Required text: "A Short Introduction to Quantum Information and Quantum Computation" by M. Le Bellac (Cambridge University Press, 2006). The Shor's factoring algorithm (period finding, quantum Fourier transform) and the Grover search algorithm (entangled data base, oracle) will be introduced. Assistant Professor, Computing and Mathematical Sciences, Pursue a Verified Certificate to highlight the knowledge and skills you gain, Basic quantum information theory, including qubits, unitaries and measurements (optional videos will provide additional support for those new to quantum information). The state of the art experiments, as well as the commercially available quantum cryptography systems (MagiQ, id Quantique) will be described. For the final project, you will have a choice of either preparing a 10-minute PowerPoint presentation or writing a 5-page report on the topics of quantum computing and cryptography, especially the latest experimental results and developments. Week 4: Quantum computing architectures. Week 1: Brief review of qunatum mechanics; qubits and their representations. Week 3: Quantum logic gates. This interdisciplinary course is an introduction to the exciting field of quantum cryptography, developed in collaboration between QuTech at Delft University of Technology and the California Institute of Technology. Week 2: The entanglement. Quantum Cryptography courses from top universities and industry leaders. Tentative schedule: Week 1: Brief review of qunatum mechanics; qubits and their representations. Be armed with a fundamental toolbox for understanding, designing and analyzing quantum protocols. I would like to receive email from CaltechX, DelftX and learn about other offerings related to Quantum Cryptography. Understand how untrusted quantum devices can be tested. The Quantum Computation and Quantum Cryptography is a one-quarter course which focuses on the principles and ideas of the new paradigm for storing and manipulating information using quantum mechanical systems. Quantum Computation and Quantum Cryptography. Prerequisites: this course assumes a solid knowledge of linear algebra and probability at the level of an advanced undergraduate. You all got used to the simplicity with which we can transfer and copy classical data. Quantum Computation and Quantum Cryptography. For the more computer-science inclined types, suggested text is "Quantum Computer Science" by N. David Mermin (Cambridge University Press, 2007). It also includes gradings for homework, midterm and final exam. Week 6: Physical realizations of qubits. Week 7: Quantum information. Week 8: Cryptography, quantum key distribution; teleportation. Quantum cryptography is a reality of today, with commercially-produced and marketed systems, while a quantum computer may well be a reality of tomorrow. By the end of the course you will Be armed with a fundamental toolbox for understanding, designing and analyzing quantum protocols. Next, the principles of quantum communication (Alice and Bob, single photon sources and detectors, entangled photons, teleportation, dense coding) and quantum cryptography (BB88 protocol, decoy states, privacy purification, eavesdropper effects) will be outlined. Prerequisites: PHYS 225, PHYS 324 or 315, MATH 308 or the quivalent. But in the case of quantum data, there's an obstacle called the no-cloning theorem. Student talks. Syllabus. The optional AC book, by Boneh and Shoup, is more advanced (and free) and is intended for students wishing to go deeper. Learn how quantum communication provides security that is guaranteed by the laws of nature. Quantum cryptography, or quantum key distribution (QKD), uses a series of photons (light particles) to transmit data from one location to another over a fiber optic cable. By comparing measurements of the properties of a fraction of these photons, the two endpoints can determine what the key is … The course is aimed at upper-level undergraduate students in physics, engineering and math programs. Both the quantum computation and the quantum cryptography are important for national security. The evaluation will be based on weekly homeworks (50% of the grade) and a final project (50% of the grade). This section contains introduction to the theory and practice of quantum computation. Course Syllabus Winter 2020. Learn Quantum Cryptography online with courses like Introduction to Applied Cryptography and The Introduction to Quantum … We start with a brief review of the relevant topics of quantum mechanics (superposition, eigenstates, unitary operators, measurement, two-level system, Rabi flopping) and information theory (data representation, bits, logic gates, Shannon theorem), followed by the description of qubits (quantum bits) and entanglement, the building blocks of a quantum computer. Week 5: Quantum algorithms. Fundamental ideas of quantum cryptography, Cryptographic concepts and tools: security definitions, the min-entropy, privacy amplification, Protocols and proofs of security for quantum key distribution, The basics of device-independent quantum cryptography, Modern quantum cryptographic tasks and protocols, Fundamental concepts of quantum information: pure and mixed quantum states, the partial trace, classical-quantum states, generalized measurements, Encrypting quantum bits with the quantum one-time pad, Separable states, entangled states and purification, Sharing a classical secret using quantum states, Looking ahead to quantum key distribution: verifying entanglement using a Bell experiment, What it means to be ignorant: trace distance and its use in security definitions, Uncertainty principles as a guessing game, Randomness extraction using two-universal hashing, A construction of two-universal hash functions, Introduction to key distribution: the challenge of being correct and secure, Warmup: Security against a classical eavesdropper, E91 Protocol: purifying protocols using entanglement, Quantum key distribution: definitions and concepts, Introduction to device-independent quantum cryptography, Security of device-independent quantum key distribution against collective attacks, Two-party cryptography: bit commitment and oblivious transfer, A simple protocol for bit commitment in the noisy-storage model, A universal primitive: weak string erasure, Position verification from weak string erasure, Secure computations on a remote quantum computer. This interdisciplinary course is an introduction to the exciting field of quantum cryptography, developed in collaboration between QuTech at Delft University of Technology and the California Institute of Technology. By the end of the course you will Be armed with a fundamental toolbox for understanding, designing and analyzing quantum protocols. The syllabus for this week is this; first, we are going to consider an algorithm for quantum data transmission or teleportation. It contains citation for textbooks for further references. Physical implementations of qubits (NMR, trapped ions, neutral atoms, superconductors, quantum dots, linear optics) will also be described. Understand quantum key distribution protocols. Please contact me if you're missing any of the required course, but really-really want to take this one! -2. Fundamental ideas of quantum cryptography; Cryptographic concepts and tools: security definitions, the min-entropy, privacy amplification; Protocols and proofs of security for quantum key distribution; The basics of device-independent quantum cryptography; Modern quantum cryptographic tasks and protocols; Syllabus Optional readings can be found in the textbooks denoted by KL and AC in the syllabus below. The former can be employed to time-efficiently break commonly used Internet public-key encryption methods, such as the RSA code. Be familiar with modern quantum cryptography – beyond quantum key distribution. The online version of the course is another resource for the material covered in class. This interdisciplinary course is an introduction to the exciting field of quantum cryptography, developed in collaboration between QuTech at Delft University of Technology and the California Institute of Technology. Week 9: Single photons, EPR pairs.