Quantum Computation and Information Security
Offered By: YouTube
Course Description
Overview
Syllabus
Intro
Secure Communication
RSA encryption Ron Rivest, Adi Shamir, and Leonard Adleman - Choose two prime numbers and multiply
How hard is factoring?
Thought experiment: Schrodinger's Cat
1 hour later, the cat is 50% dead
50% alive, 50% dead
Introducing the quantum bit (qubit)
A Qubit is in a complex state, with infinite possibilities
Building a Qubit
Aside on cryptography • Alice and Bob want to communicate
Polarizing Light
Represent Bits as Polarized Light
Measuring Photons
Quantum Key Distribution
What about eavesdropping?
Key Validation
Classical computers can be built from NAND gates only
Quantum Computers can be built from CNOT gates and single-qubit operators
Experimental demonstration of 2 qubits
Factoring N=15: Construct a function
Factoring N=15: Find the period
Factoring N=15: Apply QFT
Factor 15: Find the factors
How fast is Shor's algorithm?
Summary
Related Courses
Improve Cybersecurity Skills with CTFs - PicoCTF Walkthrough (2018)freeCodeCamp Stanford Seminar - How Not to Generate Random Numbers
Stanford University via YouTube Master SAML 2.0 with Okta
Udemy Public Key Encryption and New Methods of Crypto
The Cyber Academy via YouTube Homomorphic Encryption - Nick Gonella
White Hat Cal Poly via YouTube