74 Matching Annotations
  1. Jul 2020
    1. Moore’s Law-

      Moore's Law is the difficulty in increasing the overall size of a system (like an organism) because surface area increases slower than volume, thus the total available input needs to account for a lot more volume and needs to have a more complex transport system.

    2. The horizontal axis is the length of the number to be factored. The steep curve is nFS, with the marked point at L = 768 requiring 3,300 CPu-years. The vertical line at L = 2048 is nIST’s 2007 recommendation for RSA key length for data intended to remain secure until 2030. The other lines are various combinations of quantum computer logical clock speed for a three-qubit operation known as a Toffoli gate (1Hz and 1MHz), method of implementing the arithmetic portion of Shor’s algorithm (bCDP, D, and F), and quantum computer architecture (nTC and AC, with the primary difference being whether or not long-distance operations are supported). The assumed capacity of a machine in this graph is 2L2 logical qubits. This figure illustrates the difficulty of making pronouncements about the speed of quantum computers.

      The kind of architecture utilized by the quantum computer makes a HUGE difference in how fast the execution of the algorithm will be.

    3. guarding against loss of fragile quantum data

      If there is a way to protect against this, it would greatly appease the very skeptical author from before.

    4. General-purpose quantum computers capable of efficiently solving difficult problems will be physically large, comprising millions or possibly billions of quantum bits in distributed systems.

      I'm guessing this may be compressed, like how supercomputers used to be giant and now can fit on a phone.

    5. Structurally, when built, a “quantum computer” will in fact be a hybrid device, with quantum computing units serving as coprocessors to classical systems.

      So it basically uses quantum computing for very specialized tasks, while it's essentially a regular computer? (Sort of like how a GPU works). This might be what actually "replaces" classical computer, just including a separate chip that is good at calculating certain, specialized things

    1. in reducing the quantum bits at a practical level,

      Reducing the quantum bits enough would potentially make it possible to break the algorithm with the quantum computers that are currently avaialble today.

    2. Because of the parallelism achievable with quantum computers, many existing public key cryptographic sys-tems (ELGamal, RSA, ECC, etc.) are no longer secure.

      This is an interesting statement to say right after improving the algorithm responsible for this

    3. propose a new polynomial-time quantum algorithm for directly recovering the RSA plaintext M from the ci-phertext C without explicitly factoring the modulus n, and hence break the RSA public-key cryptosystem.

      A small but seemingly signiiicantly detail to skip in the original algorithm

    4. The new algorithm has the following properties: 1) recovering the RSA plaintext M from the ciphertext C without factoring n; 2) avoiding the even order of the element; 3) having higher success probability than Shor’s; 4) having the same complexity as Shor’s.

      An improvement on the well-known algorithm

    5. hor proposed a quantum polynomial-time integer factorization algorithm to break the RSA public-key cryptosystem

      I know well about Shor's algorithm now

    6. 2017

      One last really recently written article to show the advances that quantum computing has made recently. I most likely won't be able to fully understand most of this though.

    1. None of this entire article really means anything to me except that it is a way to decrease the error in quantum computing. This seems like it might be pretty poorly written too....

    1. This is an INCREDIBLY detail-oriented and dense paper about the exact way to improve quantum computing, but this is a really good recent and peer-reviewed paper.

    1. efresh the ancilla bits that are used to compute the syndromein order to achieve a reasonable transmission rat

      It is also bounded by resources and the error of not having enough repeaters or stations in the network

    2. it has a serious limitation: the signal becomes attenuated in thecommunication channel (such as an optical bre), andit cannot be ampli ed

      The security of perfect quantum algorithm is speed and bandwidth bounded, meaning it can't ever be really improved to be faster.

    3. If we could build such a devicereasonably soon, would it be useful? Would it have commercial potential?

      Do quantum computers today have commerical potential? IBM does have a quantum cloud server

    4. I feel that a deep understanding ofwhyquantum algorithms work is still lacking.

      Potentially they are still not completely understood to this day

    5. no quantumalgorithm can solve the problem faster than time of orderpN

      There must be a separate class of problems specifically for Quantum computers for P and NP.

    6. Grover's very clever method for search-ing an unsorted database (Grover 1996). In a database containingNitems, the oneitem that meets a speci ed criterion can be found with a quantum computer in a timeof orderpN. On a classical computer, the database search would take a time of orderN,

      Grover's algorithm is one that can find an item in an unsorted database in sqrt(N)??? Crazy

    7. et sometimes we save much e ortby invoking the brute force method rather than the one that requires exceptionalcleverness

      The idea of over-engineering

    8. I do not expect factoring to be one of the most important applications ofquantum computing

      So far it seems like it still may be one of the most important applications today, especially with the increased focus on cryptography

    1. The author's argument is that the error inherent in the quantum computers of today are so egregious that there is no way that it will be feasible and profitable in the near future

    1. This will cause both Person Aand Person B to have different values fortheir secret keys. As a check for eaves-dropping, Persons A and B can compare

      like tamper-evident packaging

    2. quantum parallelism

      like regular parallelism in computing, but quantum computing forces you to do operations on entire superpositions instead of single values

    3. represents both zero and one simultane-ously, and therefore exists in multiplesstates at the same time.

      this is why quantum computers can't really be used like regular computers

    4. that the two parti-cles had opposite spins

      kind of like two gears spinning together, you know that they always spin opposite even if you don't know the spin of one of them

    5. he article begins with anoverview of three quantum theory con-cepts: superposition, entanglement, andthe measurement problem.

      Already read articles about most of these quantum phenomena

    1. ll potential com-putation paths are taken simultaneously in a single piece of hardware, in accord with thesuperposzti.on principleof quantum mechanics

      superpositions contain all possible positions and states of a particle

    2. That no quantum computer has yet been built should not be considered more fundamen-tal an issue than was the fact that no classical computers existed when Turing set forth hismodel of computation

      outdated. many quantum computers have now been built

    3. actable problems should be broadened to include thosethat can be solved in expected polynomial time by probabilistic machines

      Quantum computing superpositions and randomness give way to more possibly polynomial algorithms for problems

    4. quantum cryptography [3, 4, 8], which exploits Heisenberg's uncertaintyprinciple to establish a communications channel on which undetected eavesdropping is im-possible even if the eavesdropper has unlimited computing power, indeed even if she hasaquantum computer at. her disposal

      So quantum computing CAN be used to be resistant to other quantum computing. (everyone needs QC to be safe eventually?)

    5. ut they becomevulnerable if their keys are exchanged with public-key techniques

      Things can be indirectly affected because RSA is used by so much of the current system

    6. Richard Fevnman

      One of the greatest "explainers" of his time. I once watched a video of him explaining how a train stayed on the tracks when making turns. It was really cool