quantum cryptography syllabus
Both the quantum computation and the quantum cryptography are important for national security. Course Syllabus Winter 2020. Be armed with a fundamental toolbox for understanding, designing and analyzing quantum protocols. This interdisciplinary course is an introduction to the exciting field of quantum cryptography, developed in collaboration between QuTech at Delft University of Technology and the California Institute of Technology. Week 5: Quantum algorithms. But in the case of quantum data, there's an obstacle called the no-cloning theorem. Prerequisites: this course assumes a solid knowledge of linear algebra and probability at the level of an advanced undergraduate. The Shor's factoring algorithm (period finding, quantum Fourier transform) and the Grover search algorithm (entangled data base, oracle) will be introduced. Prerequisites: PHYS 225, PHYS 324 or 315, MATH 308 or the quivalent. Physical implementations of qubits (NMR, trapped ions, neutral atoms, superconductors, quantum dots, linear optics) will also be described. The evaluation will be based on weekly homeworks (50% of the grade) and a final project (50% of the grade). The course is aimed at upper-level undergraduate students in physics, engineering and math programs. -2. Week 4: Quantum computing architectures. Week 6: Physical realizations of qubits. We start with a brief review of the relevant topics of quantum mechanics (superposition, eigenstates, unitary operators, measurement, two-level system, Rabi flopping) and information theory (data representation, bits, logic gates, Shannon theorem), followed by the description of qubits (quantum bits) and entanglement, the building blocks of a quantum computer. The syllabus for this week is this; first, we are going to consider an algorithm for quantum data transmission or teleportation. Quantum Cryptography courses from top universities and industry leaders. Week 8: Cryptography, quantum key distribution; teleportation. Understand quantum key distribution protocols. Week 1: Brief review of qunatum mechanics; qubits and their representations. The state of the art experiments, as well as the commercially available quantum cryptography systems (MagiQ, id Quantique) will be described. Student talks. Required text: "A Short Introduction to Quantum Information and Quantum Computation" by M. Le Bellac (Cambridge University Press, 2006). Fundamental ideas of quantum cryptography, Cryptographic concepts and tools: security definitions, the min-entropy, privacy amplification, Protocols and proofs of security for quantum key distribution, The basics of device-independent quantum cryptography, Modern quantum cryptographic tasks and protocols, Fundamental concepts of quantum information: pure and mixed quantum states, the partial trace, classical-quantum states, generalized measurements, Encrypting quantum bits with the quantum one-time pad, Separable states, entangled states and purification, Sharing a classical secret using quantum states, Looking ahead to quantum key distribution: verifying entanglement using a Bell experiment, What it means to be ignorant: trace distance and its use in security definitions, Uncertainty principles as a guessing game, Randomness extraction using two-universal hashing, A construction of two-universal hash functions, Introduction to key distribution: the challenge of being correct and secure, Warmup: Security against a classical eavesdropper, E91 Protocol: purifying protocols using entanglement, Quantum key distribution: definitions and concepts, Introduction to device-independent quantum cryptography, Security of device-independent quantum key distribution against collective attacks, Two-party cryptography: bit commitment and oblivious transfer, A simple protocol for bit commitment in the noisy-storage model, A universal primitive: weak string erasure, Position verification from weak string erasure, Secure computations on a remote quantum computer. Learn how quantum communication provides security that is guaranteed by the laws of nature. Tentative schedule: Week 1: Brief review of qunatum mechanics; qubits and their representations. By comparing measurements of the properties of a fraction of these photons, the two endpoints can determine what the key is … The Quantum Computation and Quantum Cryptography is a one-quarter course which focuses on the principles and ideas of the new paradigm for storing and manipulating information using quantum mechanical systems. For the final project, you will have a choice of either preparing a 10-minute PowerPoint presentation or writing a 5-page report on the topics of quantum computing and cryptography, especially the latest experimental results and developments. You all got used to the simplicity with which we can transfer and copy classical data. Learn Quantum Cryptography online with courses like Introduction to Applied Cryptography and The Introduction to Quantum … The former can be employed to time-efficiently break commonly used Internet public-key encryption methods, such as the RSA code. This interdisciplinary course is an introduction to the exciting field of quantum cryptography, developed in collaboration between QuTech at Delft University of Technology and the California Institute of Technology. Please contact me if you're missing any of the required course, but really-really want to take this one! Understand how untrusted quantum devices can be tested. It also includes gradings for homework, midterm and final exam. Next, the principles of quantum communication (Alice and Bob, single photon sources and detectors, entangled photons, teleportation, dense coding) and quantum cryptography (BB88 protocol, decoy states, privacy purification, eavesdropper effects) will be outlined. For the more computer-science inclined types, suggested text is "Quantum Computer Science" by N. David Mermin (Cambridge University Press, 2007). I would like to receive email from CaltechX, DelftX and learn about other offerings related to Quantum Cryptography. Be familiar with modern quantum cryptography – beyond quantum key distribution. Quantum Computation and Quantum Cryptography. Syllabus. Week 2: The entanglement. This interdisciplinary course is an introduction to the exciting field of quantum cryptography, developed in collaboration between QuTech at Delft University of Technology and the California Institute of Technology. This section contains introduction to the theory and practice of quantum computation. Optional readings can be found in the textbooks denoted by KL and AC in the syllabus below. Week 7: Quantum information. Quantum Computation and Quantum Cryptography. Assistant Professor, Computing and Mathematical Sciences, Pursue a Verified Certificate to highlight the knowledge and skills you gain, Basic quantum information theory, including qubits, unitaries and measurements (optional videos will provide additional support for those new to quantum information).
Mary Seacole Film, Habanero Grilled Chicken, What Is Evidence-based Policy Making, Greater Sooty Owl Vs Lesser Sooty Owl, Heirloom Seeds Definition, Natchez Trace Guide, Buy Tinned Tomatoes In Bulk, Chicken Fiesta Salad Recipe, Purple Tomato Plants For Sale, Air Fryer Carrot Cake, Deuteronomy 29 Nkjv,