introduction to quantum computing & quantum...
TRANSCRIPT
![Page 1: Introduction to Quantum Computing & Quantum Cryptographyphys.lsu.edu/~jdowling/talks/PEK12-BCSRC.pdfIntroduction to Quantum Computing & Quantum Cryptography Jonathan P. Dowling Co-Director,](https://reader030.vdocuments.net/reader030/viewer/2022040611/5ed6dfc360d6090cf6184a0c/html5/thumbnails/1.jpg)
Introduction to QuantumComputing & Quantum
Cryptography
Jonathan P. DowlingCo-Director, Hearne Institute for Theoretical PhysicsLouisiana State University, Baton Rouge, Louisiana USA
http://quantum.phys.lsu.edu&
建道灵Associate Member
Computational Science Research CenterBeijing, China
http://csrc.ac.cn/
![Page 2: Introduction to Quantum Computing & Quantum Cryptographyphys.lsu.edu/~jdowling/talks/PEK12-BCSRC.pdfIntroduction to Quantum Computing & Quantum Cryptography Jonathan P. Dowling Co-Director,](https://reader030.vdocuments.net/reader030/viewer/2022040611/5ed6dfc360d6090cf6184a0c/html5/thumbnails/2.jpg)
PUBLIC KEY SECRET CODES ON THE INTERNET
These secret codes protect your credit card information!
![Page 3: Introduction to Quantum Computing & Quantum Cryptographyphys.lsu.edu/~jdowling/talks/PEK12-BCSRC.pdfIntroduction to Quantum Computing & Quantum Cryptography Jonathan P. Dowling Co-Director,](https://reader030.vdocuments.net/reader030/viewer/2022040611/5ed6dfc360d6090cf6184a0c/html5/thumbnails/3.jpg)
MAKING PUBLIC KEY SECRET CODES
Making a Secret Code is as Easy as Multiplication: 15,485,863 • 32,452,843 = 502,560,280,658,509
![Page 4: Introduction to Quantum Computing & Quantum Cryptographyphys.lsu.edu/~jdowling/talks/PEK12-BCSRC.pdfIntroduction to Quantum Computing & Quantum Cryptography Jonathan P. Dowling Co-Director,](https://reader030.vdocuments.net/reader030/viewer/2022040611/5ed6dfc360d6090cf6184a0c/html5/thumbnails/4.jpg)
BREAKING PUBLIC KEY SECRET CODES
Breaking a Secret Code is as Hard as Factoring: 502,560,280,658,509 = 15,485,863 • 32,452,843
![Page 5: Introduction to Quantum Computing & Quantum Cryptographyphys.lsu.edu/~jdowling/talks/PEK12-BCSRC.pdfIntroduction to Quantum Computing & Quantum Cryptography Jonathan P. Dowling Co-Director,](https://reader030.vdocuments.net/reader030/viewer/2022040611/5ed6dfc360d6090cf6184a0c/html5/thumbnails/5.jpg)
FACTORING BIG NUMBERS IS VERY HARD!
If every particle in the Universe was a classicalcomputer running at full speed for the entire life ofthe Universe (about 12 billion years) that would bestill insufficient to factor a 2,000 digit number.
Your Credit Card Number Is Safe!
Or Is It???
Current Internet Encryption Uses 1,000 Digit Numbers.
![Page 6: Introduction to Quantum Computing & Quantum Cryptographyphys.lsu.edu/~jdowling/talks/PEK12-BCSRC.pdfIntroduction to Quantum Computing & Quantum Cryptography Jonathan P. Dowling Co-Director,](https://reader030.vdocuments.net/reader030/viewer/2022040611/5ed6dfc360d6090cf6184a0c/html5/thumbnails/6.jpg)
CRACKING THE CODE: LIFE IMITATES ART
1992
Peter Shor, MIT
1994
Quantum Computer CanFactor a 2,000 Digit Number
In Less Than a Second!
![Page 7: Introduction to Quantum Computing & Quantum Cryptographyphys.lsu.edu/~jdowling/talks/PEK12-BCSRC.pdfIntroduction to Quantum Computing & Quantum Cryptography Jonathan P. Dowling Co-Director,](https://reader030.vdocuments.net/reader030/viewer/2022040611/5ed6dfc360d6090cf6184a0c/html5/thumbnails/7.jpg)
HOW DOES A QUANTUM COMPUTER WORK?
3 1 4 1 5 9
A Car’s Odometer is Like aClassical Computer Register:It Shows Only One Six-Digit
Number at a Time.
![Page 8: Introduction to Quantum Computing & Quantum Cryptographyphys.lsu.edu/~jdowling/talks/PEK12-BCSRC.pdfIntroduction to Quantum Computing & Quantum Cryptography Jonathan P. Dowling Co-Director,](https://reader030.vdocuments.net/reader030/viewer/2022040611/5ed6dfc360d6090cf6184a0c/html5/thumbnails/8.jpg)
0 0 0 0 0 0
A Quantum Odometer Can Store999,999 Six-Digit Numbers at One Time!
0 0 0 0 0 1
9 9 9 9 9 8
9 9 9 9 9 9
![Page 9: Introduction to Quantum Computing & Quantum Cryptographyphys.lsu.edu/~jdowling/talks/PEK12-BCSRC.pdfIntroduction to Quantum Computing & Quantum Cryptography Jonathan P. Dowling Co-Director,](https://reader030.vdocuments.net/reader030/viewer/2022040611/5ed6dfc360d6090cf6184a0c/html5/thumbnails/9.jpg)
REALITY: National Institute of Standards and Technology
SMALL QUANTUM COMPUTER RUNS AN ATOMIC CLOCK
![Page 10: Introduction to Quantum Computing & Quantum Cryptographyphys.lsu.edu/~jdowling/talks/PEK12-BCSRC.pdfIntroduction to Quantum Computing & Quantum Cryptography Jonathan P. Dowling Co-Director,](https://reader030.vdocuments.net/reader030/viewer/2022040611/5ed6dfc360d6090cf6184a0c/html5/thumbnails/10.jpg)
WE DESIGN QUANTUM COMPUTER CHIPS
![Page 11: Introduction to Quantum Computing & Quantum Cryptographyphys.lsu.edu/~jdowling/talks/PEK12-BCSRC.pdfIntroduction to Quantum Computing & Quantum Cryptography Jonathan P. Dowling Co-Director,](https://reader030.vdocuments.net/reader030/viewer/2022040611/5ed6dfc360d6090cf6184a0c/html5/thumbnails/11.jpg)
QUANTUM CRYPTOGRAPHY
When Quantum Computers Come Online What WillKeep Our Credit Cards Safe on the Internet?
Quantum Cryptography!
![Page 12: Introduction to Quantum Computing & Quantum Cryptographyphys.lsu.edu/~jdowling/talks/PEK12-BCSRC.pdfIntroduction to Quantum Computing & Quantum Cryptography Jonathan P. Dowling Co-Director,](https://reader030.vdocuments.net/reader030/viewer/2022040611/5ed6dfc360d6090cf6184a0c/html5/thumbnails/12.jpg)
ONE-TIME PAD PRIVATE SECRET KEY SYSTEM
Secret Code Invented by G.S.Vernan — An Army TelegraphOfficer During the Civil War.
Proven Unbreakable byClaude Shannon at BellLabs in the 1940’s.
Unbreakable by Even AQuantum Computer!
![Page 13: Introduction to Quantum Computing & Quantum Cryptographyphys.lsu.edu/~jdowling/talks/PEK12-BCSRC.pdfIntroduction to Quantum Computing & Quantum Cryptography Jonathan P. Dowling Co-Director,](https://reader030.vdocuments.net/reader030/viewer/2022040611/5ed6dfc360d6090cf6184a0c/html5/thumbnails/13.jpg)
ALICE SENDS A COPY OF THE KEY TO BOB
ALICE BOBEVE
Problem: Eavesdropper Can Always Make a Copy of the Pad!
![Page 14: Introduction to Quantum Computing & Quantum Cryptographyphys.lsu.edu/~jdowling/talks/PEK12-BCSRC.pdfIntroduction to Quantum Computing & Quantum Cryptography Jonathan P. Dowling Co-Director,](https://reader030.vdocuments.net/reader030/viewer/2022040611/5ed6dfc360d6090cf6184a0c/html5/thumbnails/14.jpg)
ALICE SENDS A COPY OF THE KEY TO BOB
ALICE BOBEVE
Problem: Eavesdropper Can Always Make a Copy of the Pad!
![Page 15: Introduction to Quantum Computing & Quantum Cryptographyphys.lsu.edu/~jdowling/talks/PEK12-BCSRC.pdfIntroduction to Quantum Computing & Quantum Cryptography Jonathan P. Dowling Co-Director,](https://reader030.vdocuments.net/reader030/viewer/2022040611/5ed6dfc360d6090cf6184a0c/html5/thumbnails/15.jpg)
EVE CAN’T COPY A QUANTUM PAD!
![Page 16: Introduction to Quantum Computing & Quantum Cryptographyphys.lsu.edu/~jdowling/talks/PEK12-BCSRC.pdfIntroduction to Quantum Computing & Quantum Cryptography Jonathan P. Dowling Co-Director,](https://reader030.vdocuments.net/reader030/viewer/2022040611/5ed6dfc360d6090cf6184a0c/html5/thumbnails/16.jpg)
HOW DOES A QUANTUM CRYPTO WORK?
In Classical Fiber OpticsNetworks Eve Can Always Steala Little of the Light and Makea Copy of the Key.
![Page 17: Introduction to Quantum Computing & Quantum Cryptographyphys.lsu.edu/~jdowling/talks/PEK12-BCSRC.pdfIntroduction to Quantum Computing & Quantum Cryptography Jonathan P. Dowling Co-Director,](https://reader030.vdocuments.net/reader030/viewer/2022040611/5ed6dfc360d6090cf6184a0c/html5/thumbnails/17.jpg)
EVE CAN’T COPY A QUANTUM PHOTONWITHOUT DESTROYING THE INFORMATION
![Page 18: Introduction to Quantum Computing & Quantum Cryptographyphys.lsu.edu/~jdowling/talks/PEK12-BCSRC.pdfIntroduction to Quantum Computing & Quantum Cryptography Jonathan P. Dowling Co-Director,](https://reader030.vdocuments.net/reader030/viewer/2022040611/5ed6dfc360d6090cf6184a0c/html5/thumbnails/18.jpg)
YOU CAN BUY A QUANTUM CRYPTO SYSTEM!
![Page 19: Introduction to Quantum Computing & Quantum Cryptographyphys.lsu.edu/~jdowling/talks/PEK12-BCSRC.pdfIntroduction to Quantum Computing & Quantum Cryptography Jonathan P. Dowling Co-Director,](https://reader030.vdocuments.net/reader030/viewer/2022040611/5ed6dfc360d6090cf6184a0c/html5/thumbnails/19.jpg)
THE QUANTUM INTERNET IS HERE!
Canary Islands
Boston
Switzerland
![Page 20: Introduction to Quantum Computing & Quantum Cryptographyphys.lsu.edu/~jdowling/talks/PEK12-BCSRC.pdfIntroduction to Quantum Computing & Quantum Cryptography Jonathan P. Dowling Co-Director,](https://reader030.vdocuments.net/reader030/viewer/2022040611/5ed6dfc360d6090cf6184a0c/html5/thumbnails/20.jpg)
THE QUANTUM SKYNET IS ALSO HERE!
In 2008 — Austrian ScientistsTransmitted Single Photons to aJapanese Communications Satelliteand Back.
Americans Have a Similar Project —The Goal is To Provide SECRETCODES for US Satellites.
![Page 21: Introduction to Quantum Computing & Quantum Cryptographyphys.lsu.edu/~jdowling/talks/PEK12-BCSRC.pdfIntroduction to Quantum Computing & Quantum Cryptography Jonathan P. Dowling Co-Director,](https://reader030.vdocuments.net/reader030/viewer/2022040611/5ed6dfc360d6090cf6184a0c/html5/thumbnails/21.jpg)
LSU DESIGNS ROUTERS FOR THE QUANTUMINTERNET AND MODELS ATMOSPHERIC
TRANSMISSION FOR SKYNET