienceathome.org
D-Wave Systems, Industry Investment, Impact on Encryption
• D-Wave only solves problems expressed in a linear equation
• Conventional 'universal' computers require many iterations to find the optimal set of
values for this optimization.
• D-Wave uses an application-specific quantum effect called tunneling to solve the
same problems in a single cycle.
• ‘Universal’ computers use a logic-gate based model for computation.
• D-Wave uses an adiabatic (occurring without loss or gain of heat) superconducting
model for annealing.
• Annealing for Optimization Problems:
• Certain problems are considered NP because the algorithms easily used by
transistor-based computers become increasingly inefficient at solving them as
the data set grows in size.
“Traveling Salesman Problem Visualization – Simulated Annealing”
• Applications include:
• Protein folding
• Image recognition
• AI music generation
• Data compression
• Faster unstructured searches
• Logistics for delivery routes, air traffic
control and interstellar flight trajectories
• Communications routing
• Code breaking
by Emerging Technology from the arXiv February 24, 2016
• IBM
• IBM’s chip with four qubits arranged in a square can detect both bit
and phase flip based errors.
• Rigetti
• Startup developing a fault-tolerant gate-based solid state quantum
processor.
Image; ”IBM demonstrates superconducting quantum computer“ 2015, kurzweilai.net
• Microsoft
• Funding research into using the majorana fermion, an exotic particle that behaves
simultaneously like matter and antimatter, but in a stable manner that interacts
weakly with it’s environment and makes it resistant to quantum decoherence.
• Released the LIQUi|〉 circuit simulator as part of their Station Q project for fermionic
topological qubit computations.
Image; Microsoft, 2016
• Alcatel-Lucent
• Bell Labs theoretical quantum information work is focused on algorithms,
topological quantum computation, and quantum error-correcting codes.
• Experimental research teams are designing and fabricating micro-ion-traps and
optical lattices for cold trapped atoms to be used in large-scale quantum
computing, and exploring multi-channel gigahertz-rate quantum cryptography.
Image; ” Circuit for topological qubit” 2016, Quanta Magazine
• Pseudo-Random Number Generation (PRNG) uses deterministic algorithms to
produce keys.
• A traditional computer performs calculations sequentially, making RSA-1024(and
2048) difficult to break without knowing the initialization vector and algorithm used, but
if these variables are known the key can be found due this determinism.
Image; Lutece Twins - BioShock Infinite
• A Quantum computer utilizing Shor’s factoring method can crack standard PK
encryption systems by performing all calculations simultaneously. Like the ones
used when trading keys for AES encoded communications.
• Things may get very ‘WikiLeaks’ once this is possible as many entities globally are
slurping up and saving encrypted data in anticipation of being able to read it sometime
in the next 10 years.
Image; Internet memes and Zero Wing
• The following encryption types still seem ‘safe’:
• Code Based
• Hash Based
• Lattice Based
• Multivariate Quadratic Equations
• One Time Pad
• Application of Grover’s algorithm will significantly reduce the time
required to brute-force a key.
• All known forms of encryption utilizing math-based key generation
will become significantly weaker.
Random Number Generation, How QKD works, Commercial QKD, Hacking QKD
Image; “Jolly Phi” from Quantum Hacking Group, NTNU Dept. of Electronics and Telecommunications
• Using photons and a semi-transparent
mirror, a random number sequence can be
generated because the photons will pass
through the mirror only 50% of the time.
• IDQuantique & MagiQ use QRNG’s as a
component for QKD systems. Quantum RNGs
are also employed by lotteries and other
industries that rely on truly random numbers.
• There’s a IDQ brand random number
generator online via University of Geneva
Image; Respective Companies
• Utilizing the One Time Pad encryption and the Heisenberg uncertainty principle,
quantum key distribution is provably secure.
• Unlike classical key distribution algorithms such as Diffie-Hellman key exchange, QKD
provides security through physical properties rather than the difficulty of a
mathematical problem.
• Eavesdropping will destroy the key because some of the quantum information will be
lost.
• When the error rate is below a certain threshold, (about 3%) the channel can be
considered secure.
Image; IDQ & unknown
• Alice finds random values for
key bits.
• Alice transmits each value,
encoded in a non-orthogonal
basis on a ‘single photon’.
• Bob randomly selects a basis
and measures each photon he
receives.
• Alice & Bob determine
matching bases, and discard
all other bits ( sifting ).
• Assuming no errors, Alice and
Bob now share matching keys.
Image; Unknown
Image; © 2004 Scientific American, INC.
• A serious security loophole
exists when Alice uses multi-
photon states as quantum
information carriers (Photon
number splitting).
• If the pulse contains more
than one photon, then Eve can
split off the extra photons and
transmit the remaining single
photon to Bob.
• QKD simulator © is a web
application aimed at
simulating and analyzing
almost all aspects of QKD
(BB84)
• Photon Counting (Discrete Variable)
• Homodyne (Continuous Variable)
Image; ” Quantum cryptography: Continuous improvement” ©2013 Nature Photonics
• Bennett-Brassard 1984 protocol with Decoy States
• SARG04 & T12
• More promising as a cost effective attenuated laser based MDI homodyne
encoding standards
• Enhanced security with longer range
2015 IDQ., All Rights Reserved
• T12 protocol
• This makes bit sifting much more efficient, nearly doubling performance under
many conditions.
• It allows key distribution over standard telecom fibre links exceeding 100 km in
length and bit rates sufficient to generate 1 Megabit per second of key material
over a distance of 50 km.
2015 Toshiba Research Europe Ltd., All Rights Reserved
• Cerberis QKD Server
• The Cerberis QKD server works in conjunction with Centauris encryptors for high-
speed encryption based on the proven Advanced Encryption Standard (AES).
• Point-to-point wire-speed encryption with minimum latency and no packet
expansion is made possible by operating at the layer 2 of the OSI model.
Standard network protocols up to a bandwidth of 10Gbps are supported.
• These encryptors have received stringent security accreditation (Common Criteria
EAL4+ and FIPS 140-2).
2015 IDQ., All Rights Reserved
• Cerberis QKD Blade
• Building block for extended quantum backbones
• P-2-P data center interconnects
• Clavis2 QKD Platform For R&D
• Consists of two stations controlled by one or two external
computers. A comprehensive software suite implements
automated hardware operation and complete key
distillation. Two quantum cryptography protocols, BB84
and SARG04, are implemented.
2015 IDQ., All Rights Reserved
Image; Rob Thew, QuReP
• MagiQ QPN™ Security Gateway
• Refreshes keys as often as 100 times per second by incorporating real-time,
continuous, symmetrical quantum key generation based on truly random numbers
• Q-Box Workbench™
• Primarily used for research
• BB84 based symmetric key with two 7x19x24-inch rack-mount chassis (Alice and
Bob) connected by both fiber and Ethernet cable
• Key refresh rate up to 1000 bits/second
Image; Insides of MagiQ QPN 5500 © Lars Lydersen, Vadim Makarov
• 1st generation QKD requires fibre optic cabling dedicated to the task (so called dark
fibre) that can exchange keys at 1Mb/s over 240km
• This is vulnerable to side-channel attacks via injection of additional light into the ‘key
line’
• Side-channel-free QKD encoded with decoy states ( like the T12 Protocol ) and sent
along existing fiber optic networks alongside regular traffic is a little more secure
• A QKD system using entangled photons would have a greater critical advantage: the
key comes into existence simultaneously at both sender and receiver nodes,
eliminating the possibility of interception
Teleportation, Q-Repeater, Q-Router, Q-Processor, Decentralized Networks & Traveling Salesmen
• Information can be processed and teleported with Continuous Variables and
transmitted on a quantum scale using squeezed coherent light.
• This isn’t the same as processing with single photons or photon pairs as qubits. CV
quantum processing relies on the fact that squeezing is intimately related to quantum
entanglement, and is useful for communications.
Image; octave spanning self referenced frequency comb from Max-Planck Institute for Quantum Optics
• As a photon travels through fibre optic cable it’s state slowly changes, limiting the
distance the quantum information can travel.
• Quantum information can be transmitted from one location to another, with the help
quantum entanglement between the sending and receiving location
• Controllable signals can be sent using quantum teleportation with two entangled
photons, the ‘signal’ and ‘idler’, plus an unentangled 3rd acting as a ‘control’ that
contains the information to be sent.
• Measuring the idler and control signal in relation to one another and then comparing
the data to the signal photon conveys information.
Image from: “Scientists Demonstrate Three-Way Quantum Communication: What's Faster Than The Speed Of Light?“, 2014. Int’l Science
Times
1. Entangled pairs are sent from
a source to quantum memory.
2. One of the two is read and the
data mapped to a 3rd photon
entangled with a 4th photon.
This ‘destroys’ the data
integrity of photons 2 & 3, and
now the entangled state is
shared with photons 1 and 4.
3. Repeating this process can
transport entangled photons
across large distances.
Image; Unknown
• The crossbar method ( Control ) allows for a self-routing method to concentrate
quantum packets.
• Output quantum state contains at least one packet pattern in which no two packets
contend for the same output.
• One photon of an entangled pair is sent through one end of the loop, and through a
multiplexer, while a laser sends pulses of light into the spool.
• The photon is shifted in such a way that at the other end of the loop it separates out
along a separate path, while remaining entangled with its partner.
Image from: “Entanglement-Preserving Photonic Switching” IEEE PHOTONICS TECHNOLOGY LETTERS, VOL. 26, NO. 4, 2/15/14
• Satellite Laser Communication Terminals (LCT), and possibly
Energetic Particle Telescopes can be adapted for quantum based
communications.
• QKD over LCT would be secure, but there are limitations on quantum
communication over long distances via free space.
• Quantum channel attenuation
• Photon-state disruption and vulnerability to noise interference
• Laser-beam widening
• Constrained security-key generation rate.
Image; “The Race To Bring Quantum Teleportation To Your World”, 2012 Wired.com
• Quantum repeater based QKD satellite networks are distributed systems that utilize
entanglement and teleportation to realize security and reliable communication.
Image from: “Quantum Key Distribution for Security Guarantees Over Quantum-Repeater-Based QoS-Driven 3D Satellite Networks“, ©2014
IEEE
• Distributed computing and storage is increasingly a standard practice
due to it’s stability.
• Quantum data compression and optimization could make systems
like CCN easier to implement in the short term, with the potential of
becoming a more widely used addressing scheme due to the nature
quantum information theory.
• Distributed software platforms will be highly compatible and
increasingly autonomous, stable, and efficient.
• This means:
• Less identity theft and fraud
• More useful innovation
• ???
• Profit!
SCIENCE!
• Videos
• Quantum Computing Day 1 –
GoogleTechTalks
• Quantum Computing Day 2 –
GoogleTechTalks
• How to Compute with Schrödinger's Cat –
Stanford Online
• Quantum Key Distribution and the Future
of Encryption – Black Hat
• Can We Speak... Privately? - Institute for
Quantum Computing
• Introduction to Quantum Information -
Institute for Quantum Computing
• What is Entanglement Anyway? –
scienceandnonduality
• How to Program a Quantum Computer
Links to references,
resources, and cat
memes
• Research Papers and Reports
• Quantum Hacking
• Researchers create quantum memory that’s
stable for six hours
• NIST Team Breaks Distance Record for Quantum
Teleportation
• How To Teleport Quantum Information
Infographic
• Gaps between industrial and academic solutions
to implementation loopholes in QKD: testing
random-detector-efficiency countermeasure in a
commercial system
• Best Kept Secrets – Scientific American
• Towards Frequency Combs
• MDI-QKD: Continuous- versus discrete-variables
at metropolitan distances
• Random Routing and Concentration in Quantum
Switching Networks
• A Quantum Communications Switch - MIT
Technology Review
• Quantum Communication; All you wanted to
know but were afraid to ask
Links to references,
resources, and cat
memes
• Resources
• Microsoft’s LiqUI|)
• QKD Simulator
• IDQ Random Number Generator
• University of Bristol’s 2-Qubit chip
• meQuanics Hardware Game [Prototype]
• Quantum Moves Game
Links to references,
resources, and cat
memes
• A Cat Meme
• As promised
Links to references,
resources, and cat
memes

Más contenido relacionado

La actualidad más candente

Quantum computer
Quantum computerQuantum computer
Quantum computer
Nikhil Eg
 
QuantumComputersPresentation
QuantumComputersPresentationQuantumComputersPresentation
QuantumComputersPresentation
Vinayak Suresh
 

La actualidad más candente (20)

Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Quantum Computing: Welcome to the Future
Quantum Computing: Welcome to the FutureQuantum Computing: Welcome to the Future
Quantum Computing: Welcome to the Future
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum Computing
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
QuantumComputersPresentation
QuantumComputersPresentationQuantumComputersPresentation
QuantumComputersPresentation
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
What is quantum computing
What is quantum computingWhat is quantum computing
What is quantum computing
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Quantum Computing: The Why and How
Quantum Computing: The Why and HowQuantum Computing: The Why and How
Quantum Computing: The Why and How
 
Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...
Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...
Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...
 
Quantum Computers
Quantum ComputersQuantum Computers
Quantum Computers
 
Quantum Computers
Quantum ComputersQuantum Computers
Quantum Computers
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 

Similar a Quantum computers, quantum key distribution, quantum networks

2013.09.13 quantum computing has arrived s.nechuiviter
2013.09.13 quantum computing has arrived s.nechuiviter2013.09.13 quantum computing has arrived s.nechuiviter
2013.09.13 quantum computing has arrived s.nechuiviter
Sergii Nechuiviter
 
Quantum Computing at NIST
Quantum Computing at NISTQuantum Computing at NIST
Quantum Computing at NIST
inside-BigData.com
 

Similar a Quantum computers, quantum key distribution, quantum networks (20)

quantum computing and Quantum Communications
quantum computing and Quantum Communicationsquantum computing and Quantum Communications
quantum computing and Quantum Communications
 
Quantum Computing.pptx
Quantum Computing.pptxQuantum Computing.pptx
Quantum Computing.pptx
 
Ibm quantum computing
Ibm quantum computingIbm quantum computing
Ibm quantum computing
 
Quantum computing COMPLETE LECTURE
Quantum computing COMPLETE LECTUREQuantum computing COMPLETE LECTURE
Quantum computing COMPLETE LECTURE
 
Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths  Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths
 
Ppt of nanocomputing
Ppt of nanocomputingPpt of nanocomputing
Ppt of nanocomputing
 
Strengths and limitations of quantum computing
Strengths and limitations of quantum computingStrengths and limitations of quantum computing
Strengths and limitations of quantum computing
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implications
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum Information FINAL.pptx
Quantum Information FINAL.pptxQuantum Information FINAL.pptx
Quantum Information FINAL.pptx
 
2013.09.13 quantum computing has arrived s.nechuiviter
2013.09.13 quantum computing has arrived s.nechuiviter2013.09.13 quantum computing has arrived s.nechuiviter
2013.09.13 quantum computing has arrived s.nechuiviter
 
Quantum nano computing jul 23_2021
Quantum nano computing jul 23_2021Quantum nano computing jul 23_2021
Quantum nano computing jul 23_2021
 
Quantum Teleportation
Quantum TeleportationQuantum Teleportation
Quantum Teleportation
 
Quantum Computing at NIST
Quantum Computing at NISTQuantum Computing at NIST
Quantum Computing at NIST
 
Call for Chapters- Edited Book: Real World Challenges in Quantum Electronics ...
Call for Chapters- Edited Book: Real World Challenges in Quantum Electronics ...Call for Chapters- Edited Book: Real World Challenges in Quantum Electronics ...
Call for Chapters- Edited Book: Real World Challenges in Quantum Electronics ...
 
Quantum Computing by Elisha.pptx
Quantum  Computing by Elisha.pptxQuantum  Computing by Elisha.pptx
Quantum Computing by Elisha.pptx
 
Quantum Computing in Cloud
Quantum Computing in CloudQuantum Computing in Cloud
Quantum Computing in Cloud
 
Quantum Computing and AI
Quantum Computing and AIQuantum Computing and AI
Quantum Computing and AI
 
QML
QMLQML
QML
 
Quantum nature poli_mi_ddm_200115
Quantum nature poli_mi_ddm_200115Quantum nature poli_mi_ddm_200115
Quantum nature poli_mi_ddm_200115
 

Último

Último (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Quantum computers, quantum key distribution, quantum networks

  • 1. “If you think you understand quantum mechanics, you don’t understand quantum mechanics.” ~Richard Feynman
  • 2. Today’s transistor based technology is reaching it’s physical limits due to the laws of mother nature. The next sensible step is find a way to harness the properties of quantum mechanics to keep up with humanity’s increasing demand for data and communications. Quantum computing and communications is currently being developed in R&D labs all over the world and the next generation of ‘disruptive technology’ is already in use or projected to be commercially available by 2021, and can be implemented through existing fiber-optic lines and satellite laser communication terminals… Or possibly something new.
  • 3. • The Truth Table • Quantum Computing Basics • Quantum ‘Arms Race’ • Quantum Key Distribution • Quantum Network Communication
  • 4. • The quantum technology revolution’s near-future impact Q A Will it create new industries? YES Will make other industries obsolete? YES Will it allow me to talk to a 35,000yr old Neanderthal named ‘Ramtha’? NO Will it allow for deep-space imaging without spacial related time-delays? MAYBE Will it help me to heal disease with the power of by mind? NO Will it help develop more effective diagnostics and treatments for diseases? YES Will it make humans dumber? NO Will it make humans smarter? MAYBE Will teenagers find a way to use it to have sex? YES
  • 5. Superposition, Computation, Processors, Memory, Entanglement, Design
  • 6. • From Bits, to Qubits • The quantum bit (qubit) is the fundamental unit of quantum computation. • Unlike conventional binary bits, a qubit can enter a “superposition state” • Only one classical bit can be extracted from one qubit corresponding to the measurement result. Image; "How to Compute with Schrödinger's Cat: An Introduction to Quantum Computing“, StanfordOnline, 2016
  • 7. • Quantum circuit model • Start with a known quantum state (input data) • Apply a sequence of 1 or 2 qubit logic gates • Measure to obtain final answer • Adiabatic quantum computation • Define a Hamiltonian [ Hf ] with a ground state that is the solution to a computational problem • Evolve system slowly along a path between [ H0 => Hf ] • Measure to obtain the answer • Measurement based computation • Start with highly entangled state • Make a series of single qubit measurements • Interpret of measurements to obtain answer
  • 8. • Ion traps • Use optical or magnetic fields (or a combination of both) to trap ions • Optical traps • Use light waves to trap and control particles • Quantum dots • Are made of semiconductor material and are used to contain and manipulate electrons • Semiconductor impurities • Contain electrons by using "unwanted" atoms found in semiconductor material • Superconducting circuits • Allow electrons to flow with almost no resistance at very low temperatures
  • 9. • Diamond with nitrogen vacancies • Room-temperature quantum memory based on the spin of the nitrogen nucleus intrinsic to each nitrogen–vacancy. • Yttrium silicate doped with europium • Strong magnetic field creates a "frozen core" in which all the spins of the europium atom's electrons stay put to slow decoherence. Maximum time for storing quantum information in the spin-state is appox. 6 hours. • Europium atoms receive the state of a photon and then emit a new photon that's sent further down the communication chain, limiting the loss of photons that naturally occur over longer fiber-optic connections. • Current suggestions include a sneakernet approach for transporting quantum memory between localized networks.
  • 10. Image; “Quantum imaging finally saves Schrödinger's cat“ Belfast, 11 September, 2014. Andor.com • Spontaneous Parametric Down Conversion (SPDC) is a process in which a laser beam incident on a nonlinear crystal leads to the emission of correlated photon pairs called signal and idler. • SPDC creates harmonic orders for coherent energy frequencies.
  • 11. • Entangled qmode frequency comb processing uses an Optical Parametric Oscillator (OPO) and involves weaving quantum optical frequency combs into continuous- variable hypercubic cluster states. • This particular approach is intriguing in that it’s using interference via ‘quantum-wire’ sequences for one-way computing. Image from: “Time- and frequency-resolved quantum optics for large-scale quantum computing” 25 February 2016, spie.com Image from: “weaving quantum optical frequency combs into continuous-variable hypercubic cluster states”24 Sept. 2014, Physical Review
  • 12. • Simple circuits based around the light-splitter create the logic gates • University of Bristol’s 2-Qubit chip • Future chip designs are based on these circuits Image; “Bristol University Offers Cloud Access To Quantum Chip“ 6 Sept., 2013. techweekeurope.co.uk
  • 13. • Usable large-scale processors require Greenberger-Horne-Zeilinger (GHZ) states, in which more than two photons are entangled. • Due to the nature of quantum mechanics, scientists must sometimes randomly guess the best hardware configuration is to obtain this. • Utilizing AI to do all the random guessing is a more efficient design approach. Image; “Quantum mechanics is so weird that scientists need AI to design experiments“ 6 March, 2016. cnet.com
  • 14. • There’s only one thing weirder than quantum mechanics, and better than AI at assisting in the design of quantum computers. People from the internet. • Some of the problems slowing down the design of reliable quantum technologies have the potential of being solved by anyone. Even your cat. Image; Somebody from the internet
  • 15. • meQuanics game for quantum hardware design • Quantum Moves game simulating photon teleportation Images; mequanics.com.au & scienceathome.org
  • 16. D-Wave Systems, Industry Investment, Impact on Encryption
  • 17. • D-Wave only solves problems expressed in a linear equation • Conventional 'universal' computers require many iterations to find the optimal set of values for this optimization. • D-Wave uses an application-specific quantum effect called tunneling to solve the same problems in a single cycle. • ‘Universal’ computers use a logic-gate based model for computation. • D-Wave uses an adiabatic (occurring without loss or gain of heat) superconducting model for annealing.
  • 18. • Annealing for Optimization Problems: • Certain problems are considered NP because the algorithms easily used by transistor-based computers become increasingly inefficient at solving them as the data set grows in size. “Traveling Salesman Problem Visualization – Simulated Annealing”
  • 19. • Applications include: • Protein folding • Image recognition • AI music generation • Data compression • Faster unstructured searches • Logistics for delivery routes, air traffic control and interstellar flight trajectories • Communications routing • Code breaking by Emerging Technology from the arXiv February 24, 2016
  • 20. • IBM • IBM’s chip with four qubits arranged in a square can detect both bit and phase flip based errors. • Rigetti • Startup developing a fault-tolerant gate-based solid state quantum processor. Image; ”IBM demonstrates superconducting quantum computer“ 2015, kurzweilai.net
  • 21. • Microsoft • Funding research into using the majorana fermion, an exotic particle that behaves simultaneously like matter and antimatter, but in a stable manner that interacts weakly with it’s environment and makes it resistant to quantum decoherence. • Released the LIQUi|〉 circuit simulator as part of their Station Q project for fermionic topological qubit computations. Image; Microsoft, 2016
  • 22. • Alcatel-Lucent • Bell Labs theoretical quantum information work is focused on algorithms, topological quantum computation, and quantum error-correcting codes. • Experimental research teams are designing and fabricating micro-ion-traps and optical lattices for cold trapped atoms to be used in large-scale quantum computing, and exploring multi-channel gigahertz-rate quantum cryptography. Image; ” Circuit for topological qubit” 2016, Quanta Magazine
  • 23. • Pseudo-Random Number Generation (PRNG) uses deterministic algorithms to produce keys. • A traditional computer performs calculations sequentially, making RSA-1024(and 2048) difficult to break without knowing the initialization vector and algorithm used, but if these variables are known the key can be found due this determinism. Image; Lutece Twins - BioShock Infinite
  • 24. • A Quantum computer utilizing Shor’s factoring method can crack standard PK encryption systems by performing all calculations simultaneously. Like the ones used when trading keys for AES encoded communications. • Things may get very ‘WikiLeaks’ once this is possible as many entities globally are slurping up and saving encrypted data in anticipation of being able to read it sometime in the next 10 years. Image; Internet memes and Zero Wing
  • 25. • The following encryption types still seem ‘safe’: • Code Based • Hash Based • Lattice Based • Multivariate Quadratic Equations • One Time Pad • Application of Grover’s algorithm will significantly reduce the time required to brute-force a key. • All known forms of encryption utilizing math-based key generation will become significantly weaker.
  • 26. Random Number Generation, How QKD works, Commercial QKD, Hacking QKD Image; “Jolly Phi” from Quantum Hacking Group, NTNU Dept. of Electronics and Telecommunications
  • 27. • Using photons and a semi-transparent mirror, a random number sequence can be generated because the photons will pass through the mirror only 50% of the time. • IDQuantique & MagiQ use QRNG’s as a component for QKD systems. Quantum RNGs are also employed by lotteries and other industries that rely on truly random numbers. • There’s a IDQ brand random number generator online via University of Geneva Image; Respective Companies
  • 28. • Utilizing the One Time Pad encryption and the Heisenberg uncertainty principle, quantum key distribution is provably secure. • Unlike classical key distribution algorithms such as Diffie-Hellman key exchange, QKD provides security through physical properties rather than the difficulty of a mathematical problem. • Eavesdropping will destroy the key because some of the quantum information will be lost. • When the error rate is below a certain threshold, (about 3%) the channel can be considered secure. Image; IDQ & unknown
  • 29. • Alice finds random values for key bits. • Alice transmits each value, encoded in a non-orthogonal basis on a ‘single photon’. • Bob randomly selects a basis and measures each photon he receives. • Alice & Bob determine matching bases, and discard all other bits ( sifting ). • Assuming no errors, Alice and Bob now share matching keys. Image; Unknown
  • 30. Image; © 2004 Scientific American, INC. • A serious security loophole exists when Alice uses multi- photon states as quantum information carriers (Photon number splitting). • If the pulse contains more than one photon, then Eve can split off the extra photons and transmit the remaining single photon to Bob. • QKD simulator © is a web application aimed at simulating and analyzing almost all aspects of QKD (BB84)
  • 31. • Photon Counting (Discrete Variable) • Homodyne (Continuous Variable) Image; ” Quantum cryptography: Continuous improvement” ©2013 Nature Photonics
  • 32. • Bennett-Brassard 1984 protocol with Decoy States • SARG04 & T12 • More promising as a cost effective attenuated laser based MDI homodyne encoding standards • Enhanced security with longer range 2015 IDQ., All Rights Reserved
  • 33. • T12 protocol • This makes bit sifting much more efficient, nearly doubling performance under many conditions. • It allows key distribution over standard telecom fibre links exceeding 100 km in length and bit rates sufficient to generate 1 Megabit per second of key material over a distance of 50 km. 2015 Toshiba Research Europe Ltd., All Rights Reserved
  • 34. • Cerberis QKD Server • The Cerberis QKD server works in conjunction with Centauris encryptors for high- speed encryption based on the proven Advanced Encryption Standard (AES). • Point-to-point wire-speed encryption with minimum latency and no packet expansion is made possible by operating at the layer 2 of the OSI model. Standard network protocols up to a bandwidth of 10Gbps are supported. • These encryptors have received stringent security accreditation (Common Criteria EAL4+ and FIPS 140-2). 2015 IDQ., All Rights Reserved
  • 35. • Cerberis QKD Blade • Building block for extended quantum backbones • P-2-P data center interconnects • Clavis2 QKD Platform For R&D • Consists of two stations controlled by one or two external computers. A comprehensive software suite implements automated hardware operation and complete key distillation. Two quantum cryptography protocols, BB84 and SARG04, are implemented. 2015 IDQ., All Rights Reserved
  • 37. • MagiQ QPN™ Security Gateway • Refreshes keys as often as 100 times per second by incorporating real-time, continuous, symmetrical quantum key generation based on truly random numbers
  • 38. • Q-Box Workbench™ • Primarily used for research • BB84 based symmetric key with two 7x19x24-inch rack-mount chassis (Alice and Bob) connected by both fiber and Ethernet cable • Key refresh rate up to 1000 bits/second Image; Insides of MagiQ QPN 5500 © Lars Lydersen, Vadim Makarov
  • 39. • 1st generation QKD requires fibre optic cabling dedicated to the task (so called dark fibre) that can exchange keys at 1Mb/s over 240km • This is vulnerable to side-channel attacks via injection of additional light into the ‘key line’ • Side-channel-free QKD encoded with decoy states ( like the T12 Protocol ) and sent along existing fiber optic networks alongside regular traffic is a little more secure • A QKD system using entangled photons would have a greater critical advantage: the key comes into existence simultaneously at both sender and receiver nodes, eliminating the possibility of interception
  • 40. Teleportation, Q-Repeater, Q-Router, Q-Processor, Decentralized Networks & Traveling Salesmen
  • 41. • Information can be processed and teleported with Continuous Variables and transmitted on a quantum scale using squeezed coherent light. • This isn’t the same as processing with single photons or photon pairs as qubits. CV quantum processing relies on the fact that squeezing is intimately related to quantum entanglement, and is useful for communications. Image; octave spanning self referenced frequency comb from Max-Planck Institute for Quantum Optics
  • 42. • As a photon travels through fibre optic cable it’s state slowly changes, limiting the distance the quantum information can travel. • Quantum information can be transmitted from one location to another, with the help quantum entanglement between the sending and receiving location • Controllable signals can be sent using quantum teleportation with two entangled photons, the ‘signal’ and ‘idler’, plus an unentangled 3rd acting as a ‘control’ that contains the information to be sent. • Measuring the idler and control signal in relation to one another and then comparing the data to the signal photon conveys information. Image from: “Scientists Demonstrate Three-Way Quantum Communication: What's Faster Than The Speed Of Light?“, 2014. Int’l Science Times
  • 43. 1. Entangled pairs are sent from a source to quantum memory. 2. One of the two is read and the data mapped to a 3rd photon entangled with a 4th photon. This ‘destroys’ the data integrity of photons 2 & 3, and now the entangled state is shared with photons 1 and 4. 3. Repeating this process can transport entangled photons across large distances. Image; Unknown
  • 44. • The crossbar method ( Control ) allows for a self-routing method to concentrate quantum packets. • Output quantum state contains at least one packet pattern in which no two packets contend for the same output. • One photon of an entangled pair is sent through one end of the loop, and through a multiplexer, while a laser sends pulses of light into the spool. • The photon is shifted in such a way that at the other end of the loop it separates out along a separate path, while remaining entangled with its partner. Image from: “Entanglement-Preserving Photonic Switching” IEEE PHOTONICS TECHNOLOGY LETTERS, VOL. 26, NO. 4, 2/15/14
  • 45. • Satellite Laser Communication Terminals (LCT), and possibly Energetic Particle Telescopes can be adapted for quantum based communications. • QKD over LCT would be secure, but there are limitations on quantum communication over long distances via free space. • Quantum channel attenuation • Photon-state disruption and vulnerability to noise interference • Laser-beam widening • Constrained security-key generation rate. Image; “The Race To Bring Quantum Teleportation To Your World”, 2012 Wired.com
  • 46. • Quantum repeater based QKD satellite networks are distributed systems that utilize entanglement and teleportation to realize security and reliable communication. Image from: “Quantum Key Distribution for Security Guarantees Over Quantum-Repeater-Based QoS-Driven 3D Satellite Networks“, ©2014 IEEE
  • 47. • Distributed computing and storage is increasingly a standard practice due to it’s stability. • Quantum data compression and optimization could make systems like CCN easier to implement in the short term, with the potential of becoming a more widely used addressing scheme due to the nature quantum information theory. • Distributed software platforms will be highly compatible and increasingly autonomous, stable, and efficient. • This means: • Less identity theft and fraud • More useful innovation • ??? • Profit!
  • 49. • Videos • Quantum Computing Day 1 – GoogleTechTalks • Quantum Computing Day 2 – GoogleTechTalks • How to Compute with Schrödinger's Cat – Stanford Online • Quantum Key Distribution and the Future of Encryption – Black Hat • Can We Speak... Privately? - Institute for Quantum Computing • Introduction to Quantum Information - Institute for Quantum Computing • What is Entanglement Anyway? – scienceandnonduality • How to Program a Quantum Computer Links to references, resources, and cat memes
  • 50. • Research Papers and Reports • Quantum Hacking • Researchers create quantum memory that’s stable for six hours • NIST Team Breaks Distance Record for Quantum Teleportation • How To Teleport Quantum Information Infographic • Gaps between industrial and academic solutions to implementation loopholes in QKD: testing random-detector-efficiency countermeasure in a commercial system • Best Kept Secrets – Scientific American • Towards Frequency Combs • MDI-QKD: Continuous- versus discrete-variables at metropolitan distances • Random Routing and Concentration in Quantum Switching Networks • A Quantum Communications Switch - MIT Technology Review • Quantum Communication; All you wanted to know but were afraid to ask Links to references, resources, and cat memes
  • 51. • Resources • Microsoft’s LiqUI|) • QKD Simulator • IDQ Random Number Generator • University of Bristol’s 2-Qubit chip • meQuanics Hardware Game [Prototype] • Quantum Moves Game Links to references, resources, and cat memes
  • 52. • A Cat Meme • As promised Links to references, resources, and cat memes

Notas del editor

  1. How far down does the rabbit hole go? Here’s a hint; black holes. It’s a misleading way to describe this phenomena because it’s not actually a hole, it’s just an object with enough gravity* to cause anything detectable by our current technology to move in a direction and speed that makes it very difficult to accurately observe. *(or seriousness, based on the contextual meaning of the word)
  2. We all know about Moore’s law. Transistor’s have reached their size limit, and there’re just some solutions for problems that can’t be found on classical transistor-based computers.
  3. What the truth table says.
  4. Polarization can be represented as a 2-dimentional vector of unit length, and then an arbitrary polarization can be expressed as a superposition. |v) is Dirac’s bra-ket notation for a vector. Elenor Rieffel of NASA: “Saying what a quantum superposition means is ‘philosophically tricky, mathematically straightforward’.” There are other methods underdevelopment, including qmodes.
  5. All of these methods, give or take polynomial factor, are equivalent.
  6. For brevity, this presentation will concentrate on superconducting and photonic based models. [HINT: They’re all sorta photonic] Any combination of these architectures could work in combination with each other and quantum dots are already being adapted for use as a competitor to LCD screens. Objects have their own eigenstate, a definite position and momentum. Computation using the eigenstates of photons is a sensible work-around caused by the physical limits of semiconducting transistors.
  7. Entangling different types of atoms allows for the protection of memory qubits while other qubits undergo logic operations or are used as photonic interfaces to other processing units.
  8. This is a diagram of an experiment utilizing a mach-zehnder interferometer, a device used in integrated circuits for fiber optic networks that can also function as a quantum ‘mirror’. By definition a quantum mirror (QM) is a combination of standard devices (e.g., usual lenses, usual mirrors, lasers, etc.) with a nonlinear crystal by which one involves the use of a variety of quantum phenomena to exactly transform not only the direction of propagation of a light beam but also their polarization characteristics. This not limited to either only two frequencies, or photon pairs.
  9. Optical Photonic based quantum processing for one-way computing; Quantum frequency combs can create multiphoton entanglement for large-scale processing with qmodes instead of qubits and even more importantly, full-color pictures of cats. A Greenberger–Horne–Zeilinger state is a certain type of entangled quantum state which involves at least three subsystems (particles) Hadamard matrix is a mathematical operator representing the beam splitter (mirror)
  10. Doing the thing, only faster.
  11. Yes, you too can have a hand in designing the computers of the future. And by playing video games… Yes it’s a thing. Yes this picture is a thing. Quantum physics isn’t so weird after all.
  12. The gamified simulators do not come with a soundtrack so I made a couple. Working with the “AI assisted” and gamification theme, the tracks HighGravity and WaveFunkish were composed using Punk-o-Matic v2 for the lead instrument and the accompaniment is AI generated using the ujam app.
  13. Technically all computers utilize ‘quantum effects’, they just do it differently. Due to the laws of quantum physics, once transistors are about 1nm or smaller electrons can leak through the oxide gate and can even 'skip' the channel completely, tunneling directly from the source into the drain and make the transistor behave like a resistor.  D-Wave Systems has produced a processor that works with this property instead of fighting it.
  14. In a nutshell, the D-Wave is sort of like an ASIC that finds the minimum of a Hamiltonian via a superconducting annealing process that exploits the properties of quantum tunneling, and is very good at training NNs for pattern matching and logistics tasks. It’s an efficient bridge between classical transistor based systems and real QCs, that may even develop the type of AI required to properly design true quantum processors. Whether it’s a ‘quantum computer’ is almost more a philosophical debate than a scientific one. It’s like trying answer the question “Is a pocket calculator a computer? It only does one thing; math.” As for why finding the minimum of an NP-Hard expression is so important, let’s say that in contrast to most traditional neural networks, Hamiltonian neural nets are nondissipative. Quadratic unconstrained binary optimization (QUBO) is a pattern matching technique, common in machine learning applications.
  15. Quantization of the Hamiltonian of a network serves as a means for work on quantum analogs of classical information processing. NP and NP hard problems solved via annealing has many useful applications, including communication network routing protocols which can be viewed as similar to the ‘travelling salesman problem’. Annealing for computation was derived from metallurgic annealing where the cooling of metal reorganizes and strengthens it’s structure. This very useful in Q Routing for MANET systems where the distance between nodes variates continuously, and the route packets are sent along must be recalculated frequently for QoS.
  16. Neural nets on traditional transistor-based computers are ‘slow’ learners and it takes time for them to derive meaning based connections between things like words and images. IBM’s Watson may be ‘smarter than a 5th grader’ due to memory and lookup speed, but exhibits the logical capacity of a 4yr old when posed problems that require creativity and meaning-based critical thinking skills. The 1000 qubit D-Wave system purchased by Google is already changing that. The NN is dubbed PlaNet, and uses only 377 MB, which even fits into the memory of a smartphone.
  17. Researchers think one of the best routes to making a practical quantum computer would involve creating grids of hundreds or thousands of qubits working together. The circuits of IBM’s chip are made from metals that become superconducting when cooled to extremely low temperatures. The chip operates at only a fraction of a degree above absolute zero. (notice a pattern?) Using a square lattice, IBM is able to detect both types of quantum errors for the first time. The new quantum-bit circuit design allows for independent and simultaneous detection of X and Z errors on two-code qubits, shaded purple and labelled Q1 and Q3. 
  18. Microsoft has begun funding research into using the majorana fermion, an quasiparticle that behaves simultaneously like matter and antimatter, but in a stable manner that interacts weakly with it environment and makes it resistant to decoherence.
  19. Like Microsoft Alcatel-Lucent is following the topological QC route. Topological quantum computers employs 2D anyons or fermions (quasiparticle) to cross over each other to form braids in 3D spacetime to form logic gates. So far there appears to be only a few quantum algorithims. Peter Shor’s (1994), Lov Grover’s (1996), Deutsch-Jozsa, and…
  20. ElGamal, elliptic curve, and RSA encryption. Factoring a 2058 bit number would take 10 years and require a server farm covering 1/4th of North America, would cost trillions, and consume enough terawatts of power to exhaust the world’s fossil fuel supply in the 1st day. In 1994 Shor discovered a polynominal-time quantum algorithm for factoring and the discrete log problem that will crack PK encryption.
  21. At least one source has claimed that it would currently require a server farm covering 1/4th the U.S. 10 years to factor RSA2048, and would consume all the fuel on earth in the first day. 10million physical (10K logical) qubits would take about 16 days to crack 2048 bit encryption. First we can’t keep cats off our keyboards, next thing we know they’re all over the internet. And soon they’ll be breaking all the PK encryption. Thanks Schrödinger.
  22. These algorithms are based on the fact that there is no known mathematical operation for quickly factoring very large numbers given today’s computer processing power. The truth is all known forms of math-based encryption will become significantly weaker. This is due to Grover’s algorithm, which can exponentially reduce the time required to brute-force a key. One time pad appears to be the only truly secure method for key generation, but only if the keys are truly random.
  23. Quantum Key Distribution time! These are currently in use all over the planet for high security communications by the type of people who take 6 months to grant clearance to tourists.
  24. IDQ’s Quantis is available for USB & PCI. You can try it for free at randomnumbers.info
  25. This is based on the Heisenberg uncertainty principle; whereas an observer can only measure one property (speed or position) at a time, causing information about the other to be lost. It also disturbs the state of the photon, enabling detection of eavesdropping.
  26. There are several companies internationally who appear to have invested in QKD research at some point in the last 10 years. Startups like Optimax in Maryland evaporated from the public eye, others like QinetiQ turned their focus to Laser & RF Disruptive Technologies, Distributed Acoustic Sensors, and MELACOM radio receivers used by the NASA’s Mars Science Lab. The three most high profile companies offering QKD systems currently in use are MagiQ Technologies, IDQ, and Toshiba.
  27. Part of this is based on the ‘no-cloning’ theorem A serious security loophole exists when Alice uses multi-photon states as quantum information carriers (Photon number splitting). If the pulse contains more than one photon, then Eve can split off the extra photons and transmit the remaining single photon to Bob.
  28. A fully measurement device independent ( MDI ) system appropriate for large-scale deployment requires room- temperature operations and a high resistance to noise and photon-loss. Research has been focusing more on CV encoding in recent years.
  29. SARG04 isn’t as efficient as BB84 for single-photon implementations. T12 appears more promising as a cost effective attenuated laser based MDI homodyne encoding standard
  30. Toshiba's QKD system uses the T12 protocol. This is a modification of the standard BB84 protocol with decoy states, in which the probability that bit values are encoded in each basis (X and Z) are different. This makes bit sifting much more efficient, nearly doubling performance under many conditions. it allows key distribution over standard telecom fibre links exceeding 100 km in length and bit rates sufficient to generate 1 Megabit per second of key material over a distance of 50 km — sufficiently long for metropolitan coverage.
  31. ID Quantique’s system encodes data in the phase of the photon instead of its polarization state. Uses SARG04 & BB84 encoding and sifting system The Cerberis QKD server works in conjunction with Centauris encryptors for high-speed encryption based on the proven Advanced Encryption Standard (AES). Point-to-point wire-speed encryption with minimum latency and no packet expansion is made possible by operating at the layer 2 of the OSI model. Standard network protocols up to a bandwidth of 10Gbps are supported. These encryptors have received stringent security accreditation (Common Criteria EAL4+ and FIPS 140-2) for critical infrastructure SF and SA.
  32. Current implementation of QKD systems for various secure communications.
  33. MagiQ’s OPN Security Gateway, which uses a secure fiber-optic link to transmit the changing key sequence up to 120 km as a stream of polarized photons.
  34. The loophole is likely to be present in most QKD systems using avalanche photodiodes to detect single photons and is intrinsic to a whole class of single-photon detectors, regardless of their manufacturer and model. While blinded, it cannot act as a quantum detector, but it still functions as a classical light detector, reading a "one" if an extra bright pulse of light hits it, quantum properties of the light notwithstanding. So as the interceptor receives the sender's signal, it pumps an extra bright pulse of light at the receivers' detector every time it reads a "one" in the original signal.
  35. Yes, this involves increased decentralization and distributed computing. Deal with it.
  36. Photonic based quantum processors can be powered by a cheap, energy efficient LED laser when paired with a spatial filter and kept ‘in tune’ with mirrors arranged to create a standing wave cavity resonator. Coherent laser light is just pinhole-light produced by an infinite mirror-tunnel, with amplification. It’s monochromatic, like a pure audio tone. Squeezed light is used for quantum information processing with Continuous Variables (CV). Continuous variable quantum optics uses squeezing of light as an essential resource to realize CV protocols for quantum communication, teleportation and one-way computing. This isn’t the same as quantum information processing with single photons or photon pairs as qubits. CV quantum processing relies heavily on the fact that squeezing is related to quantum entanglement.
  37. “It’s like two people play dice and they always get the same result; it’s always random but they always get the same result,” said physicist Rupert Ursin of the Austrian Academy of Sciences in Vienna A signal-idler pair (or biphoton) is a highly entangled system in variables such as energy, linear momentum, angular momentum and polarization
  38. QuREP company is devving them. “Quantum Repeaters are the analogue of classical optical amplifiers that permit the cascading of successive fibre optic communication links. Quantum Repeater technology is centered around quantum light-matter interactions at the quantum level in ensembles of rare earth ions frozen in a crystal that store quantum information by coherent control of the quantum degrees of freedom. A clear and well-defined architecture and protocol for a complete Quantum Repeater can be realized with entangled photon pair sources that couple the Quantum memories to fibre optic communication systems.”
  39. Left schema exhibits quantum routing operation via an optical circuit with quantum CNOT gates, X gates, and a Mach-Zehnder interferometer. Similar to modern intregrated circuits used for fibre optic communications, only with error correction. Right scheme demonstrates operation of a cross-bar, entanglement-preserving switch for use in quantum communications and networking. The switch is a low-loss (3 dB) device that can operate at high rates (>6.5 GHz), and retains the polarization-encoded quantum state of the input photons.
  40. Eventually this could be replaced with fully-instantaneous subspace communications via entanglement, but theoretical conjecture is beyond the scope of this presentation.
  41. For QKD-based long distance satellite network communications, a source of entangled photon pairs are used to grow a secret key between two parties once the photonic sets have reached their destination. In the long term this could lead to a new form of communications system. It’s already heading that direction.
  42. I’d like to believe that when SkyNet becomes self-aware it’s human interface agent will have a quirky personality and a love of cat memes because it’s ‘from the internet’
  43. SCIENCE!