Главная
Study mode:
on
1
Intro
2
Secure Communication
3
RSA encryption Ron Rivest, Adi Shamir, and Leonard Adleman - Choose two prime numbers and multiply
4
How hard is factoring?
5
Thought experiment: Schrodinger's Cat
6
1 hour later, the cat is 50% dead
7
50% alive, 50% dead
8
Introducing the quantum bit (qubit)
9
A Qubit is in a complex state, with infinite possibilities
10
Building a Qubit
11
Aside on cryptography • Alice and Bob want to communicate
12
Polarizing Light
13
Represent Bits as Polarized Light
14
Measuring Photons
15
Quantum Key Distribution
16
What about eavesdropping?
17
Key Validation
18
Classical computers can be built from NAND gates only
19
Quantum Computers can be built from CNOT gates and single-qubit operators
20
Experimental demonstration of 2 qubits
21
Factoring N=15: Construct a function
22
Factoring N=15: Find the period
23
Factoring N=15: Apply QFT
24
Factor 15: Find the factors
25
How fast is Shor's algorithm?
26
Summary
Description:
Explore quantum computation and its implications for information security in this 42-minute conference talk from CYPHERCON15. Delve into secure communication concepts, including RSA encryption and the challenges of factoring. Examine thought experiments like Schrödinger's Cat to introduce quantum bits (qubits) and their complex states. Learn about building qubits, polarizing light, and quantum key distribution. Compare classical computers built from NAND gates to quantum computers using CNOT gates and single-qubit operators. Witness an experimental demonstration of 2 qubits and understand Shor's algorithm for factoring numbers. Gain insights into the speed and potential impact of quantum algorithms on current encryption methods.

Quantum Computation and Information Security

Add to list
0:00 / 0:00