QUANTUM LIGHT :! A BRIEF INTRODUCTION!

Size: px
Start display at page:

Download "QUANTUM LIGHT :! A BRIEF INTRODUCTION!"

Transcription

1 Quantum Physics QUANTUM LIGHT : A BRIEF INTRODUCTION Philippe Grangier Laboratoire Charles Fabry de l'institut d'optique, UMR 85 du CNRS, 927 Palaiseau, France Quantum Physics * Alain Aspect, in «Demain la physique», Ed. Odile Jacob, 24

2 Single Photon Sources clic clic clic clic «Photon gun»? A usual light source emits 2 photons per second How to get only one at a time? NV center : Single nitrogen atom embedded in diamond NV-Centers in diamond Experimental Setup QIPC / S4P a.u. QIPC / S4P ZPL Confocal Microscope CW or Pulsed Excitation Emission g(2)(#) Spectrometer Delay Absorption 637nm 75nm y Dichroic mirror x Pinhole Ø Time -toamplitude converter Bulk or Nanocrystals Ø = 5 nm << /n n = 2.4 m.5 mm Advantages : Less background Better collection Easier to handle Filters NA.3 z Diamond sample 5/5 Beamsplitter Avalanche photodiodes Photon Counting Antibunching : after detecting a photon, it takes some time to detect another one

3 Checking that there is one photon only Single Photon Interferences Single Photon Source : NV centers in diamond nanocrystals. Pulsed excitation: train of single photon pulses Experiment done at ENS Cachan : V. Jacques, E Wu, T. Toury, F. Treussart, J.-F. Roch. The polarization of a single photon carries a quantum bit or qubit 45 = ( h + v )/2 35 = ( h - v )/2

4 Quantum Information Main topics The characters Public key cryptosystems Rivest, Shamir et Adelman (RSA, 978) Eve # encoding Alice Bob P= a $b? What is inside the «public key»? the product P of two large numbers : factorization very difficult to perform

5 Factorising RSA 55 (52 bits - summer 999) «Challenge» proposed the RSA company ( Previous record : RSA4 (465 bits), february 999 «Challenges» proposed by the company RSA RSA55 = \ \ ; RSA55 is not a prime (probabilistic algorithm, very fast) Factorization? Preparation :9 weeks over workstations. Sieve : 3.5 months over 3 PCs, 6 countries Result : 3.7 Go, stored in Amsterdam Processing : 9.5 days on Cray C96, Amsterdam Factorization: 39.4 hours on 4 workstations f = \ ; f2 = \ ; f and f2 are primes, and f * f2 = RSA55 (immediate onpc) Improvement by two orders of magnitude between 999 and Problems : PUBLIC KEY CRYPTOSYSTEMS - Mathematical demonstrations about PKC have a statistical character (the factorisation may be found easily for unfortunate choices of a, b) --> recommendations for the choice of the prime numbers a and b - No absolute demonstration for security -> better computers, better algorithms (obviously kept secret)? - Article by Peter Shor (994) : a quantum computer might be able to factorize the prod uct of two prime numbers in a polynomial time lot of reactions Best classical algorithm (number field sieve) : nfs[n] = Exp[.9 Log[n] /3 Log[Log[n]] 2/3 ] nfs[2 24 ] / nfs[2 52 ] = Shor algorithm : shor[n] = Log[n] 3 shor[2 24 ] / shor[2 52 ] = 8 + Secret key cryptosystem : one-time pad (G. Vernam, 97) secret channel # = # Eve classical channel # Demonstrably secure if the key is : random as long as the message used only once (Shannon) # + =

6 + = Quantum Secret Key Cryptosystem : Bennett-Brassard (984) # $ % & quantum channel $ classical channel # + # Demonstrably secure if the key is : random as long as the message used only once (Shannon) unknown by Eve : Quantum laws = Coding basis Coding basis Sent bit Sent bit Reading basis Reading basis Received bit Received bit Discussion Sifted key

7 Industrial Perspectives? QUANTUM CRYPTOGRAPHY : PRINCIPLE (C. Bennett and G. Brassard, 984) QIPC / S4P Eve has to make a measurement without knowing the basis used by Alice ( this information comes too late for her ) All such measurements - intercept / resend using either the + or x basis will create errors in the - intercept / resend using an optimized basis (22.5 ) transmission - use quantum non-demolition measurements ( the more Eve knows, the - duplicate (clone) photons and keep one aside more errors ) * Evaluation of errors : After the initial exchange between Alice and Bob measure the error rate by comparing publicly a part of the raw key: -> evaluation of the amount of information (maybe) available to Eve. * Classical post-processing (essential for security ) Requires a public authenticated channel * Alice and Bob have a totally secure and errorless secret key (non-zero size if initial QBER < %) * Several startups worldwide are selling QKD systems (optical fibers, 5 km) The key to future-proof confidentiality IdQuantique (Genève) MagiQ Technologies (New York) * Intense activity in the USA (mostly military) and in Japan (NEC, Fujitsu ) * In Europe «Integrated Project» SECOQC : «Secure Communication based on Quantum Cryptography». Urban networks demonstrated in Vienna (28) and Tokyo (2) Quantum cryptography with satellites 44 km between LaPalma and Tenerife

8 Main topics Next steps...

9 Einstein, Podolsky and Rosen «paradox» (EPR-Bohm version) Source S emitting pairs of photons and 2 in the quantum state : ( x x2 > + y y2 >)/#2 Entangled state - The result is random for each photon, but measuring one polarization allows one to know the polarization of the other photon with probability unity. Bell s inequalities «Hidden variables» or «supplementary parameters» denoted, with a normalized statistical distribution %() : &d % () = '(, () = ±, '2(, (2) = ±, E((, (2) = &d % () '(, () '2(, (2) locality then : - 2 $ S $ 2 with : S = E((, (2) + E((', (2) + E((', ('2) E((, ('2) Demonstration : '(, () '2(, (2) + '(, (') '2(, (2) + '(, (') '2(, ('2) '(, () '2(, ('2) = ± 2 locality / freedom of choice - The measured polarization can be chosen arbitrarily, while the two photons are very far apart : what is «really» the polarization of the second photon? ( ( 2 (' For the indicated angles one has SQM = 2#2 Einstein, Podolsky and Rosen «paradox» (935) 22 5 (' 2 Conflict Experimental result? J= Dyelaser 55 nm Krionlaser nm J= Orsay s source of pairs of entangled photons (98-82) 2 { +, +, + } { x,x + y, y } = 2 J= r=5ns Emission of two entangled photons by an atomic cascade. * Laser-induced two-photon excitation of a cascade in a Calcium 4 atomic beam. ' detected pairs per second % precision for s counting * Random switching of polarizers Experimental tests of Bell s inequalities Experiments with an active fast change in the polarizers orientations (initially proposed by Alain Aspect in 976 to close the «locality loophole») Orsay 982 : A. Aspect et al, Phys. Rev. Lett. 49, 84 (982). * distance between polarizers : 5 m -> L/c = 5 ns * measurement switching time : 2 ns (ok) * violation of Bell s inegalities by 6 standard deviations (5 h counting time) Innsbruck 998 : G. Weihs et al, Phys. Rev. Lett. 8, 539 (998). * distance between polarizers : 4 m (optical fibers) -> L/c =.3 µs * truly random and independant switching time * violation of Bell s inegalities by 3 standard deviations ( s counting time). La Palma-Tenerife 2 : T. Scheidl et al, Proc. Natl. Acad. Sci. 7, 978 (2). * distance between polarizers :44 km (free space) -> L/c = 48 µs * truly random and independant switching time + %() independant of ( and (2 * violation of Bell s inegalities by 6 standard deviations (6 s counting time). Conclusion : Bell s hypothesis are untenable entangled states do exist

10 QUANTUM COMPUTING LINEAR ION TRAPS QUANTUM COMPUTER IN SILICON * Confinement using electromagnetic fields : «chain» of trapped ions Qubit : magnetic moment of phosphorus atoms individually implanted below electrodes B (= 2 Tesla) T= mk * Laser cooling : ions in the ground state of the harmonic trap A-Gates J-Gates A : qubit gates J : 2 qubits gates Barrier * Technically possible Silicium * Decoherence??? e- e- 3P+ 3P+ ~ 2 Å B. E. Kane, A silicon-based nuclear spin quantum computer, Nature, Vol. 393, p. 33, 998 Substrate Image of fluorescence from 8 ions in a trap Isolated ions in vacuum : decoherence much smaller than in a solid...

11 «Quantum Byte» (Innsbruck, 25) Quantum register with 8 qubits Preparation and read out: = Control of the «calculation» using a sequence of laser pulses 8 ( Difficult to draw As a conclusion... )

24 th IEEE Annual Computer Communications Workshop (CCW)

24 th IEEE Annual Computer Communications Workshop (CCW) 24 th IEEE Annual Computer Communications Workshop (CCW) Exploration of Quantum Cryptography in Network Security Presented by Mehrdad S. Sharbaf Sharbaf & Associates Loyola Marymount University California

More information

Introduction to Quantum Computing

Introduction to Quantum Computing Introduction to Quantum Computing Javier Enciso encisomo@in.tum.de Joint Advanced Student School 009 Technische Universität München April, 009 Abstract In this paper, a gentle introduction to Quantum Computing

More information

Quantum control of individual electron and nuclear spins in diamond lattice

Quantum control of individual electron and nuclear spins in diamond lattice Quantum control of individual electron and nuclear spins in diamond lattice Mikhail Lukin Physics Department, Harvard University Collaborators: L.Childress, M.Gurudev Dutt, J.Taylor, D.Chang, L.Jiang,A.Zibrov

More information

Quantum cryptography

Quantum cryptography Quantum cryptography Optical fibers to carry information 10 Kb/s 1Tb/s 10 12 b/s Optical fibers vs electrical cables Frequency: 10 8 Hz vs 10 15 Hz Bit rate for electrical interconnections B B 0 A l 2

More information

The New Approach of Quantum Cryptography in Network Security

The New Approach of Quantum Cryptography in Network Security The New Approach of Quantum Cryptography in Network Security Avanindra Kumar Lal 1, Anju Rani 2, Dr. Shalini Sharma 3 (Avanindra kumar) Abstract There are multiple encryption techniques at present time

More information

A Probabilistic Quantum Key Transfer Protocol

A Probabilistic Quantum Key Transfer Protocol A Probabilistic Quantum Key Transfer Protocol Abhishek Parakh Nebraska University Center for Information Assurance University of Nebraska at Omaha Omaha, NE 6818 Email: aparakh@unomaha.edu August 9, 01

More information

A loophole-free Bell test

A loophole-free Bell test A loophole-free Bell test Bas Hensen February 15, 2013 In 1964, John Bell showed that any local realistic theory disagrees with the predictions of quantum mechanics on measurements of distant objects.

More information

"in recognition of the services he rendered to the advancement of Physics by his discovery of energy quanta". h is the Planck constant he called it

in recognition of the services he rendered to the advancement of Physics by his discovery of energy quanta. h is the Planck constant he called it 1 2 "in recognition of the services he rendered to the advancement of Physics by his discovery of energy quanta". h is the Planck constant he called it the quantum of action 3 Newton believed in the corpuscular

More information

arxiv:quant-ph/9809016 v2 19 Jan 2000

arxiv:quant-ph/9809016 v2 19 Jan 2000 An Introduction to Quantum Computing for Non-Physicists arxiv:quant-ph/9809016 v 19 Jan 000 Eleanor Rieffel FX Palo Alto Labratory and Wolfgang Polak Consultant FX Palo Alto Laboratory, 3400 Hillview Avenue,

More information

Introduction to Quantum Computing

Introduction to Quantum Computing Introduction to Quantum Computing Frédéric Magniez LIAFA & PCQC, Université Paris Diderot The genesis 2 Copenhagen School (Bohr, Heisenberg, ) - The state of a quantum particule is only fixed after a measurement

More information

Quantum Cryptography: The Ultimate Solution to Secure Data Transmission?

Quantum Cryptography: The Ultimate Solution to Secure Data Transmission? Quantum Cryptography: The Ultimate Solution to Secure Data Transmission? Ioannis P. Antoniades 1, Amalia N. Miliou 2, Miltiades K. Hatalis 3 1 Department of Informatics, Aristotle University of Thessaloniki,

More information

Quantum Cryptography: Privacy Through Uncertainty (Released October 2002) by Salvatore Vittorio

Quantum Cryptography: Privacy Through Uncertainty (Released October 2002) by Salvatore Vittorio Quantum Cryptography: Privacy Through Uncertainty (Released October 2002) by Salvatore Vittorio Review Key Citations Web Sites Glossary Conferences Editor Review Article 1. Cryptography - an Overview I

More information

Quantum Key Distribution as a Next-Generation Cryptographic Protocol. Andrew Campbell

Quantum Key Distribution as a Next-Generation Cryptographic Protocol. Andrew Campbell Quantum Key Distribution as a Next-Generation Cryptographic Protocol Andrew Campbell Abstract Promising advances in the field of quantum computing indicate a growing threat to cryptographic protocols based

More information

Enhancing privacy with quantum networks

Enhancing privacy with quantum networks Enhancing privacy with quantum networks P. Mateus N. Paunković J. Rodrigues A. Souto SQIG- Instituto de Telecomunicações and DM - Instituto Superior Técnico - Universidade de Lisboa Abstract Using quantum

More information

Quantum Computing for Beginners: Building Qubits

Quantum Computing for Beginners: Building Qubits Quantum Computing for Beginners: Building Qubits Suzanne Gildert Condensed Matter Physics Research (Quantum Devices Group) University of Birmingham 28/03/2007 Overview of this presentation What is a Qubit?

More information

Bevezetés a kvantum-informatikába és kommunikációba 2014/2015 tavasz. Mérés, NCT, kvantumállapot. 2015. március 12.

Bevezetés a kvantum-informatikába és kommunikációba 2014/2015 tavasz. Mérés, NCT, kvantumállapot. 2015. március 12. Bevezetés a kvantum-informatikába és kommunikációba 2014/2015 tavasz Mérés, NCT, kvantumállapot 2015. március 12. Tegnap még összefonódtam, mára megmértek 2015.03.18. 2 Slides for Quantum Computing and

More information

230483 - QOT - Quantum Optical Technologies

230483 - QOT - Quantum Optical Technologies Coordinating unit: Teaching unit: Academic year: Degree: ECTS credits: 2015 230 - ETSETB - Barcelona School of Telecommunications Engineering 739 - TSC - Department of Signal Theory and Communications

More information

Quantum Encoder and Decoder for Secret Key Distribution with Check Bits

Quantum Encoder and Decoder for Secret Key Distribution with Check Bits Research Journal of Applied Sciences, Engineering and Technology 6(23): 4381-4386, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2013 Submitted: January 31, 2013 Accepted: May

More information

Network Security Using Quantum Cryptography N.Kusuma#1, N.Sai Tejaswi#2, T.Anitha,#3, K.V.D Kiran*4

Network Security Using Quantum Cryptography N.Kusuma#1, N.Sai Tejaswi#2, T.Anitha,#3, K.V.D Kiran*4 Network Security Using Quantum Cryptography N.Kusuma#1, N.Sai Tejaswi#2, T.Anitha,#3, K.V.D Kiran*4 Computer Science and Engineering, KL University Green Fields, Vaddeswaram, PO Dt-522 502, Andhra Pradesh,

More information

Quantum Systems for Information Technology

Quantum Systems for Information Technology Lecture Quantum Systems for Information Technology fall term (HS) 2010 Lecturer: e Andreas Wallraff office: HPF D 8/9, ETH Hoenggerberg email: qsit-lecture@phys.ethz.ch What is this lecture about? Quantum

More information

Entanglement: The Holy Grail of High-Speed Design

Entanglement: The Holy Grail of High-Speed Design by Barry Olney column BEYOND DESIGN Entanglement: The Holy Grail of High-Speed Design While high-speed SERDES serial communications seems to currently be at the cutting edge of technology, maybe it will

More information

Quantum Computers vs. Computers Security. @veorq http://aumasson.jp

Quantum Computers vs. Computers Security. @veorq http://aumasson.jp Quantum Computers vs. Computers Security @veorq http://aumasson.jp Schrodinger equation Entanglement Bell states EPR pairs Wave functions Uncertainty principle Tensor products Unitary matrices Hilbert

More information

How Quantum Can a Computer Be? 1

How Quantum Can a Computer Be? 1 How Quantum Can a Computer Be? 1 Elham Kashefi 2 Prisme N 29 September 2014 1 This text is a transcription of the presentation given by Elham Kashefi at the Cournot seminar, «Quantum Turing Testing» in

More information

Towards a Tight Finite Key Analysis for BB84

Towards a Tight Finite Key Analysis for BB84 The Uncertainty Relation for Smooth Entropies joint work with Charles Ci Wen Lim, Nicolas Gisin and Renato Renner Institute for Theoretical Physics, ETH Zurich Group of Applied Physics, University of Geneva

More information

CONCEPT OF DETERMINISTIC ION IMPLANTATION AT THE NANOSCALE

CONCEPT OF DETERMINISTIC ION IMPLANTATION AT THE NANOSCALE CONCEPT OF DETERMINISTIC ION IMPLANTATION AT THE NANOSCALE Daniel Spemann Jan Meijer 1, Jürgen W. Gerlach, Paul Räcke 1, Susann Liedtke, Stephan Rauschenbach 2, Bernd Rauschenbach 1 University of Leipzig,

More information

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography Kommunikationssysteme (KSy) - Block 8 Secure Network Communication Part II II Public Key Cryptography Dr. Andreas Steffen 2000-2001 A. Steffen, 28.03.2001, KSy_RSA.ppt 1 Secure Key Distribution Problem

More information

A More Efficient Way to De-shelve 137 Ba +

A More Efficient Way to De-shelve 137 Ba + A More Efficient Way to De-shelve 137 Ba + Abstract: Andrea Katz Trinity University UW REU 2010 In order to increase the efficiency and reliability of de-shelving barium ions, an infrared laser beam was

More information

A High Speed Quantum Communication Testbed

A High Speed Quantum Communication Testbed A High Speed Communication Testbed Carl J. Williams, Xiao Tang, Mikko Hiekkero, Julie Rouzaud, Richang Lu, Andreas Goedecke, Alan Migdall, Alan Mink, Anastase Nakassis, Leticia Pibida, Jesse Wen a, Edward

More information

QUANTUM INFORMATION, COMPUTATION AND FUNDAMENTAL LIMITATION

QUANTUM INFORMATION, COMPUTATION AND FUNDAMENTAL LIMITATION Arun K. Pati Theoretical Physics Division QUANTUM INFORMATION, COMPUTATION AND FUNDAMENTAL LIMITATION Introduction Quantum information theory is a marriage between two scientific pillars of the twentieth

More information

Characterizing Quantum Dots and Color Centers in Nanodiamonds as Single Emitters

Characterizing Quantum Dots and Color Centers in Nanodiamonds as Single Emitters University of Rochester OPT253 Lab 3-4 Report Characterizing Quantum Dots and Color Centers in Nanodiamonds as Single Emitters Author: Nicholas Cothard Peter Heuer Professor: Dr. Svetlana Lukishova November

More information

Bits Superposition Quantum Parallelism

Bits Superposition Quantum Parallelism 7-Qubit Quantum Computer Typical Ion Oscillations in a Trap Bits Qubits vs Each qubit can represent both a or at the same time! This phenomenon is known as Superposition. It leads to Quantum Parallelism

More information

QUANTUM COMPUTING: A REVIEW FOR THE RELATED ISSUES AND ITS FUTURE ASPECTS

QUANTUM COMPUTING: A REVIEW FOR THE RELATED ISSUES AND ITS FUTURE ASPECTS QUANTUM COMPUTING: A REVIEW FOR THE RELATED ISSUES AND ITS FUTURE ASPECTS Shubhangi Tyagi 1, Harshita Malhotra 2, Deepali Bhatia 3, Prashant Vats 4 1,2,3,4 Dept. of CSE, HMRITM, New Delhi (India) ABSTRACT

More information

Shor s algorithm and secret sharing

Shor s algorithm and secret sharing Shor s algorithm and secret sharing Libor Nentvich: QC 23 April 2007: Shor s algorithm and secret sharing 1/41 Goals: 1 To explain why the factoring is important. 2 To describe the oldest and most successful

More information

QUANTUM ENIGMA Summer 2014 Ted McIrvine

QUANTUM ENIGMA Summer 2014 Ted McIrvine QUANTUM ENIGMA Summer 2014 Ted McIrvine June 17: Once Over Lightly & Newtonian Mechanics June 24: Electricity, Magnetism, Light & the Puzzles of 1900 July 1: Atomic Theory, Quantum Theory, Paradoxes and

More information

QUANTUM COMPUTERS AND CRYPTOGRAPHY. Mark Zhandry Stanford University

QUANTUM COMPUTERS AND CRYPTOGRAPHY. Mark Zhandry Stanford University QUANTUM COMPUTERS AND CRYPTOGRAPHY Mark Zhandry Stanford University Classical Encryption pk m c = E(pk,m) sk m = D(sk,c) m??? Quantum Computing Attack pk m aka Post-quantum Crypto c = E(pk,m) sk m = D(sk,c)

More information

Quantum communication and quantum computing

Quantum communication and quantum computing IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 15, Issue 1 (Sep. - Oct. 2013), PP 30-34 Quantum communication and quantum computing *Sweety Mittal, **Nilesh

More information

Authentic Digital Signature Based on Quantum Correlation

Authentic Digital Signature Based on Quantum Correlation Authentic Digital Signature Based on Quantum Correlation Xiao-Jun Wen, Yun Liu School of Electronic Information Engineering, Beijing Jiaotong University, Beijing 00044, China Abstract: An authentic digital

More information

Mathematics of Internet Security. Keeping Eve The Eavesdropper Away From Your Credit Card Information

Mathematics of Internet Security. Keeping Eve The Eavesdropper Away From Your Credit Card Information The : Keeping Eve The Eavesdropper Away From Your Credit Card Information Department of Mathematics North Dakota State University 16 September 2010 Science Cafe Introduction Disclaimer: is not an internet

More information

1.Context... 3. What is the problem with current cryptographic techniques?... 3. 2.Current Quantum Key Distribution (QKD)... 4

1.Context... 3. What is the problem with current cryptographic techniques?... 3. 2.Current Quantum Key Distribution (QKD)... 4 Page 2 Table of contents 1.Context... 3 What is the problem with current cryptographic techniques?... 3 2.Current Quantum Key Distribution (QKD)... 4 What is Quantum Cryptography?... 4 How does QKD improve

More information

Quantum Computing. Robert Sizemore

Quantum Computing. Robert Sizemore Quantum Computing Robert Sizemore Outline Introduction: What is quantum computing? What use is quantum computing? Overview of Quantum Systems Dirac notation & wave functions Two level systems Classical

More information

arxiv:1403.3122v1 [quant-ph] 12 Mar 2014

arxiv:1403.3122v1 [quant-ph] 12 Mar 2014 Relativistic Quantum Cryptography I. V. Radchenko and K. S. Kravtsov A.. Prokhorov General Physics Institute RAS, oscow, Russia S. P. Kulik Faculty of Physics, oscow State University, oscow, Russia S.

More information

Practical security of quantum cryptography

Practical security of quantum cryptography Lars Vincent van de Wiel Lydersen Practical security of quantum cryptography Thesis for the degree of Philosophiae Doctor Trondheim, September 2011 Norwegian University of Science and Technology Faculty

More information

Quantum Computation with Bose-Einstein Condensation and. Capable of Solving NP-Complete and #P Problems. Abstract

Quantum Computation with Bose-Einstein Condensation and. Capable of Solving NP-Complete and #P Problems. Abstract Quantum Computation with Bose-Einstein Condensation and Capable of Solving NP-Complete and #P Problems Yu Shi Cavendish Laboratory, University of Cambridge, Cambridge CB3 0HE, United Kingdom Abstract It

More information

Provided for non-commercial research and education use. Not for reproduction, distribution or commercial use.

Provided for non-commercial research and education use. Not for reproduction, distribution or commercial use. Provided for non-commercial research and education use. Not for reproduction, distribution or commercial use. ISBN 978-94-007-2487-7 This chapter was published in the above Springer book. The attached

More information

Quantum Enabled Security Solutions. Dr. Grégoire Ribordy ID Quantique SA www.idquantique.com

Quantum Enabled Security Solutions. Dr. Grégoire Ribordy ID Quantique SA www.idquantique.com Quantum Enabled Security Solutions Dr. Grégoire Ribordy ID Quantique SA www.idquantique.com 10 Years of Quantum Innovation IDQ presents its first quantum cryptography (QC) prototype First QC system sold

More information

Quantum Computing and Cryptography Their impact on cryptographic practice

Quantum Computing and Cryptography Their impact on cryptographic practice Quantum Computing and Cryptography Their impact on cryptographic practice Tim Moses Director, Advanced Security Technology Entrust, Inc. January 2009 2009 Entrust, Inc. All rights reserved. Entrust is

More information

Spectroscopy. Biogeochemical Methods OCN 633. Rebecca Briggs

Spectroscopy. Biogeochemical Methods OCN 633. Rebecca Briggs Spectroscopy Biogeochemical Methods OCN 633 Rebecca Briggs Definitions of Spectrometry Defined by the method used to prepare the sample 1. Optical spectrometry Elements are converted to gaseous atoms or

More information

Proposed experiment to test the non-locality hypothesis in transient light-interference phenomena

Proposed experiment to test the non-locality hypothesis in transient light-interference phenomena Proposed experiment to test the non-locality hypothesis in transient light-interference phenomena Masanori Sato Honda Electronics Co., Ltd., 20 Oyamazuka, Oiwa-cho, Toyohashi, Aichi 441-3193, Japan Abstract

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Key Distillation Process on Quantum Cryptography Protocols in

More information

Department of Commerce National Institute of Standards and Technology (NIST)

Department of Commerce National Institute of Standards and Technology (NIST) Department of Commerce National Institute of Standards and Technology (NIST) Response to Request for Information on Quantum Information Science and the Needs of U.S. Industry Posted Date: April 8, 2015

More information

Computing. Strange ideas can come from ordinary places. This. TheTopsy Turvy World. of Quantum

Computing. Strange ideas can come from ordinary places. This. TheTopsy Turvy World. of Quantum ADVANCED TECHNOLOGY TheTopsy Turvy World of Quantum Computing 42 BY JUSTIN MULLINS Contributing Editor Strange ideas can come from ordinary places. This one came from Texas. In 1981, John A. Wheeler, the

More information

Quantum computing in practice

Quantum computing in practice Quantum computing in practice & applications to cryptography Renaud Lifchitz OPPIDA NoSuchCon, November 19-21, 2014 Renaud Lifchitz NoSuchCon, November 19-21, 2014 1 / 68 Speaker s bio French senior security

More information

Quantum Safe Security Workgroup Presentation. Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014

Quantum Safe Security Workgroup Presentation. Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014 Quantum Safe Security Workgroup Presentation Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014 ID Quantique Photon Counters Services Quantum Random Number Generators Technology

More information

Quantum Information Science (NIST trapped ion group) Dilbert confronts Schrödinger s cat, 4/17/12

Quantum Information Science (NIST trapped ion group) Dilbert confronts Schrödinger s cat, 4/17/12 Quantum Information Science (NIST trapped ion group) Dilbert confronts Schrödinger s cat, 4/7/ Data storage: classical: computer bit: (0) or () quantum: qubit α 0 +β superposition Scaling: Consider 3-bit

More information

Experiment 5. Lasers and laser mode structure

Experiment 5. Lasers and laser mode structure Northeastern University, PHYS5318 Spring 2014, 1 1. Introduction Experiment 5. Lasers and laser mode structure The laser is a very important optical tool that has found widespread use in science and industry,

More information

CSCE 465 Computer & Network Security

CSCE 465 Computer & Network Security CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Public Key Cryptogrophy 1 Roadmap Introduction RSA Diffie-Hellman Key Exchange Public key and

More information

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash

More information

Application of Quantum Cryptography to an Eavesdropping Detectable Data Transmission

Application of Quantum Cryptography to an Eavesdropping Detectable Data Transmission Title Application of Quantum Cryptography Detectable Data Transmission Author(s) Kudo, Takamitsu; Usuda, Tsuyoshi Sa Masayasu IEICE Transactions on Fundamentals Citation Communications and Computer Science

More information

Alternative machine models

Alternative machine models Alternative machine models Computational complexity thesis: All reasonable computer models can simulate one another in polynomial time (i.e. P is robust or machine independent ). But the Turing machine

More information

Library (versus Language) Based Parallelism in Factoring: Experiments in MPI. Dr. Michael Alexander Dr. Sonja Sewera.

Library (versus Language) Based Parallelism in Factoring: Experiments in MPI. Dr. Michael Alexander Dr. Sonja Sewera. Library (versus Language) Based Parallelism in Factoring: Experiments in MPI Dr. Michael Alexander Dr. Sonja Sewera Talk 2007-10-19 Slide 1 of 20 Primes Definitions Prime: A whole number n is a prime number

More information

Progress Toward Quantum Communications Networks: Opportunities and Challenges

Progress Toward Quantum Communications Networks: Opportunities and Challenges Progress Toward Quantum Communications Networks: Opportunities and Challenges Robert J. Runser *a,b, Thomas Chapuran a, Paul Toliver a, Nicholas A. Peters a, Matthew S. Goodman a, Jon T. Kosloski b, Nnake

More information

Differential-phase-shift quantum key distribution using heralded narrow-band single photons

Differential-phase-shift quantum key distribution using heralded narrow-band single photons Differential-phase-shift quantum key distribution using heralded narrow-band single photons Chang Liu, 1 Shanchao Zhang, 1 Luwei Zhao, 1 Peng Chen, 1 C. -H. F. Fung, 2 H. F. Chau, 2 M. M. T. Loy, 1 and

More information

Elements of Applied Cryptography Public key encryption

Elements of Applied Cryptography Public key encryption Network Security Elements of Applied Cryptography Public key encryption Public key cryptosystem RSA and the factorization problem RSA in practice Other asymmetric ciphers Asymmetric Encryption Scheme Let

More information

Nanoscience Course Descriptions

Nanoscience Course Descriptions Nanoscience Course Descriptions NANO*1000 Introduction to Nanoscience This course introduces students to the emerging field of nanoscience. Its representation in popular culture and journalism will be

More information

Quantum Key Distribution Protocols: A Review

Quantum Key Distribution Protocols: A Review IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. XI (Mar-Apr. 2014), PP 01-09 Quantum Key Distribution Protocols: A Review Hitesh Singh 1, D.L.

More information

QUANTUM COMPUTATION AND MULTI-PARTICLE ENTANGLEMENT WITH TRAPPED ATOMS AND IONS. Ph.D. Thesis Anders Søndberg Sørensen

QUANTUM COMPUTATION AND MULTI-PARTICLE ENTANGLEMENT WITH TRAPPED ATOMS AND IONS. Ph.D. Thesis Anders Søndberg Sørensen QUANTUM COMPUTATION AND MULTI-PARTICLE ENTANGLEMENT WITH TRAPPED ATOMS AND IONS Ph.D. Thesis Anders Søndberg Sørensen Institute of Physics and Astronomy University of Aarhus July 2001 ii Preface This thesis

More information

Authentication in Online Banking Systems through Quantum Cryptography

Authentication in Online Banking Systems through Quantum Cryptography Authentication in Online Banking Systems through Quantum Cryptography Anand Sharma 1, S.K.Lenka 2 FET, MITS, Lakshmangarh Sikar, Rajasthan, India 1 anand_glee@yahoo.co.in, 2 lenka.sarojkumar@gmail.com

More information

CS 758: Cryptography / Network Security

CS 758: Cryptography / Network Security CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: dstinson@uwaterloo.ca my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html

More information

3-9 EPR and Bell s theorem. EPR Bohm s version. S x S y S z V H 45

3-9 EPR and Bell s theorem. EPR Bohm s version. S x S y S z V H 45 1 3-9 EPR and Bell s theorem EPR Bohm s version S x S y S z n P(n) n n P(0) 0 0 V H 45 P(45) D S D P(0) H V 2 ( ) Neumann EPR n P(n) EPR PP(n) n EPR ( ) 2 5 2 3 But even at this stage there is essentially

More information

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative

More information

Royal Holloway Series 2011

Royal Holloway Series 2011 Quantum key distribution: Awesome or pointless? Some believe the advent of quantum computing will reduce the time taken to solve cryptographic algorithms so dramatically that they will no longer provide

More information

École Supérieure d'optique

École Supérieure d'optique Conference on Education and Training in Optics & Photonics Marseille, 27 th October 2005 An Optical Time Domain Reflectometry Set-Up for Laboratory Work at École Supérieure d'optique École Supérieure d'optique

More information

DISTANCE DEGREE PROGRAM CURRICULUM NOTE:

DISTANCE DEGREE PROGRAM CURRICULUM NOTE: Bachelor of Science in Electrical Engineering DISTANCE DEGREE PROGRAM CURRICULUM NOTE: Some Courses May Not Be Offered At A Distance Every Semester. Chem 121C General Chemistry I 3 Credits Online Fall

More information

- particle with kinetic energy E strikes a barrier with height U 0 > E and width L. - classically the particle cannot overcome the barrier

- particle with kinetic energy E strikes a barrier with height U 0 > E and width L. - classically the particle cannot overcome the barrier Tunnel Effect: - particle with kinetic energy E strikes a barrier with height U 0 > E and width L - classically the particle cannot overcome the barrier - quantum mechanically the particle can penetrated

More information

Basic principles and mechanisms of NSOM; Different scanning modes and systems of NSOM; General applications and advantages of NSOM.

Basic principles and mechanisms of NSOM; Different scanning modes and systems of NSOM; General applications and advantages of NSOM. Lecture 16: Near-field Scanning Optical Microscopy (NSOM) Background of NSOM; Basic principles and mechanisms of NSOM; Basic components of a NSOM; Different scanning modes and systems of NSOM; General

More information

NAVAL POSTGRADUATE SCHOOL THESIS

NAVAL POSTGRADUATE SCHOOL THESIS NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS CRYPTOLOGY MANAGEMENT IN A QUANTUM COMPUTING ERA by Nathanial Owen Rosenberg June 2012 Thesis Advisor: Second Reader: Third Reader: Theodore Huffmire

More information

Single Photon Counting Module COUNT -Series

Single Photon Counting Module COUNT -Series Description Laser Components COUNT series of s has been developed to offer a unique combination of high photon detection efficiency, wide dynamic range and ease of use for photon counting applications.

More information

Atomic Structure: Chapter Problems

Atomic Structure: Chapter Problems Atomic Structure: Chapter Problems Bohr Model Class Work 1. Describe the nuclear model of the atom. 2. Explain the problems with the nuclear model of the atom. 3. According to Niels Bohr, what does n stand

More information

Quantum Cryptography Between Science and Business

Quantum Cryptography Between Science and Business Radboud Honours Academy 2011-12 May 29, 2012 Quantum Cryptography Between Science and Business Wilke Castelijns Maria van Rooijen David Venhoek Patrick Uiterwijk Preface In this report we discuss the results

More information

Optical laser beam scanner lens relay system

Optical laser beam scanner lens relay system 1. Introduction Optical laser beam scanner lens relay system Laser beam scanning is used most often by far in confocal microscopes. There are many ways by which a laser beam can be scanned across the back

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 1 January 9, 2012 CPSC 467b, Lecture 1 1/22 Course Overview Symmetric Cryptography CPSC 467b, Lecture 1 2/22 Course Overview CPSC

More information

Robert G. Hunsperger. Integrated Optics. Theory and Technology. Fourth Edition. With 195 Figures and 17 Tables. Springer

Robert G. Hunsperger. Integrated Optics. Theory and Technology. Fourth Edition. With 195 Figures and 17 Tables. Springer Robert G. Hunsperger Integrated Optics Theory and Technology Fourth Edition With 195 Figures and 17 Tables Springer Contents 1. Introduction 1 1.1 Advantages of Integrated Optics 2 1.1.1 Comparison of

More information

Securing Your Data In Transit For The Long Term

Securing Your Data In Transit For The Long Term Securing Your Data In Transit For The Long Term Or what happens when RSA encryption is finally broken by mathematicians or quantum computers? October 2014 ID Quantique Photon Counters Services Quantum

More information

arxiv:quant-ph/9607009v1 11 Jul 1996

arxiv:quant-ph/9607009v1 11 Jul 1996 Distillability of Inseparable Quantum Systems Micha l Horodecki Department of Mathematics and Physics University of Gdańsk, 80 952 Gdańsk, Poland arxiv:quant-ph/9607009v1 11 Jul 1996 Pawe l Horodecki Faculty

More information

Lecture 6 - Cryptography

Lecture 6 - Cryptography Lecture 6 - Cryptography CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07 Question 2 Setup: Assume you and I don t know anything about

More information

Factoring Algorithms Based on NMR Quantum

Factoring Algorithms Based on NMR Quantum 1295 2002 69-74 69 Factoring Algorithms Based on NMR Quantum Computers (Noboru Kunihiro) (Shigeru Yamashita) NTT NTT Abstract No polynomial time algorithms have been proposed for the factoring and discrete

More information

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g. Cryptography: Motivation Many areas have sensitive information, e.g. Data Structures and Algorithms Cryptography Goodrich & Tamassia Sections 3.1.3 & 3.1.4 Introduction Simple Methods Asymmetric methods:

More information

1 Now, Why do we want to learn Quantum Mechanics

1 Now, Why do we want to learn Quantum Mechanics 1 Now, Why do we want to learn Quantum Mechanics Quantum mechanics is a mathematical theory that can be used to predict chemical properties. But this fact has been known since the 1920s, so what s new?

More information

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013 FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,

More information

Lecture 20: Scanning Confocal Microscopy (SCM) Rationale for SCM. Principles and major components of SCM. Advantages and major applications of SCM.

Lecture 20: Scanning Confocal Microscopy (SCM) Rationale for SCM. Principles and major components of SCM. Advantages and major applications of SCM. Lecture 20: Scanning Confocal Microscopy (SCM) Rationale for SCM. Principles and major components of SCM. Advantages and major applications of SCM. Some limitations (disadvantages) of NSOM A trade-off

More information

How To Solve The Prime Factorization Of N With A Polynomials

How To Solve The Prime Factorization Of N With A Polynomials THE MATHEMATICS OF PUBLIC KEY CRYPTOGRAPHY. IAN KIMING 1. Forbemærkning. Det kan forekomme idiotisk, at jeg som dansktalende og skrivende i et danskbaseret tidsskrift med en (formentlig) primært dansktalende

More information

- thus, the total number of atoms per second that absorb a photon is

- thus, the total number of atoms per second that absorb a photon is Stimulated Emission of Radiation - stimulated emission is referring to the emission of radiation (a photon) from one quantum system at its transition frequency induced by the presence of other photons

More information

A Modest View of Bell s Theorem. Steve Boughn, Princeton University and Haverford College

A Modest View of Bell s Theorem. Steve Boughn, Princeton University and Haverford College A Modest View of Bell s Theorem Steve Boughn, Princeton University and Haverford College Talk given at the 2016 Princeton-TAMU Symposium on Quantum Noise Effects in Thermodynamics, Biology and Information

More information

Cryptographic Hash Functions Message Authentication Digital Signatures

Cryptographic Hash Functions Message Authentication Digital Signatures Cryptographic Hash Functions Message Authentication Digital Signatures Abstract We will discuss Cryptographic hash functions Message authentication codes HMAC and CBC-MAC Digital signatures 2 Encryption/Decryption

More information

Zeiss 780 Training Notes

Zeiss 780 Training Notes Zeiss 780 Training Notes 780 Start Up Sequence Do you need the argon laser, 458,488,514nm lines? No Turn on the Systems PC Switch Turn on Main Power Switch Yes Turn on the laser main power switch and turn

More information

Quantum Computers. And How Does Nature Compute? Kenneth W. Regan 1 University at Buffalo (SUNY) 21 May, 2015. Quantum Computers

Quantum Computers. And How Does Nature Compute? Kenneth W. Regan 1 University at Buffalo (SUNY) 21 May, 2015. Quantum Computers Quantum Computers And How Does Nature Compute? Kenneth W. Regan 1 University at Buffalo (SUNY) 21 May, 2015 1 Includes joint work with Amlan Chakrabarti, U. Calcutta If you were designing Nature, how would

More information

Journal of Information Technology and Applications (BANJA LUKA)

Journal of Information Technology and Applications (BANJA LUKA) Journal of Information Technology and Applications (BANJA LUKA) VOLUME 3 NUMBER 1 BANJA LUKA, JUN 2013 (1-60) ISSN 2232-9625 (Print) UDC 004 Exchange of Information and Knowledge in Research THE AIM AND

More information

Quantum Algorithms in NMR Experiments. 25 th May 2012 Ling LIN & Michael Loretz

Quantum Algorithms in NMR Experiments. 25 th May 2012 Ling LIN & Michael Loretz Quantum Algorithms in NMR Experiments 25 th May 2012 Ling LIN & Michael Loretz Contents 1. Introduction 2. Shor s algorithm 3. NMR quantum computer Nuclear spin qubits in a molecule NMR principles 4. Implementing

More information

Quantum Information Science

Quantum Information Science Quantum Information Science An Emerging Field of Interdisciplinary Research and Education in Science and Engineering Workshop October 28-29, 1999 Arlington, Virginia National Science Foundation Quantum

More information

13C NMR Spectroscopy

13C NMR Spectroscopy 13 C NMR Spectroscopy Introduction Nuclear magnetic resonance spectroscopy (NMR) is the most powerful tool available for structural determination. A nucleus with an odd number of protons, an odd number

More information