YoVDO

Quantum Computation and Information Security

Offered By: YouTube

Tags

Conference Talks Courses Shor's Algorithm Courses Quantum Key Distribution Courses Schrödinger's Cat Courses RSA Encryption Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore quantum computation and its implications for information security in this 42-minute conference talk from CYPHERCON15. Delve into secure communication concepts, including RSA encryption and the challenges of factoring. Examine thought experiments like Schrödinger's Cat to introduce quantum bits (qubits) and their complex states. Learn about building qubits, polarizing light, and quantum key distribution. Compare classical computers built from NAND gates to quantum computers using CNOT gates and single-qubit operators. Witness an experimental demonstration of 2 qubits and understand Shor's algorithm for factoring numbers. Gain insights into the speed and potential impact of quantum algorithms on current encryption methods.

Syllabus

Intro
Secure Communication
RSA encryption Ron Rivest, Adi Shamir, and Leonard Adleman - Choose two prime numbers and multiply
How hard is factoring?
Thought experiment: Schrodinger's Cat
1 hour later, the cat is 50% dead
50% alive, 50% dead
Introducing the quantum bit (qubit)
A Qubit is in a complex state, with infinite possibilities
Building a Qubit
Aside on cryptography • Alice and Bob want to communicate
Polarizing Light
Represent Bits as Polarized Light
Measuring Photons
Quantum Key Distribution
What about eavesdropping?
Key Validation
Classical computers can be built from NAND gates only
Quantum Computers can be built from CNOT gates and single-qubit operators
Experimental demonstration of 2 qubits
Factoring N=15: Construct a function
Factoring N=15: Find the period
Factoring N=15: Apply QFT
Factor 15: Find the factors
How fast is Shor's algorithm?
Summary


Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube