1Introduction to Quantum Computing

V. Padmavathi1, C. N. Sujatha2, V. Sitharamulu3, K. Sudheer Reddy4* and A. Mallikarjuna Reddy5

1 Dept. of Computer Science and Engineering, Chaitanya Bharathi Institute of Technology, Hyderabad, India

2 Dept. of Computer Science and Engineering, Sreenidhi Institute of Science and Technology, Hyderabad, India

3 Dept. of Computer Science and Engineering, GITAM (Deemed to be University), Hyderabad, India

4 Dept. of Information Technology, Anurag University, Hyderabad, India

5 Dept. of Artificial Intelligence, Anurag University, Hyderabad, India

Abstract

Over the past few decades, tremendous growth has been witnessed in cryptography in which different security techniques and concerns were projected and put into practice. The classical methods of cryptography are depended on binary bits, which are susceptible to predicting the key during transit. Hence, moving the classical cryptographic scheme to a new fast, and non-vulnerable scheme is time. The principles of quantum mechanics are applied in quantum computing to enhance security which uses qubits for communication. The advantage of using qubits is that it is impossible to make copies of qubits due to the no-cloning theorem. The computations are performed through photons or qubits produced using the photon’s polarization. The qubits are disturbed when measured at an incorrect polarization angle due to the principle of uncertainty. The photons are quantized features used to encode the information. ...

Get Evolution and Applications of Quantum Computing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.