Easttom Quantum Computing Presentation
Easttom Quantum Computing Presentation
Easttom Quantum Computing Presentation
Chuck Easttom
Quantum Computing and
Cybersecurity
www.hackerhalted.com 1
This Presentation
www.hackerhalted.com 2
Concepts for Quantum Computing
• Superposition
• Wave Function
• Probabilistic
• Entanglement/Non-Locality
www.hackerhalted.com 3
Entanglement
1 1
0 0
0 0
0 0
1 1
1 1
What is a Qubit?
•
www.hackerhalted.com 5
Qubits
www.hackerhalted.com 6
Quantum Supremecy
www.hackerhalted.com 7
Branches of Quantum Computing
QKD Quantum
Computing
www.hackerhalted.com 8
Quantum Timeline
www.hackerhalted.com 9
Quantum Timeline
www.hackerhalted.com 10
Quantum Timeline
www.hackerhalted.com 11
Time Crystal
https://www.sciencealert.com/physicists-used-a-quantum-computer-to-show-
their-time-crystal-design-is-the-real-deal
www.hackerhalted.com 12
Quantum Comptuing Developments
www.hackerhalted.com 13
Decoherence
In addition to the external environment, the system itself can be an issue. For example, the
physical equipment needed for things like implementing quantum gates, is constructed of
atoms and particles that have quantum properties. In general, many systems are only able to
maintain coherence for a matter of microseconds to a few seconds
www.hackerhalted.com 14
Decoherence
www.hackerhalted.com 15
Decoherence
Intel uses cryogen-free dilution refrigerator systems from specialist Blufors (A Finnish
company specializing in supercooling). This works in stages cooling more at each stage.
They use a mixture of Helium isotopes as the refrigerant.
www.hackerhalted.com 16
Quantum Threshold
There is some debate on what that threshold his, but at least down to 1%
and some say 0.1%
www.hackerhalted.com 17
Physical Implementations
• Electron on Helium
• Photons
• Trapped Ion
• Bose Einstein Condensate
• Diamond Nitrogen Vacancy Defect
www.hackerhalted.com 18
Shor’s Algorithm
Peter Shor was awarded the Gödel Prize of the ACM and a MacArthur
Foundation Fellowship in 1999
www.hackerhalted.com 19
Quantum and Cybersecurity
RSA – Factoring
DH – Discrete Logarithm
ECC - The discrete logarithm problem with respect to an elliptic curve.
www.hackerhalted.com 20
Quantum Computing and Cryptocurrency
www.hackerhalted.com 21
Post Quantum Cryptography - NIST
www.hackerhalted.com 22
Post Quantum Cryptography - NIST
Asymmetric Cryptography
• Classic McEliece Alternate Public Key
• CRYSTALS-KYBER BIKE
• NTRU FrodoKEM
• SABER HQC
NTRU Prime
Digital Signature SIKE
• CRYSTALS-DILITHIUM
• FALCON Alternate Digital Signature
• Rainbow GeMSS
Picnic
SPHINCS+
www.hackerhalted.com 23
Post Quantum Cryptography - NIST
www.hackerhalted.com 24
Quantum computing and searching
• Grovers algorithm
www.hackerhalted.com 25
Quantum Computing and Machine Learning
www.hackerhalted.com 26
Questions
Questions??
www.hackerhalted.com 27