English

Quantum mechanics, the quantum computer

무기력한 공대생 2020. 9. 10. 15:22

Principle of the quantum computer 

A typical computer uses binary notation when processing data, and performs serial operations with a clear state of 0 and 1.

But quantum computers work on completely different principles. state overlay;

Use qubit that can be quantumly overlaid to perform parallel operations.

 

Quantum mechanics possible quantum superposition of state and the quantum entanglement, so they can perform operations that are not classically possible, or they can be computed at a groundbreaking speed than a typical computer.

 

 

 

Why are quantum computers difficult to commercialize?

The reason why quantum computers are still difficult to commercialize is that current technology makes it difficult to control quantum.

 

According to quantum mechanics, when quantum exists in the form of waves, In the process of protons being observed and being measured differently Influenced by minor intervention in the external environment, it cannot prevent the cubit from being modified.

 

Also, maintaining the principle of quantum mechanics requires enormous superconducting facilities and extremely demanding physical conditions.

 

The main material is a superconductor with an electrical resistance of zero at very low-temperature +vacuum close to absolute temperature,

But, Having superconducting facilities is not only very costly and consuming of electricity, but also needs to be equipped to maintain superconducting conditions.

As I said before, it should also block the deformation of the qubit by the intervention of the external environment.

 

The calculation speed of quantum computers is obviously fast. But even quantum computers can't solve all problems. The computational speed is faster than the average computer, but the problem that the average computer cannot solve is also difficult to solve. Not even faster than the current computer in every problem.

 

 

Let's take an example. If you have given you 50 jobs, and to solve this problem, a typical computer takes a certain amount of time because it processes data sequentially through serial operations. However, quantum computers do parallel operations, so the calculation speed is fast, but even if you enter a value and run it right away, the results will not come out immediately. If a quantum computer can do 50 things at once, but it takes longer to complete than a normal computer, people will not use a quantum computer but a normal computer.

 

As such, quantum computers show overwhelming computing power in certain functional areas, but sometimes it can be worse than a normal computer.

To overcome these limitations, it will be necessary to maximize the performance of qubits while developing techniques that meet the demanding conditions to maintain the principle of quantum mechanics.

As the number of qubits increases, the computing power of quantum computers is proportional to the number of qubits.

If you have 50 cubits, you have 2^49 utilization.

 

 

 

Security technologies in quantum computers

Quantum computation basically has a stochastic value based on the nature of the quantum, and if it has a stochastic value, it becomes difficult to pinpoint the exact location, resulting in an error.

A quantum algorithm technology called 'Shore Algorithm' is used to minimize these errors.

 

 

 

Shor's algorithm

It is a quantum algorithm that can process prime factorization.

proposed by Peter W. Shor, using the quantum Fourier transform.

 

Shore algorithm requires O (log3N) time and O (logN) storage space to decompose the number of N, which using this algorithm, public-key cryptography can be easily broken.

 

 

 

public-key cryptography

A common encryption method uses a single encryption key to encrypt and decrypt it, which is highly likely to leak because it is shared by multiple people.

 

But, Public-key cryptography allows users who do not share secret keys in advance to communicate safely. In the public-key cryptography, public-key and secret-key exist, and the public key can be known to anyone, but only the owner of the key must know the corresponding secret key.

 

 

 

 

+직접 자료 조사해서 영어 번역