Top Banner
Introduction to Quantum Computing & Quantum Cryptography Jonathan P. Dowling Co-Director, Hearne Institute for Theoretical Physics Louisiana State University, Baton Rouge, Louisiana USA http://quantum.phys.lsu.edu & 建道Associate Member Computational Science Research Center Beijing, China http://csrc.ac.cn/
21

Introduction to Quantum Computing & Quantum Cryptographyphys.lsu.edu/~jdowling/talks/PEK12-BCSRC.pdfIntroduction to Quantum Computing & Quantum Cryptography Jonathan P. Dowling Co-Director,

May 29, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Introduction to Quantum Computing & Quantum Cryptographyphys.lsu.edu/~jdowling/talks/PEK12-BCSRC.pdfIntroduction to Quantum Computing & Quantum Cryptography Jonathan P. Dowling Co-Director,

Introduction to QuantumComputing & Quantum

Cryptography

Jonathan P. DowlingCo-Director, Hearne Institute for Theoretical PhysicsLouisiana State University, Baton Rouge, Louisiana USA

http://quantum.phys.lsu.edu&

建道灵Associate Member

Computational Science Research CenterBeijing, China

http://csrc.ac.cn/

Page 2: Introduction to Quantum Computing & Quantum Cryptographyphys.lsu.edu/~jdowling/talks/PEK12-BCSRC.pdfIntroduction to Quantum Computing & Quantum Cryptography Jonathan P. Dowling Co-Director,

PUBLIC KEY SECRET CODES ON THE INTERNET

These secret codes protect your credit card information!

Page 3: Introduction to Quantum Computing & Quantum Cryptographyphys.lsu.edu/~jdowling/talks/PEK12-BCSRC.pdfIntroduction to Quantum Computing & Quantum Cryptography Jonathan P. Dowling Co-Director,

MAKING PUBLIC KEY SECRET CODES

Making a Secret Code is as Easy as Multiplication: 15,485,863 • 32,452,843 = 502,560,280,658,509

Page 4: Introduction to Quantum Computing & Quantum Cryptographyphys.lsu.edu/~jdowling/talks/PEK12-BCSRC.pdfIntroduction to Quantum Computing & Quantum Cryptography Jonathan P. Dowling Co-Director,

BREAKING PUBLIC KEY SECRET CODES

Breaking a Secret Code is as Hard as Factoring: 502,560,280,658,509 =  15,485,863 • 32,452,843

Page 5: Introduction to Quantum Computing & Quantum Cryptographyphys.lsu.edu/~jdowling/talks/PEK12-BCSRC.pdfIntroduction to Quantum Computing & Quantum Cryptography Jonathan P. Dowling Co-Director,

FACTORING BIG NUMBERS IS VERY HARD!

If every particle in the Universe was a classicalcomputer running at full speed for the entire life ofthe Universe (about 12 billion years) that would bestill insufficient to factor a 2,000 digit number.

Your Credit Card Number Is Safe!

Or Is It???

Current Internet Encryption Uses 1,000 Digit Numbers.

Page 6: Introduction to Quantum Computing & Quantum Cryptographyphys.lsu.edu/~jdowling/talks/PEK12-BCSRC.pdfIntroduction to Quantum Computing & Quantum Cryptography Jonathan P. Dowling Co-Director,

CRACKING THE CODE: LIFE IMITATES ART

1992

Peter Shor, MIT

1994

Quantum Computer CanFactor a 2,000 Digit Number

In Less Than a Second!

Page 7: Introduction to Quantum Computing & Quantum Cryptographyphys.lsu.edu/~jdowling/talks/PEK12-BCSRC.pdfIntroduction to Quantum Computing & Quantum Cryptography Jonathan P. Dowling Co-Director,

HOW DOES A QUANTUM COMPUTER WORK?

3 1 4 1 5 9

A Car’s Odometer is Like aClassical Computer Register:It Shows Only One Six-Digit

Number at a Time.

Page 8: Introduction to Quantum Computing & Quantum Cryptographyphys.lsu.edu/~jdowling/talks/PEK12-BCSRC.pdfIntroduction to Quantum Computing & Quantum Cryptography Jonathan P. Dowling Co-Director,

0 0 0 0 0 0

A Quantum Odometer Can Store999,999 Six-Digit Numbers at One Time!

0 0 0 0 0 1

9 9 9 9 9 8

9 9 9 9 9 9

Page 9: Introduction to Quantum Computing & Quantum Cryptographyphys.lsu.edu/~jdowling/talks/PEK12-BCSRC.pdfIntroduction to Quantum Computing & Quantum Cryptography Jonathan P. Dowling Co-Director,

REALITY: National Institute of Standards and Technology

SMALL QUANTUM COMPUTER RUNS AN ATOMIC CLOCK

Page 10: Introduction to Quantum Computing & Quantum Cryptographyphys.lsu.edu/~jdowling/talks/PEK12-BCSRC.pdfIntroduction to Quantum Computing & Quantum Cryptography Jonathan P. Dowling Co-Director,

WE DESIGN QUANTUM COMPUTER CHIPS

Page 11: Introduction to Quantum Computing & Quantum Cryptographyphys.lsu.edu/~jdowling/talks/PEK12-BCSRC.pdfIntroduction to Quantum Computing & Quantum Cryptography Jonathan P. Dowling Co-Director,

QUANTUM CRYPTOGRAPHY

When Quantum Computers Come Online What WillKeep Our Credit Cards Safe on the Internet?

Quantum Cryptography!

Page 12: Introduction to Quantum Computing & Quantum Cryptographyphys.lsu.edu/~jdowling/talks/PEK12-BCSRC.pdfIntroduction to Quantum Computing & Quantum Cryptography Jonathan P. Dowling Co-Director,

ONE-TIME PAD PRIVATE SECRET KEY SYSTEM

Secret Code Invented by G.S.Vernan — An Army TelegraphOfficer During the Civil War.

Proven Unbreakable byClaude Shannon at BellLabs in the 1940’s.

Unbreakable by Even AQuantum Computer!

Page 13: Introduction to Quantum Computing & Quantum Cryptographyphys.lsu.edu/~jdowling/talks/PEK12-BCSRC.pdfIntroduction to Quantum Computing & Quantum Cryptography Jonathan P. Dowling Co-Director,

ALICE SENDS A COPY OF THE KEY TO BOB

ALICE BOBEVE

Problem: Eavesdropper Can Always Make a Copy of the Pad!

Page 14: Introduction to Quantum Computing & Quantum Cryptographyphys.lsu.edu/~jdowling/talks/PEK12-BCSRC.pdfIntroduction to Quantum Computing & Quantum Cryptography Jonathan P. Dowling Co-Director,

ALICE SENDS A COPY OF THE KEY TO BOB

ALICE BOBEVE

Problem: Eavesdropper Can Always Make a Copy of the Pad!

Page 15: Introduction to Quantum Computing & Quantum Cryptographyphys.lsu.edu/~jdowling/talks/PEK12-BCSRC.pdfIntroduction to Quantum Computing & Quantum Cryptography Jonathan P. Dowling Co-Director,

EVE CAN’T COPY A QUANTUM PAD!

Page 16: Introduction to Quantum Computing & Quantum Cryptographyphys.lsu.edu/~jdowling/talks/PEK12-BCSRC.pdfIntroduction to Quantum Computing & Quantum Cryptography Jonathan P. Dowling Co-Director,

HOW DOES A QUANTUM CRYPTO WORK?

In Classical Fiber OpticsNetworks Eve Can Always Steala Little of the Light and Makea Copy of the Key.

Page 17: Introduction to Quantum Computing & Quantum Cryptographyphys.lsu.edu/~jdowling/talks/PEK12-BCSRC.pdfIntroduction to Quantum Computing & Quantum Cryptography Jonathan P. Dowling Co-Director,

EVE CAN’T COPY A QUANTUM PHOTONWITHOUT DESTROYING THE INFORMATION

Page 18: Introduction to Quantum Computing & Quantum Cryptographyphys.lsu.edu/~jdowling/talks/PEK12-BCSRC.pdfIntroduction to Quantum Computing & Quantum Cryptography Jonathan P. Dowling Co-Director,

YOU CAN BUY A QUANTUM CRYPTO SYSTEM!

Page 19: Introduction to Quantum Computing & Quantum Cryptographyphys.lsu.edu/~jdowling/talks/PEK12-BCSRC.pdfIntroduction to Quantum Computing & Quantum Cryptography Jonathan P. Dowling Co-Director,

THE QUANTUM INTERNET IS HERE!

Canary Islands

Boston

Switzerland

Page 20: Introduction to Quantum Computing & Quantum Cryptographyphys.lsu.edu/~jdowling/talks/PEK12-BCSRC.pdfIntroduction to Quantum Computing & Quantum Cryptography Jonathan P. Dowling Co-Director,

THE QUANTUM SKYNET IS ALSO HERE!

In 2008 — Austrian ScientistsTransmitted Single Photons to aJapanese Communications Satelliteand Back.

Americans Have a Similar Project —The Goal is To Provide SECRETCODES for US Satellites.

Page 21: Introduction to Quantum Computing & Quantum Cryptographyphys.lsu.edu/~jdowling/talks/PEK12-BCSRC.pdfIntroduction to Quantum Computing & Quantum Cryptography Jonathan P. Dowling Co-Director,

LSU DESIGNS ROUTERS FOR THE QUANTUMINTERNET AND MODELS ATMOSPHERIC

TRANSMISSION FOR SKYNET