Research Aim
The laws of physics and quantum mechanics are used for initializing the faster computation of the problems which is known as quantum computing. The faster growth of the technology requires the faster capabilities of the quantum computation resources. The quantum computing is the computation process which makes use of photons for the transfer of information from sender and receiver. The confidentiality and accuracy of the information can be effectively managed by using the fundamentals of quantum mechanics. The quantum bits are designed for initializing the encoding and decoding process of digital states of the data. The operations on the operands are performed by using the quantum gates and qubit states. The two mode logic gates are used for transforming the information such as XOR gate. The polarization process of the electron is emphasised to develop the splitting of the photons into two. The 0 and 1 bit is allotted to the photons. In this paper, we will carry over research on the mechanism used in quantum computing for performing the operations and the quantum cryptography which is used for the secure transmission of the information.
The aim of the research is to focus on the mechanism and working functionality of the quantum computing and how it is useful in securing the transmission of information over the network.
The objectives of the research are to focus on the following areas:
- Introduction to the quantum computing
- Principles used for quantum computing
- Quantum cryptography
- Mechanism of quantum computing operation
What is quantum computing?
How quantum computing is different from the classical computing?
What is the mechanism used in completing the operation on the quantum computing?
How the information can be kept secured in the quantum computing?
What are the principles used for developing the quantum computing?
The literature review is conducted for finding out the facts and information related to the quantum computers and computational process. The quantum computing is the newest technology which is the boon for managing the limitation of classical computation process (Sharma, 2015). It helps in managing the secure transmission of the information over the network. The classical computing is based on one-bit information represented by the value 0 and 1 whereas the quantum computing is based on two state system which is used for representing one bit state such as 00, 01, 10, and 11 (Walker, 2015). The spinning of the photons helps in representing the state of the bit value. The process of polarisation is used for splitting of the photons into two state and increasing their momentum. The arithmetic operations are performed on the qubits for analysing the superposition value of the bit. The 0 and 1 vectors are used for representing the linear combination which is known as probability amplitude. The qubit is measured on the basis of probability amplitudes which is used for satisfying the equation |a|2 +|b|2 =1
Research Objectives
If the value of the probability amplitude is calculated as 1 / √2 than the vector state can be calculated by squaring the value of the probability amplitude which is equal to 1 /2. The four state of the qubits can be developed by using the qubit super position state. Similarly when the qubit value will be 1 than the superposition value will be n2. In quantum computing system, the number of four alternatives will be generated from the two state qubits which helps in increasing the flow of computational process. The concept of probability is used for solving the computational operations which helps in reducing the time complexity.
The difference between the classical computing and the quantum computing can be analysed by developing a Quantum Turing Machine (QTM) and Probabilistic Turing Machine (PTM) (Kilor, and Soni, 2015). The state transition diagram for PTM is shown below
(Source: Walker, J. (2015). Quantum computing a high level overview.)
(Source: Walker, J. (2015). Quantum computing a high level overview.)
(Source: Walker, J. (2015). Quantum computing a high level overview.)
It can be concluded that the binary digit 1 will be provided to the probability of 11/36 whereas the binary digit 0 will be provided to the probability of 25/36.
On comparing it with QTM, as we have discussed before If the value of the probability amplitude is calculated as 1 / √2 than the vector state can be calculated by squaring the value of the probability amplitude which is equal to 1 /2 (Sharbaf, 2011). So therefore, the state transition diagram can be represented as for state 0
(Source: Walker, J. (2015). Quantum computing a high level overview.)
(Source: Walker, J. (2015). Quantum computing a high level overview.)
(Source: Walker, J. (2015). Quantum computing a high level overview.)
(Source: Walker, J. (2015). Quantum computing a high level overview.)
(Source: Walker, J. (2015). Quantum computing a high level overview.)
(Source: Walker, J. (2015). Quantum computing a high level overview.)
The operations performed in the quantum computing can be represented in the form of matrices and vectors. The value of Vector 0 is represented as and the value of vector 1 can be represented as . The two * two matrix is designed for the one qubit which can be represented as follows:
(Source: Walker, J. (2015). Quantum computing a high level overview.)
(Source: Walker, J. (2015). Quantum computing a high level overview.)
The four alternatives can be generated from the q-bits which helps in increasing the operational capabilities of the processor (Alleaume, 2007). The RSA encryption algorithm is used for designing the architecture of q-bit probability system.
Research questions
“The designing of the quantum computing architecture depends upon three principles which are categorised as entanglement, photon polarisation generation process, and uncertainty rule” (Avaliani, 2012). The laser beam is used for splitting the photons into different photons. This process is known as entanglement. The entangled photons are used for analysing the presence of the eavesdropper. It helps in securing the path of the communication process. The process of polarisation operation is used for generating the probabilistic matrix for accelerating the operational capability of the quantum computing. The uncertainty laws are developed for finding out the relationship between the photons.
The quantum cryptography is used for securing the transmission of the data over the network. The secret keys are developed by generating the probability matrix to create the One time Pad (OTP). The speed of the photons is used for allocating the value of the 0 and 1 (Gruska, 2012). The BB84 is the algorithm used for filtering the flow of photons between the terminals of the computer networks. The light devices are installed for generating the laser beam to split the photons into two entangled photons. The information can be kept secured by determining the probability of the q-bit states. The point to point flow of information can be managed by q-frames (Bhatia and Sumbaly, R2014).
The analysis of the literature review helps in finding out the conclusion that the efficiency of the quantum computer is more capable of classical computing. The probability of reducing the loss of data confidentiality can be reduced to about 60% which helps in optimising the working efficiency and operational capability of the quantum computing. The sequence of random number is used for developing the OTP using the polarised photons. The secret keys for encryption and decryption are created by using the twisted laser beam. The two state communications of the photons is used for managing the privacy and accuracy of the information. The momentum is used for creating the value of the q-bit for analysing the 0 or 1 state. The quantum key distribution procedures are used for defining the pairing of photons. The spinning of the photons helps in representing the state of the bit value. The process of polarisation is used for splitting of the photons into two state and increasing their momentum.
Conclusion
It can be concluded, that the quantum computing is advantageous over classical computing because it works on two state processes which are capable for presenting the 4-state of q-bits. The installation of the twisted light beam is advantageous to enhance the spatial distance between the q-bits. The arithmetic operations are performed on the qubits for analysing the superposition value of the bit. The probalistics amplitude is used for defining the vector state of the quantum bits. The process of polarisation operation is used for generating the probabilistic matrix for accelerating the operational capability of the quantum computing.
References
Alleaume, R. (2007). White paper on quantum key distribution and cryptography. Retrieved from https://www.secoqc.net/downloads/secoqc_crypto_wp.pdf
Avaliani, A. (2012). Quantum computers. Retrieved from https://arxiv.org/ftp/cs/papers/0405/0405004.pdf
Bhatia, P. and Sumbaly, R. (2014). Framework for wireless network security using quantum cryptography. International journal of computer networks and communication, 6(6). Retrieved from https://airccse.org/journal/cnc/6614cnc04.pdf
Gruska, J. (2012). Quantum Computing. Retrieved from https://www2.fiit.stuba.sk/~kvasnicka/QuantumComputing/Gruska_QC.pdf
Kilor, P., and Soni, P. (2015). Quantum cryptography: Realizing next generation information security. International journal of application or innovation in engineering and management, 3(2). Retrieved from https://ijaiem.org/volume3issue2/IJAIEM-2014-02-28-090.pdf
Sharbaf, M. (2011). Quantum cryptography: An emerging technology in network security. IEEE international conference on homeland security. Retrieved from https://ieeexplore.ieee.org/document/6107841/
Sharma, R. (2015). Quantum cryptography: A New approach to information security. Retrieved from https://pdfs.semanticscholar.org/d14c/88c8ba445e6b2c88ea6cf486a352d3fb1ecd.pdf
Walker, J. (2015). Quantum computing a high level overview. Retrieved from https://pages.mtu.edu/~jwwalker/files/cs5431-jwwalker-quantumcomputing.pdf