A Recent Improvements in Quantum Model and Counter Measures in Quantum Computing



Similar documents
Quantum Computing Lecture 7. Quantum Factoring. Anuj Dawar

Factoring by Quantum Computers

Shor s algorithm and secret sharing

Bits Superposition Quantum Parallelism

Introduction to Quantum Computing

Lecture 13: Factoring Integers

What Has Quantum Mechanics to Do With Factoring? Things I wish they had told me about Peter Shor s algorithm

QUANTUM COMPUTERS AND CRYPTOGRAPHY. Mark Zhandry Stanford University

0.1 Phase Estimation Technique

Quantum Computing. Robert Sizemore

Quantum Algorithms in NMR Experiments. 25 th May 2012 Ling LIN & Michael Loretz

QUANTUM INFORMATION, COMPUTATION AND FUNDAMENTAL LIMITATION

The Mathematics of the RSA Public-Key Cryptosystem

Breaking The Code. Ryan Lowe. Ryan Lowe is currently a Ball State senior with a double major in Computer Science and Mathematics and

Quantum Computing Architectures

Factoring & Primality

Quantum Encoder and Decoder for Secret Key Distribution with Check Bits

Load Balancing on a Grid Using Data Characteristics

The New Approach of Quantum Cryptography in Network Security

Keywords Quantum logic gates, Quantum computing, Logic gate, Quantum computer

Quantum Computers vs. Computers

U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, Notes on Algebra

Quantum Key Distribution as a Next-Generation Cryptographic Protocol. Andrew Campbell

Study of algorithms for factoring integers and computing discrete logarithms

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

Introduction to computer science

Quantum Computability and Complexity and the Limits of Quantum Computation

Number Theory and Cryptography using PARI/GP

Computational complexity theory

1 Digital Signatures. 1.1 The RSA Function: The eth Power Map on Z n. Crypto: Primitives and Protocols Lecture 6.

Single Sign-On Secure Authentication Password Mechanism

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013

Using quantum computing to realize the Fourier Transform in computer vision applications

The Quadratic Sieve Factoring Algorithm

NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES

An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm

Universality in the theory of algorithms and computer science

Quantum Computing and Grover s Algorithm

Determining the Optimal Combination of Trial Division and Fermat s Factorization Method

CIS 5371 Cryptography. 8. Encryption --

Lecture 9 - Message Authentication Codes

Lecture 1 Version: 14/08/28. Frontiers of Condensed Matter San Sebastian, Aug , Dr. Leo DiCarlo l.dicarlo@tudelft.nl dicarlolab.tudelft.

Faster deterministic integer factorisation

CRYPTOG NETWORK SECURITY

Public Key Cryptography: RSA and Lots of Number Theory

RSA Question 2. Bob thinks that p and q are primes but p isn t. Then, Bob thinks Φ Bob :=(p-1)(q-1) = φ(n). Is this true?

Number Theory and the RSA Public Key Cryptosystem

FACTORING. n = fall in the arithmetic sequence

Quantum Computers. And How Does Nature Compute? Kenneth W. Regan 1 University at Buffalo (SUNY) 21 May, Quantum Computers

Network Security. Chapter 6 Random Number Generation

arxiv:quant-ph/ v2 25 Jan 1996

HASH CODE BASED SECURITY IN CLOUD COMPUTING

Quantum Machine Learning Algorithms: Read the Fine Print

Open Problems in Quantum Information Processing. John Watrous Department of Computer Science University of Calgary

ALGEBRAIC APPROACH TO COMPOSITE INTEGER FACTORIZATION

A Novel Approach for Signing Multiple Messages: Hash- Based Signature

New Hash Function Construction for Textual and Geometric Data Retrieval

OHJ-2306 Introduction to Theoretical Computer Science, Fall

FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION

Factoring Algorithms Based on NMR Quantum

Algebraic Computation Models. Algebraic Computation Models

Advanced Cryptography

Quantum Computation and Quantum Information. Michael A. Nielsen & Isaac L. Chuang

Basic Algorithms In Computer Algebra

Library (versus Language) Based Parallelism in Factoring: Experiments in MPI. Dr. Michael Alexander Dr. Sonja Sewera.

QOT - Quantum Optical Technologies

Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card

A SOFTWARE COMPARISON OF RSA AND ECC

Lecture 3: One-Way Encryption, RSA Example

Bounded Cost Algorithms for Multivalued Consensus Using Binary Consensus Instances

Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

An Open Architecture through Nanocomputing

LUC: A New Public Key System

A New Generic Digital Signature Algorithm

Notes from Week 1: Algorithms for sequential prediction

Quantum and Non-deterministic computers facing NP-completeness

Network Security. Chapter 6 Random Number Generation. Prof. Dr.-Ing. Georg Carle

Mathematics of Internet Security. Keeping Eve The Eavesdropper Away From Your Credit Card Information

CSC474/574 - Information Systems Security: Homework1 Solutions Sketch

arxiv: v1 [math.pr] 5 Dec 2011

Discrete Mathematics, Chapter 4: Number Theory and Cryptography

Modern Factoring Algorithms

IMPROVING PERFORMANCE OF RANDOMIZED SIGNATURE SORT USING HASHING AND BITWISE OPERATORS

2.1 Complexity Classes

Quantum Computing. Robert Senser, PhD. CSC 5446 Presentation Spring Version

A Secure Protocol for the Oblivious Transfer (Extended Abstract) M. J. Fischer. Yale University. S. Micali Massachusetts Institute of Technology

Integer Factorization using the Quadratic Sieve

Transcription:

A Recent Improvements in Quantum Model and Counter Measures in Quantum Computing J.Senthil Murugan 1, V.Parthasarathy 2, S.Sathya 3, M.Anand 4 Assistant Professor, VelTech HighTech Dr.Rangarajan Dr.Sakunthala Engineering College, Chennai, Tamil Nadu, India 1. Professor, VelTech MultiTech Dr.Rangarajan Dr.Sakunthala Engineering College, Chennai, Tamil Nadu, India 2. Research Scholar, Dr.MGR Educational and Research Institute University, Chennai, Tamil Nadu, India 3. Professor, Dr.MGR Educational and Research Institute University, Chennai, Tamil Nadu, India 4. ABSTRACT: The main purpose of this paper is to examine some (potential) applications of quantum computation and to review the interplay between quantum theory. Quantum computation, a brief introduction to it is provided, and a famous but simple quantum algorithm is introduced so that they can appreciate the power of quantum computation. Also, a (quite personal) survey of quantum computation is presented in order to give the readers a (unbalanced) panorama of the field. Now a day quantum communication using quantum effects to send information without eavesdroppers listening undetected and quantum mechanics is a mathematical framework or set of rules for the construction of physical theories.. In this Literature survey, we introduce the motivation and the current and future circumstances of the art of research in quantum cryptography. In exacting we discuss the contemporary security model together with its assumptions, strengths and weaknesses. A syndrome measurement is planned to diagnose which error corrupts in an encoded state and to retrieve the true information. We survey the most recent developments in quantum model and counter measures against it. Quantum computing is a new trend in computation theory and a quantum mechanical system has several useful properties like Entanglement. KEYWORDS: Quantum Computing, Quantum Error Correction, Quantum Model, BQSM. I. INTRODUCTION Quantum computation means the study of the information processing tasks that can be accomplished using quantum mechanical systems. This quantum security model is planned to explore error correction in quantum based systems. Next generation computers are expected to start popularizing the use of quantum logic circuits and quantum algorithms by bringing out desktop systems that use quantum logic. ln this context it is necessary to have schemes that protect quantum information from errors due to de coherence and other quantum noise' This quantum error correction is also essential to achieve fault-tolerant quantum computation (essential for quantum based security schemes) that can deal not only with noise on stored quantum information, but also with faulty quantum gates, faulty quantum preparation and faulty measurements. ln classical error correction redundancy exists. The typical reported way is to store the information multiple times, and if these copies are later found to disagree (similar to a majority vote) then the error is detected'. This approach is effective for single bit errors rather than multiple bit errors. However, in the case of quantum information copying is prohibited due to the no-cloning theorem and this presents an obstacle to formulating a theory of quantum error correction. It is planned to explore the concept of spreading the information of one qubit onto a highly-entangled state of several (physical) qubits. Thus, a quantum error correcting code by storing the information of one qubit onto a highly-entangled state of multiple qubits is to be explored. ln this way, a quantum error correcting code protects quantum information against errors of a limited form. Copyright to IJIRCCE www.ijircce.com 6120

One opportunity to create unconditionally secure quantum commitment and quantum oblivious transfer (OT) protocols is to use the bounded quantum storage model (BQSM). In this model, we assume that the amount of quantum data that an adversary can store is limited by some known constant Q. To inflict any limit on the amount of classical (i.e., nonquantum storage model) data the adversary may store. In the BQSM, one can build commitment and oblivious transfer protocols. The underlying idea is the following: The protocol parties exchange more than Q quantum bits (qubits). Since even a dishonest party cannot store all that information (the quantum memory of the adversary is limited to Q qubits), a large part of the data will have to be either measured or discarded. Forcing dishonest parties to measure a large part of the data allows circumventing the impossibility result by Mayers commitment and oblivious transfer protocols can now be implemented. The advantage of the BQSM is that the assumption that the adversary's quantum memory is limited is quite realistic. With today's technology, storing even a single qubit reliably over a sufficiently long time is difficult. An extension of the BQSM is the noisy-storage model introduced by Wehner, Schaffner and Terha.Instead of considering an upper bound on the physical size of the adversary's quantum memory, an adversary is allowed to use imperfect quantum storage devices of arbitrary size. The level of imperfection is modelled by noisy quantum channels. For high enough noise levels, the same primitives as in the BQSM can be achieved and the BQSM forms a special case of the noisystorage model. II. RELATED WORK The theory of quantum mechanics was prompted by the failure of classical physics in explaining a number of microphysical phenomena that were observed at the end of nineteenth and early twentieth centuries. Now, quantum mechanics is vital for understanding the physics of solids, lasers, semiconductor and superconductor devices, plasmas, etc. In recent years, quantum mechanics has been connected with computer science, information theory in communication and digital signal processing. For example, Shor has showed that integer factoring could be done in polynomial time on a quantum computer. One of major applications of Shor s quantum factorization algorithm is to break RSA public key cryptosystems. Thus, developing new computing methods and signal processing algorithms by borrowing from the principle of quantum mechanics is a very interesting and new research topic. Quantum computing is a new approach to computation that has the possibility to revolutionize the field of computer science. The late Nobel Prize winning physicist Richard Feynman, who was interested in using a computer to simulate quantum systems. Measurement: A measuring apparatus determines properties of a quantum system by interacting with it in some way. Consequently, it is impossible to treat either the system or the apparatus as isolated, at least during the crucial time period when they interact. Instead, one should regard both together as constituting a single combined and isolated quantum system to which the corresponding unitary time development operators application. Quantum information types: Since the world (so far as we know) is quantum mechanical, classical information must be some sort of quantum information. Species of quantum information which represents at least one way of seeing how quantum information theory is connected to classical information theory as developed by Shannon and his successors, and in what way new phenomena arise when quantum effects are taken into account. Quantum error correction was developed in analogy with classical error correcting codes, but in the quantum case one needs a few additional tricks. Classical error correction is based on redundancy making several copies of information in different signals or different physical objects, so that if one or a few of these are lost or corrupted, The original information can be recovered from the ones that remain. Quantum error correction is based on the same general principle, but simply copying the information in the classical sense will not work, in view of no-cloning arguments. Dense Coding: The phenomenon of dense coding is based on the observation that given some state belonging to the Bell basis. There are local unitaries on Ha which will map it onto any of the other states belonging to the basis, apart from an overall phase. There are similar unitaries on Hb. Copyright to IJIRCCE www.ijircce.com 6121

III. EXISTING METHODOLOGY A single bit errors are store the information multiple times, later found to disagree (similar to a majority vote) then the error is detected' and multiple bit errors are case of quantum information copying is prohibited due to the no-cloning theorem. An information of one qubit onto a highly-entangled state of several (physical) qubits and protects quantum information against errors of a limited form. IV. PROPOSED METHODOLOGY Quantum security model is proposed a new methodology is classical error correcting scheme a syndrome measurement is planned to diagnose which error corrupts an encoded state. The corrective operation is then applied using a reversible operation to retrieve the true information. A multi-qubit measurement that does not disturb the quantum information in the encoded state but retrieves information about the error is to be done. A syndrome measurement can determine whether a qubit has been corrupted, and if so, which one. lt is required that the outcome of this operation (the syndrome) should reveal not only which physical qubit was affected, but also, in which of several possible ways it was affected. A qubit (or Quantum BIT) is a standard 'bit' - it is a memory element. It can hold not only the states '0' and '1' but a linear superposition of both states, Advantage of Quantum computation model first one is called as bit flip is referred in quantum as x-measurement and second is sign flip is referred in quantum as z-measurement and finally combination of bit flip and sign flip. V. ARCHITECTURE OF QUANTUM COMPUTING MODEL Quantum computer architecture has much to learn from classical computer architecture, it is difficult to tease apart the intertwined issues of the workload for a system, and the design of the system itself. In fact, workload, technology, error correction and architecture must all comes together to create a complete system. Most of us have been using Shor s algorithm as a benchmark, both for its importance and clarity, and because the arithmetic and quantum Fourier transform on which it is founded are valuable building blocks for other algorithms, as well. An initiation of quantum error correction, many researchers believed that these problems were insurmountable or at least limited the range of problems to which quantum computing can be applied.without error correction (both theory and practice), the machines cannot run for any useful length of time. At the bottom of the stack lie the qubit storage, which are providing useful proving grounds for quantum theory itself, but are of interest here primarily as the foundation for building large-scale quantum computers. Both the top and bottom of this stack are heavily populated with brilliant, dedicated researchers. The figure 1.shows constituting the realm of quantum computing architecture, are less heavily populated. Designing architecture is the process of choosing the metrics for success, defining the desired performance and the costs for components so that they may be balanced as desired. Functionality is divided into subsystems, and the interfaces between subsystems defined, along with corresponding promises and assumptions about behavior or conditions maintained. Likewise quantum computers will be much more than simply uniform collections of qubits. Copyright to IJIRCCE www.ijircce.com 6122

Quantum Theory QEC Theory Quantum Shor s QF QEC Implementation Implementation Classical Control Mechanism Interconnection Qubit Demonstration Qubit Storage Fig.1. Architecture of Quantum Computing Model. In classical systems, we frequently use multiple levels of error correction. The same principle can be applied in quantum systems, in a manner called concatenation. In a concatenated system, physical qubits are grouped to encode a logical qubit, and a group of logical qubits is further encoded (using the same or a different code) to provide greater protection against errors. Quantum algorithms initiate by placing one input register in this superposition. This effect allows a quantum computer to calculate a function on all possible inputs at the same time, in a single pass. Shor s is an algorithm consists of both classical and quantum portions, with the quantum portion being a period-finding method based on the QFT and arithmetic to calculate the modular exponentiation of two integers.a quantum algorithm for integer factorization. Given an integer N, find its prime factors. On a quantum computer to factor an integer N, Shor's algorithm runs in polynomial time (the time taken is polynomial in log N, which is the size of the input). Specifically it takes time O((log N) 3 ), demonstrating that the integer factorization problem can be efficiently solved on a quantum computer. This is significantly faster than the most efficient known classical factoring algorithm. The efficiency of Shor's algorithm is due to the efficiency of the Quantum Fourier Transform(QFT), and modular exponentiation by repeated squarings. Shor's algorithm shows that factoring is efficient on an ideal quantum computer. Shor's Factoring contains two parts: 1. A reduction, which can be done on a classical computer, of the factoring problem to the problem of orderfinding. 2. A quantum algorithm to solve the order-finding problem. : 1. Pick a random number a < N. 2. Compute gcd(a, N). This may be done using the Euclidean algorithm. 3. If gcd(a, N) 1, then there is a nontrivial factor of N, so we are done. 4. Otherwise, use the period-finding subroutine (below) to find r, the period of the following function: f(x) = a x mod N. i.e. the order r of ain (Z N ) X, which is the smallest positive integer r for which f(x+r)=f(x) or f(x+r)=a x+r, mod N= a x mod N. Copyright to IJIRCCE www.ijircce.com 6123

5. If r is odd, go back to step 1. 6. If a r /2 1 (mod N), go back to step 1. 7. gcd(a r/2 ± 1, N) is a nontrivial factor of N. We are done. VI. CONCLUSION AND FUTURE SCOPE Quantum technologies will play a very important role in the future and already to date, several companies are commercializing quantum communication systems. In the future [a quantum computer] could do all sorts of things. A quantum computer [would have] massive processing power because it can do computational tasks in parallel and can solve problems which are virtually intractable using an ordinary computer. Quantum computers are very good at search problems and also for finding the primes of large numbers, which is an important area for cryptography. Also this is going to be one of the great discoveries of the 21st century as these computers will use the techniques of Quantum mechanics and Quantum computing, which will provide more security to the renders for message or information sharing. The proposed method may be implemented in real time applications as it is very simple and the cost may also very less when quantum computer exists. REFERENCES [1] M. A. Nielsen and I. L. Chuang, Quantum Computation and Quantum Information, Cambridge University Press, Cambridge, 2000. [2].A. Galindo and M. A. Martın -Delgado, Information and computation: Classical and Quantum aspects, Reviews of Modern Physics, vol.74, April 2002. [3]Marinesu,D.C. and G.M. Marinesu, 2004. Approaching Quantum Computing. Prentice Hall, Upper Saddle River, NJ. [4].Vishal, S., 2007. Quantum Computing. Tata McGraw Hill, Delhi. [5] S. Abramsky, High-level methods for quantum computation and information, in: Proceedings of the 19th Annual IEEE Symposium on Logic in Computer Science, pp. 410 414. [6].Rodney Doyle Van Meter III. Architecture of a Quantum Multicomputer Optimized for Shor s Factoring. PhD thesis, Keio University, 2006. available as a rxiv:quant-ph/0607065 [7].W. D ür and H.J. Briegel. Entanglement purification and quantum error correction.rep. Prog. Phys., 70:1381 1424, 2007 Copyright to IJIRCCE www.ijircce.com 6124