Purdue Builds Quantum-Computing Semiconductor 102
Bfaber writes: "According to EET, Purdue has created the first examples of quantum computing in a semiconductor. The story can be read here. Read the article for further links that include an audio interview."
Re:http://www.eet.com/story/OEG20010924S0101 (Score:2)
As for the article, itself, It looks like aninteresting development -- but I'm kinda disappointed that they're looking at a few years for the next substantive step.. At this rate, I may be retired by the time a 'real' quantum computer is produced.
The link is incorrect... (Score:5, Informative)
Try this one (http://www.eet.com/story/OEG20010924S0101) [eet.com]
Blah, blah. Lameness filter doesn't like short posts so I'll put a little padding here. Sorry to ramble, but you know how it is...
Printable version (was Re:The link is incorrect..) (Score:1, Informative)
Need a mirror (Score:1)
Links (Score:4, Informative)
http://news.uns.purdue.edu/UNS/html4ever/010917.Ch ang.quantum.html [purdue.edu]
Tom.
Encryption... (Score:5, Insightful)
The effects of quantum cryptography is huge... Using a quantum computer would allow you to crack huge keys (everything from PGP, RSA, DES, TwoFISH, BlowFISH, etc.... anything you can think of) because of the essential basis of quantum physics...
Simply in laymen terms you can check muliple cases of a key (i.e. check 111111 and 111112) at the same time... Not just 2 keys but, how about 2 billion keys per second... This makes any key no matter how long easily crackable...
I promise you the NSA is up early this morning banging on doors at Purdue (hey the probably funded it anyway)....
Now don't fear... Even though it makes any code breakable it also inheriently creates an unbreakable code using the same theories...
So start writing all you stuff down and locking in a safe instead of encrypting it on your hard drive.... You data really isn't safe anymore...
Re:Encryption... (Score:2, Interesting)
Yes, but if this is now feasible, how long before this technology will be available to the average member of the public (if at all).
this may be what governments have been waiting for. Easily crackable encryption for the public, and quantum encryption for the Top Brass, with the technology too expensive (or legislated against) for normal people
Re:Encryption... (Score:2, Insightful)
Looks like we've only got a couple of years of privacy left then...
Re:Encryption... (Score:1)
Standard (ie non-quantum) encryption for the masses and quantum encryption/decryption for the gov't (U.S. gov't preferrable, for me) would ensure the necessary level of privacy and security for citizens, and yet afford gov't with the necessary security and intelligence.
Just my thoughts. Flame away!
Re:Encryption... (Score:1)
This is all nice, until the government become the bad guy. How do you feel about other nations having the same quantuum decryption technologies?
- Steeltoe
Re:Encryption... (Score:1)
Okay... the other side of this...
Quantum encryption/decryption in the hands of MY government vs in the hands of the "bad guys". Same problem as any other technology (planes, missiles, nukes, satellite recon).
As far as being all nice until the government becomes the bad guy. I agree. But since quantum encryption isn't going to be prevented, I'd rather that my government have it and the population of my country try to keep my government in line. Which is a good reason for the right to bear arms. If the gov't gets too wacked out, the people can fight back.
Re:Encryption... (Score:1)
Re:Encryption... (Score:2, Insightful)
Acually, I don't think there are any published attacks for symmetric cyphers (most block and stream cyphers, if memory serves). The only published attack is Shor's famous factorisation algorithm. You're right that RSA is broken wrt quantum cryptography: it relies on the difficulty of factorisation (or synonymously, the difficulty of the discrete log).
AFAIK, all public key systems rely on the discrete log, whereas few (none that I know of) "private key" systems do.
This is not to say that there are no possible attacks on private key (symmetric) systems; there are just none published.
Dave
Re:Encryption... (Score:1)
Re:Encryption... (Score:1)
Re:Encryption... (Score:1)
Very interesting field, of course we all knew that anyway, but I'm not sure I'd want to go up against the NSA in any form these days.
Duck!
Re:Encryption... (Score:3, Insightful)
Of course what will it matter when there is a backdoor, and the only security is an Oracle agent smart card issued by the government?
Re:Encryption... (Score:2)
Quantum Cryptography is totally different (Score:4, Interesting)
Good reference - Brassard's Bibliography [mcgill.ca]
Re:Encryption... (Score:2)
Why? You might ask.
Because the NSA realizes that any quantum computer is going to be horribly expensive and complicated at least at first. They are perfectly happy to fund people looking for new ways to make qubits. Last I recall the largest quantum computer could sorta manage 7 qubits, but quantum cryptography will take hundreds if not thousands of qubits to be useful.
Hence the plan seems to be to throw money at people to get them to figure out how to build a scalable system and encourage publication to spur on research, and then go back to the ultra secure compound and spend oodles of cash making the system work. From what I know I'm pretty sure they don't have a useful system yet either, but it's not for lack of resources.
magnetic resonance (Score:1)
Experts confirm, correct, negate?!?!?
Re:magnetic resonance (Score:1)
The atom can be in any of these states
Re:magnetic resonance (Score:1)
I suppose the radiologists musts be grinning!
Re:magnetic resonance (Score:2)
As I understand it, the purpose of the large magnetic field in MRI is to force all the nuclear magnetic moments (which are directly related to nuclear spin states) into the same alignment. Then you study the emitted radiation when they relax into a normal normal configuration, or something like that.
In any case quantum computing depends on the entanglement between states which large applied magnetic fields would effectively destroy. So, my impression is that while MRI depends on the presence of distinct spin states, it doesn't concern itself with the type of spin interaction that quantum computing cares about.
PS The article talks about electron spin states, MRI uses nuclear spin states AFAIK. There are however serious attempts to create qubits with nuclear spins.
Re:Nice Nice (Score:1)
silicon is not the final frontier!
My bet is still on those biological protien-based computers. I am chemically biased towards them
Faster Perl (Score:1, Interesting)
if (any(@value) is very useful, but the inclusion into Perl 6 is (AFAIK) currently under RFC [develooper.com]. The thought of quantum Perl on a quantum computer makes me feel all tingley...
-- Dooferlad
Obsoletes planned crypto laws (Score:3, Insightful)
With quantum computers, the only way to do crypto would be transferring huge XOR mask keys physically (or possibly with quantum encryption channels). Pretty hard.
Re:Obsoletes planned crypto laws (Score:3, Interesting)
If you can quantum entangle two particles and move them apart, then doing something to one, has the same effect on the other. The trick is to keep them entangled for long enough, and far enough away, for this to be useful.
If you do manage to do it though, you will have a totally secure encryption channel (you can't snoop it) with no latency. Useful stuff...
-- Dooferlad
Re:Obsoletes planned crypto laws (Score:1)
Sounds great, but it's not going to be something 'off the shelf' or downloadable is it? Meanwhile whatever governmental agency (of whatever government) will be able to afford and use these things....
Re:Obsoletes planned crypto laws (Score:1)
As far I know this phenomenon is predicted by theory only and not (yet) by experiment. Secondly you can't 100% assure that it is unsnoopable, since we don't understand the physics below it. Maybe there is an yet unknown force that connects them, which creates an unknown field that can be snooped.
Beside the physical part, there is another criptrograic prolbem: transportation of the key. You've to transport -securly- the key to other side, without having it replaced. So also this hypothetical communication is only as sure as your key-transportation is, in example one could grap the container of your particle, replace it with his partice, and in his lab forwards all traffic from his second partice to your partice, and so is able to snoop.
Key distribution solved by Quantum, not hurt. (Score:2, Informative)
Somebody please correct the problems here. I don't really know what I am saying and am bound to be wrong in places.
-j
ResearchIndex cites and clarification (Score:3, Informative)
In the previous post, I wasn't quite clear (shoot me, it's 5am and I've been up all night): there are a couple of different methods that I was pulling information from. In the penultimate paragraph, the final sentence was an aside referring to a method of using entanglement to transfer the keys. The rest of the post was referring to a method using polarisations and Heisenburg. Here are the two links to the papers.
First, for the transfer by polarisations. If you are at Cal, then go ask Vazirani, it looks like he has coauthored with them: http://citeseer.nj.nec.com/bennett92experimental.
Then on the use of entanglement (they do not have the actual paper, bastards): http://citeseer.nj.nec.com/context/18763/0 [nec.com]
-j
Re:Obsoletes planned crypto laws (Score:1)
Re:Obsoletes planned crypto laws (Score:1)
Zero latency and Martian Quake (Score:1)
Moving away from the cryptographic arguments for just a moment, you could share a quantum entangled pair with your ISP. They could use pairs to replace current links, so you end up with a system which is only slowed down by switching latency. Just imagine a cross world (or even from here to Mars) link with zero latency... Martian Quake!
-- Dooferlad
Re:Zero latency and Martian Quake (Score:1)
Re:Obsoletes planned crypto laws (Score:4, Informative)
Two misconceptions here:
First, symmetric key encryption is still pretty good in the face of quantum computing. It isn't as good as it was. I think the difficulty factor goes down to the square root of the original difficulty factor. For a 256 bit key, that's sitll 2^128 operations to brute force it. That's pretty secure.
Second, quantum cryptography doesn't work the way you describe.
Quantum cryptography works by generating a truly random keystream using entangled particles. Since the particles are entangled, both people can get their own particle and know the state of the other person's particle. They can't alter the state of the other person's particle in any way, but they do know it.
This allows one-time pads to be securely exchanged over a distance. If someone listens in to the entangled particle stream, this irrevocably alters it, and when both sides compare a few (not all) of their shared random bits over an insecure channel, they can detect this snooping.
Quantum cryptography does NOT, I repeat, DOES NOT allow you to communicate with no latency. The speed of light applies to the particles in the entangled stream, and it applies to subsequent communications encrypted using the information in these particles. One particle of an entangled pair can only detect the collapse of the quantum wave function (i.e. when the particle is 'read') for the other particle. No other state changes can be detected by the other particle. No faster than light information exchange to see here people, move along.
Re:Obsoletes planned crypto laws (Score:1)
As for the latency / security thing, I am only going on at least second hand information and I sit corrected
-- Dooferlad
Re:Obsoletes planned crypto laws (Score:2)
That's presuming you have a known plaintext. That's usually not too hard to engineer, but with careful implementation, it should actually be very hard.
Re:Obsoletes planned crypto laws (Score:4, Informative)
I agree, but there is always a chance. Of course you could enter quantum plaintext which is trial encrypted by a quantum key and then retrieve it that way
Some useful background on Quantum Entanglement [qubit.org] and Quantum Communication [qubit.org] can be found at the Centre For Quantum Communications [qubit.org] for confused readers (like me).
-- Dooferlad
Re:Obsoletes planned crypto laws (Score:2)
I think you'll find that there are 2^256 possible keys in a 256-bit symmetric encryption system. This is a number substantially higher than 256
Re:Obsoletes planned crypto laws (Score:1)
Thanks for pointing that out *grin*. My theory still stands of course (probably to be debunked very soon by somebody who knows what they are talking about).
-- Dooferlad
New weakness (Score:2)
Phillip.
Re:New weakness (Score:2)
The random number generator uses quantum effects as well, so it is totally secure. One process, for example, generates random polarization states for pairs of photons. The photons are entangled, so the pair's polarizations are 90 degrees from eachother, but the actual polarization of the individual photons is truly random.
Re:Obsoletes planned crypto laws (Score:1)
It doesn't work that way dammit! (Score:2)
If you think of a series of coin flips being used to generate a key or one time pad, entanglement basically allows 2 coins to be made, such that when simultaneously flipped, they always land with opposite sides up. You can't control which side yours will land on, so you can't control which side the other will land on. You do know, however, that every time yours lands on heads, the other one landed on tails. So you and your friend each take a coin, and whenever you need to communicate, you both start flipping. One of you bitwise NOTs your data, then you encrypt and send the message. Your friend can then easily decrypt it with his key.
One pair of entangled particles can only be used for one flip, however. So if you want a real key, you need a continuous stream of entangled particle pairs from a single source. Small modifications to this system allow the easy detection of anyone eavesdropping on the entangled particle stream.
Re:It doesn't work that way dammit! (Score:1)
Re:Obsoletes planned crypto laws (Score:1)
Re:Obsoletes planned crypto laws (Score:2)
Yeah, and when I posted a question to PRZ [slashdot.org] about what we should do about it yesterday, somebody modded me a troll. If people like this highly relevant question to be asked to PRZ, somebody please go and mod me up again... :-)
Re:Obsoletes planned crypto laws (Score:2)
Only if you plan to be exchanging information with any John Doe out there. The Great Bogeyman that crypto laws seek to thwart would be a fool to use and publicly availble crypto system when so many other schemes are available and easily implementable.
Consider this: I WacknoNut-Laden, and I have a plan to blow up a large building with a commercial airline. Would I be discussing this with a large group of people or just my fellow WackoNuts? My guess is the former.
Now, would I feel safer downloading and using PGP/other available crypto system of choice, or would it look more innocent for me to exchange pictures of the homeland with my WackoNutPilotInTraining. Picture that are slightly scrambled because they have a embedded message XOR in that requires a five line perl script to extract, a script which is not saved but memorized and typed in each time it is needed. This gives an encrypted message that only WackoNutPilotInTraining2 can decipher. He must manually decode the first 19 bits of the encrypted message which tells him the article number on Slashdot to use as a one-time pad. Only three people in the world know this last system, and it was engineered in a deep cave somewhere in the most desolate part of a desolate country.
So, if you know being found out means your death, do you go with the publicly available system, or do you go with a system of your own design which depends on several levels of unfathonable and unwritten secrets.
Unbreakable cryptography amoung a small band is as easy as email. It's simple to devise a system that can't be broken with ANY amount of computing power. In fact it's easy to devise a system where the only weak link is some knowledge bearer's resistance to torture. (Sodium penethol is here considered torture)
Re:Obsoletes planned crypto laws (Score:1)
sorry - needed to make a lame post just for kicks
-Nano.
Clarification (Score:4, Interesting)
Quantum cryptography itself is not an algorithm as such, but a way of using the inherent uncertainty in the polarisation of photons to ensure completely private communication. There are some labs which claim to have such a scheme working, but it's a long way from becoming feasible on a large scale.
Basically, it works on the principle that observation changes the observed event. You can ensure a secure (non-eavesdropped) channel by makeing sure that every photon has arrived correctly. If an intruder has observed your message, then the message itself has changed (at the quantum level)! I'm really not sure how it all works either, but there is plenty of published work.
The other crypto-related quantum computing thing is Shor's algorithm. For a reasonably good explanation:
http://www.doc.ic.ac.uk/~nd/surprise_97/journal
In essence, factorisation of large numbers (which is an NP complete problem on conventional hardware) can be done really quickly. This threatens RSA, Diffie-Hellman etc (anything which relies on the non-factorability of products of large primes).
I expect there's a similar "quantum" attack on symmetric encryption schemes like IDEA and DES, which would just do very fast brute force searches on the key space.
Hope this clears up some misconceptions!
Re:Clarification (Score:1)
They don't know how hard factorizing numbers really is. They haven't proved anything, as far as I know. The best methods currently known are exponential, though; the Number Field Sieve is: People used to think that the older Multiple Polynomial Quadratic Sieve was asymptotically optimal.
earth-to-satellite quantum-cryptography (Score:2)
Basically, a team at Los Alamos in New Mexicio are hoping to send quantum photons accross 10 Km of dessert. If that works, it shouldn't be much more difficult to send secure data to and from a satellite in orbit (since most of the 'thick air' is below 10Km, if you can get it that far, the rest of the way is fairly easy)
All this was discussed in an old slashdot thread [slashdot.org]
Re:Clarification (Score:2)
AFAIK, the quantum attack on symmetric ciphers only reduces the complexity to the square root of it's original value. In other words, a 256 bit key still requires 2^128 operations to brute force with a quantum algorithm.
I suspect any problem that has a 'back door' (in the mathematical sense) that trivially solves it will have a quantum algorithm that runs in 'n', where 'n' is the number of bits in the number. Since the whole basis of public key cryptography is such back doors (the private key is the back door), quantum computing completely destroys public key cryptography.
the beginning of a revolution (Score:1)
--donabal
Decoherence (Score:5, Interesting)
Maybe the Purdue group will be able to shield their quantum dots from decoherence better than previous research on such objects has done so far. But as far as I know there is no getting around this; the best anyone can do is compute everything and read out your results before decoherence sets in.
This is not such a big breakthrough, folks. Hold onto your hats. If they can show that they can do operations much more quickly than old methods of dealing with quantum dots, or they can keep decoherence at bay longer than anyone expected, that would be the big breakthrough.
Re:Decoherence (Score:1)
What is worst about this system is that it looks very difficult to entangle a large number of qbits, which is very important since you many qbits for the calcuation, and many bits for the correction.
NMR is fairly hopeless as far as real compution is concerned for a similar reason; it is unlikely that one would be able to get much farther than a dozen qbits.
Hasn't this already been done? (Score:2, Funny)
Purdue... (Score:1)
AI (Score:1)
Dreams? (Score:1)
Some researchers have found that a neural net can indeed, in some circumstances dream.
Basically, you train it up to recognise faces or tin cans on a production line or whatever, and then you disconnect its inputs. This is equivilent to a human going to sleep. Then the middle layers of the network will drift from state to state, lingering for a time on the various memories it has stored as well as random stuff. This can be read out and displayed by the controling computer or program.
See this link [imagination-engines.com] for some more info.
Purdue? (Score:2, Funny)
Re:Purdue? (Score:4, Funny)
Probably to solve the chicken and egg problem.
To every one worried about encryption........ (Score:1)
and please tell me what Congress person whould have the balls to suggest infringing on an old-school right to privacy? people would look at censoring snail-mail like breaking down thier door at their home.
Re:To every one worried about encryption........ (Score:1)
So far they haven't proved that it is feasible to build a machine out of qubits, let alone an arbitrarily complex one, or one that is complex enough to perform real quantum calculations. Even then, we don't know if we can get qubit machines to calculate entanglement cryptography.
It is all hypothetical upon hypothetical upon one pair of qubits that have not been replicated in other research yet.
Re:To every one worried about encryption........ (Score:1)
Method:performance:power:viability (Score:4, Interesting)
Being able to understand the technicals of quantum computing, at best, only moderately well, and being remarkably bad at recalling them as anything more than vague and nebulous concepts, I am in no position to even attempt to compare the alternate approaches I have read about over the past several months, but I am wondering if anyone can either answer my questions here, or point me to an article that does. I'm not looking for immense detail; I'd rather just have an answer with basic supporting facts.
What I'm wondering:
One thing that caught my attention is that the quantum dots they used were 180 nm across. That's 0.18 microns, which is larger than current silicon chip lithography processes, which can etch at 0.13 microns, or 130 nm. I realise we're comparing apples and oranges, and that it is superposition (and entanglement, I think) that yields the real power of quantum processors, but I always imagined that a true quantum processor would have much smaller transistor and subsequently die sizes. I know they talk about going as small as 50 nm (0.05 micron), but iirc, IBM is researching (with some success, can someone pull the article?) similarly small lithography techniques for silicon chips too.
Any informed people in the slashdot community who can address these questions? Since I am writing a science fiction novel that integrates quantum computing, and I'd like it to be as realistic as I can potentially make it with educated guessing (hahaha, I hear you smirking already), I'd appreciate any help.
Re:Method:performance:power:viability (Score:2)
Quantum computing is no faster than current computation methodologies except for a certain class of problems that take advantage of the fact that a qubit, while not being measured, is not neccessarily in the "zero" state or "one" state, but is described by a state vector. By superposition the qubits can be in multiple states simultaneously. There are some problem solutions that can take advantage of this by basically performing multiple operations simultaneously.
So, while Shor's algorithm allows us to factor in polynomial time, I doubt your FPS in Quake III would be boosted on a quantum computer.
Re:Method:performance:power:viability (Score:1)
* is semi-conductor quantum computing any more viable in the long-term than whatever other vaporous methods are being investigated?
Well, that's sort of hard to say. It's not at all clear that there is a viable method for making a quantum computer. Certainly the Purdue work here is a long way from creating a quantum computer.
* how different is it in terms of the equipment required, and what would this mean for scalability?
Well, they don't have a method for fabricating any sort of computer (or even an xor or controlled not gate) out of these things, but you'd be lucky to run it at liquid helium temperatures (4K).
* which method of quantum computing would require the least power, and could be likely to be miniaturised the best? At the moment it seems the actual computing area is very small, but the equipment required to read output is inhibitively large
Well, I think with a quantum computer power consumption is not an issue, the question is whether you can create a computer with hundreds of qubits. There is also the problem that a quantum computer is an analog rather than a digital computer, so achieving the necesary precision is a challenge, to say the least.
* how fast, really , would a semi-decent quantum processor be, compared to a semi-decent silicon one? (This may seem like an ignorant or even trolling question, so I apologise in advance)
It's a good question. A quantum computer would be extremely slow. However, for a couple of problems (such as factorization of very large numbers), a quantum computer may be many orders of magnitude faster than a conventional computer.
The biggest issue (as I mentioned before) is that it is an analog computer, which means that unlike a digital computer, any small stray electromagnetic fields will introduce errors into the computation, which is quite a serious issue. My personal belief is that quite likely quantum computation is not possible, although I must admit that I haven't looked into it all that carefully. Certainly, switching to analog computing seems like a step backwards, and could be expected to put a practical limit on the size of such a computer, which may very well keep it from being useful.
Quantum computers don't *need* to be "faster" (Score:2)
Yes, it does sound uninformed, and the fact that you're asking it probably means you really know rather little about what quantum computers are really about. The paradox about quantum computers is that they don't need to be faster than their classical counterparts, and in fact, the most of the really promising methods, like the NMR bulk-spin resonance techniques for instance, are far, far slower. These methods based on nuclear spins have clock rates that are measured in kilohertz. Yes, mere thousands of cycles per second. If you use a quantum computer to do the same things a classical computer does, in the same way, you can expect no real improvement. The real advantage in using these computers, which is what makes such a computer "faster" than its classical counterparts is the new paradigm of computing the quantum models of computation allow: that of performing computations on superposed states.
For instance, if you had a register that contained 256 qubits, placed them in an equal superposition of 1 and 0, and performed some calculation on that register, you will have potentially produced 2^256 results, 10^77 or a hundred million million billion billion billion billion billion billion billion results, which is more results than the number of sub-atomic particles in the visible universe! Of course, once you measure your qubits you only get one of these innumerable results, but there are more subtle ways of measuring the qubits that will give you information common to all of the results. That's what all of these algorithms for quantum computers are about.
Essentially, if you had 256 qubits each running at 1 kHz, you would have 10^77 processors running at 1 kHz! Now wouldn't that be faster than any computer in the world if you could use it properly? It's like having a slow computer for every sub-atomic particle in the universe! What's needed now are algorithms that try to find structure in various problems that can exploit this sort of parallelism.
Shor's algorithm, for instance, is able to factor integers and compute discrete logarithms in arbitrary finite fields in O(n^2) time, by using a special technique (the quantum Fourier transform) to cause the results we aren't interested in to interfere destructively and so won't be measured when our superposition collapses. Grover's algorithm, which does unordered searches in O(sqrt(n)) time, leverages quantum parallelism in a similar way.
The real upshot, and a likely SF novel plot that involves quantum computers, comes from the fact that all public-key cryptography in widespread use today depends on the factoring (RSA) and discrete log (El Gamal and elliptic curve techniques) problems. These problems are thought to be intractable using a classical computer, but with Shor's algorithm and a large enough quantum computer, perfectly feasible. Obviously, no one has yet made a quantum computer with more than a handful of qubits (I believe seven qubits is the world record, meaning they could theoretically factor the number 126!), so these schemes are still quite secure. Other practical problems plague implementors. But if someone, somewhere, dreamed up a way to make quantum computing practical (i.e. making a quantum computer with thousands of qubits that could perform calculations stably), all public-key cryptography would fall apart. Whoever invented such a device could potentially break the root certificates of Verisign and other CA's, compute private keys, impersonate every e-commerce site in the world, read all PGP or S/MIME-encrypted email, forge all kinds of digital signatures, create bogus international banking transactions, and so on and so forth. Grover's algorithm would also increase the range of keys that can be feasibly brute forced for symmetric crypto (how much exactly depends on how fast your quantum computer is). Naturally, it would be a device intelligence agencies all over the world would kill to obtain. Ever see Sneakers?
If you're looking for more in-depth information that you can understand without a graduate degree in both physics and computer science (the way most of the preprints on lanl.gov tend to be), you can start by looking here [qubit.org].
Re:Method:performance:power:viability (Score:1)
Point of order... (Score:1)
Emphasis mine.
time for first bad karma (Score:1)
Re:time for first bad karma (Score:1)
Re:time for first bad karma (Score:1)
is this like TWINKLE? (Score:1)
if I recall correctly, that was shown to in fact not be a true quantum process but instead massively parallel.... but since I haven't read the perdue link yet, hard to say
Quantum Algorithms? (Score:1)