Cryptography and Quantum Computing
Quantum mechanics: A term used heavily in pop culture to represent extremely complicated and state-of-the-art technology. “Quantum computing” is computation performed using a computing device based on the strange, counter-intuitive physical properties of matter at a very small scale, known as quantum mechanics. Unlike a traditional computer-based on transistors that work with data in binary digits (or “bits”) that can only be a “1” or a “0”, a quantum computer uses bits where a single qubit is able to encode itself as more than two states. The actual science behind it is too complicated for me to get into or even understand fully myself. The technology is starting to get more and more used in cryptography. “Quantum cryptography” is the science of exploiting quantum mechanical properties to perform cryptographic tasks. A prime example of this is “quantum key distribution”, which enables a secret cryptographic key to be shared between two remote parties such that any interception can be reliably detected.
Old Cryptography methods vs new (quantum):
The public-key cryptosystems that we use today are based on certain hard mathematical problems. To combat these limitations, quantum technology is being used to decrypt and encrypt bits. Many universities, companies, and government agencies around the world are racing to do this, using a variety of different experimental techniques – some techniques may turn out to be more viable than others, or have specific properties that are useful for certain classes of application. It is possible to create algorithms that run significantly faster on a quantum computer than a classical computer, due to the unique properties of quantum bits. These algorithms could be used for a number of different scientific and business applications and will bring many benefits. Some of these algorithms have already been tested and proven on prototype quantum computers, but will not be practically useful or economical until larger quantum computers have been built.
An illustration to visualize the comparison:



Comments
Post a Comment