An Introduction To Quantum Algorithm
An Introduction To Quantum Algorithm
Ritajit Majumdar
MTech 2nd Year
Roll Number : 97/CSM/140001
Registration Number : 0029169 of 2008-2009
Quantum Algorithm
1 / 23
Introduction
Lets Go Quantum
So what Now????
Quantum Algorithm
2 / 23
Introduction
Introduction
Lets Go Quantum
So what Now????
Quantum Algorithm
3 / 23
Introduction
Factorisation is hard
Quantum Algorithm
4 / 23
Introduction
Factorisation is hard
Quantum Algorithm
4 / 23
Introduction
r
x r (mod N)
0
1
1
2
2
4
3
8
4
1
5
2
6
4
7
8
8
1
...
...
Quantum Algorithm
5 / 23
Introduction
r
x r (mod N)
0
1
1
2
2
4
3
8
4
1
5
2
6
4
7
8
8
1
...
...
Quantum Algorithm
5 / 23
Introduction
r
x r (mod N)
0
1
1
2
2
4
3
8
4
1
5
2
6
4
7
8
8
1
...
...
Quantum Algorithm
5 / 23
Introduction
Quantum Algorithm
6 / 23
Lets Go Quantum
Introduction
Lets Go Quantum
So what Now????
Quantum Algorithm
7 / 23
Lets Go Quantum
FN =
1
N
1
1
..
.
1
w
w2
..
.
1
w2
w4
..
.
1
w3
w6
..
.
1 w N1 w 2(N1) w 3(N1)
...
1
. . . w N1
. . . w 2(N1)
..
..
.
.
2
. . . w (N1)
Hence FNij is w ij
Quantum Algorithm
8 / 23
Lets Go Quantum
Quantum Parallelism
1 1
1
1
0
1 i 1 i 1
F4 |1i = 21
1 1 1 1 0 =
1 i 1 i
0
=
1
2
1
1 i
2 1
i
Quantum Algorithm
9 / 23
Lets Go Quantum
Quantum Parallelism
Let N = 4 w = exp(i 2 ) = cos( 2 ) + i.sin( 2 ) = i
T
Consider state |1i = 0 1 0 0
0
1 1
1
1
1
i
1
i
1
F4 |1i = 21
1 1 1 1 0 =
0
1 i 1 i
=
1
2
1
1 i
2 1
i
Inference
Quantum Fourier Transform produces an equal superposition of all the
basis states
Ritajit Majumdar (CU)
Quantum Algorithm
9 / 23
Lets Go Quantum
The Algorithm
Shor Algorithm
Choose q such that N 2 q < 2N 2 where q = 2d
Start with 2 quantum registers |a, 0i
QFT
|a, 0i
1
q
Pq1
r =0
|r , 0i
Quantum Algorithm
10 / 23
Lets Go Quantum
The Algorithm
Shor Algorithm
Choose q such that N 2 q < 2N 2 where q = 2d
Start with 2 quantum registers |a, 0i
QFT
|a, 0i
1
q
Pq1
r =0
|r , 0i
Quantum Algorithm
10 / 23
Lets Go Quantum
The Algorithm
Shor Algorithm
Choose q such that N 2 q < 2N 2 where q = 2d
Start with 2 quantum registers |a, 0i
QFT
|a, 0i
1
q
Pq1
r =0
|r , 0i
Quantum Algorithm
10 / 23
Lets Go Quantum
The Algorithm
Shor Algorithm
Choose q such that N 2 q < 2N 2 where q = 2d
Start with 2 quantum registers |a, 0i
QFT
|a, 0i
1
q
Pq1
r =0
|r , 0i
Quantum Algorithm
10 / 23
Lets Go Quantum
The Algorithm
Shor Algorithm
Choose q such that N 2 q < 2N 2 where q = 2d
Start with 2 quantum registers |a, 0i
QFT
|a, 0i
1
q
Pq1
r =0
|r , 0i
Quantum Algorithm
10 / 23
Lets Go Quantum
The Algorithm
Shor Algorithm
Choose q such that N 2 q < 2N 2 where q = 2d
Start with 2 quantum registers |a, 0i
QFT
|a, 0i
1
q
Pq1
r =0
|r , 0i
Quantum Algorithm
10 / 23
Lets Go Quantum
The Algorithm
Shor Algorithm
The first register is in state - 1 q
P qr 1
j=0
1
r
Pr 1
k=0 w
kl
|j.r + li
|k. qr i
q
r
Quantum Algorithm
11 / 23
Lets Go Quantum
The Algorithm
Shor Algorithm
The first register is in state - 1 q
P qr 1
j=0
1
r
Pr 1
k=0 w
kl
|j.r + li
|k. qr i
q
r
Quantum Algorithm
11 / 23
Lets Go Quantum
The Algorithm
Shor Algorithm
The first register is in state - 1 q
P qr 1
j=0
1
r
Pr 1
k=0 w
kl
|j.r + li
|k. qr i
q
r
Quantum Algorithm
11 / 23
Lets Go Quantum
The Algorithm
Shor Algorithm
The first register is in state - 1 q
P qr 1
j=0
1
r
Pr 1
k=0 w
kl
|j.r + li
|k. qr i
q
r
Quantum Algorithm
11 / 23
Lets Go Quantum
The Algorithm
Shor Algorithm
The first register is in state - 1 q
P qr 1
j=0
1
r
Pr 1
k=0 w
kl
|j.r + li
|k. qr i
q
r
Quantum Algorithm
11 / 23
Lets Go Quantum
The Algorithm
Shor Algorithm
The first register is in state - 1 q
P qr 1
j=0
1
r
Pr 1
k=0 w
kl
|j.r + li
|k. qr i
q
r
Quantum Algorithm
11 / 23
Introduction
Lets Go Quantum
So what Now????
Quantum Algorithm
12 / 23
RSA is insecure
Run time of Shor algorithm : O((log N)2 (log log N)(log log log N))[1]
Quantum Algorithm
13 / 23
Quantum Algorithm
14 / 23
Quantum Algorithm
14 / 23
Quantum Algorithm
14 / 23
Quantum Algorithm
14 / 23
Quantum Algorithm
15 / 23
A recent paper published on February 18, 2016 claims that Symmetric Key
Ciphers can be broken in (n) time using Simons Algorithm[4]
Quantum Algorithm
15 / 23
So what Now????
Introduction
Lets Go Quantum
So what Now????
Quantum Algorithm
16 / 23
So what Now????
Quantum Cryptography
BB84 Protocol
Use two conjugate basis |+i = {, } and |i = {%, -} to establish a
secret key between two parties at a distance[3]
Quantum Algorithm
17 / 23
So what Now????
Quantum Cryptography
Quantum Algorithm
18 / 23
So what Now????
Quantum Algorithm
19 / 23
So what Now????
Acknowledgement
Quantum Algorithm
20 / 23
So what Now????
Reference
[1] Peter W Shor. Algorithms for quantum computation: Discrete logarithms and
factoring. In Foundations of Computer Science, 1994 Proceedings., 35th Annual
Symposium on, pages 124 134. IEEE, 1994
[2] Vandersypen et al. Experimental realization of Shors quantum factoring
algorithm using nuclear magnetic resonance. Nature 414, 883-887 (20 December
2001)
[3] Charles H Bennett. Quantum cryptography: Public key distribution and coin
tossing. In International Conference on Computer System and Signal Processing,
IEEE, 1984, pages 175 179, 1984
[4] Kaplan et al. Breaking symmetric cryptosystems using quantum period
finding. arXiv:1602.05973, 2016
[5] Monz et al. Realization of a scalable Shor algorithm. Science 04 Mar 2016:
Vol. 351, Issue 6277, pp. 1068-1070
Ritajit Majumdar (CU)
Quantum Algorithm
21 / 23
So what Now????
Image Courtesy
Boromir: generator-meme.com/meme/one-does-not-simply/
Shor: www-math.mit.edu/shor/
Batman: bgr.com/2015/08/07/batman-movies-dc-ben-affleck/
Boromir facepalm: generator-meme.com/meme/own/
Grumpy cat: www.dailymail.co.uk
Quantum Algorithm
22 / 23
So what Now????
Quantum Algorithm
23 / 23