Week 1: Brief review of qunatum mechanics; qubits and their representations. For the final project, you will have a choice of either preparing a 10-minute PowerPoint presentation or writing a 5-page report on the topics of quantum computing and cryptography, especially the latest experimental results and developments. Student talks. Understand quantum key distribution protocols. Learn Quantum Cryptography online with courses like Introduction to Applied Cryptography and The Introduction to Quantum … Course Syllabus Winter 2020. Week 5: Quantum algorithms. Physical implementations of qubits (NMR, trapped ions, neutral atoms, superconductors, quantum dots, linear optics) will also be described. The Shor's factoring algorithm (period finding, quantum Fourier transform) and the Grover search algorithm (entangled data base, oracle) will be introduced. Understand how untrusted quantum devices can be tested. Required text: "A Short Introduction to Quantum Information and Quantum Computation" by M. Le Bellac (Cambridge University Press, 2006). This section contains introduction to the theory and practice of quantum computation. -2. By the end of the course you will Be armed with a fundamental toolbox for understanding, designing and analyzing quantum protocols. Learn how quantum communication provides security that is guaranteed by the laws of nature. Prerequisites: this course assumes a solid knowledge of linear algebra and probability at the level of an advanced undergraduate. This interdisciplinary course is an introduction to the exciting field of quantum cryptography, developed in collaboration between QuTech at Delft University of Technology and the California Institute of Technology. The syllabus for this week is this; first, we are going to consider an algorithm for quantum data transmission or teleportation. Quantum Computation and Quantum Cryptography. I would like to receive email from CaltechX, DelftX and learn about other offerings related to Quantum Cryptography. Week 7: Quantum information. The course is aimed at upper-level undergraduate students in physics, engineering and math programs. We start with a brief review of the relevant topics of quantum mechanics (superposition, eigenstates, unitary operators, measurement, two-level system, Rabi flopping) and information theory (data representation, bits, logic gates, Shannon theorem), followed by the description of qubits (quantum bits) and entanglement, the building blocks of a quantum computer. Be familiar with modern quantum cryptography – beyond quantum key distribution. By the end of the course you will Be armed with a fundamental toolbox for understanding, designing and analyzing quantum protocols. Week 4: Quantum computing architectures. Quantum cryptography, or quantum key distribution (QKD), uses a series of photons (light particles) to transmit data from one location to another over a fiber optic cable. Week 8: Cryptography, quantum key distribution; teleportation. Syllabus. This interdisciplinary course is an introduction to the exciting field of quantum cryptography, developed in collaboration between QuTech at Delft University of Technology and the California Institute of Technology. Optional readings can be found in the textbooks denoted by KL and AC in the syllabus below. The state of the art experiments, as well as the commercially available quantum cryptography systems (MagiQ, id Quantique) will be described. Fundamental ideas of quantum cryptography, Cryptographic concepts and tools: security definitions, the min-entropy, privacy amplification, Protocols and proofs of security for quantum key distribution, The basics of device-independent quantum cryptography, Modern quantum cryptographic tasks and protocols, Fundamental concepts of quantum information: pure and mixed quantum states, the partial trace, classical-quantum states, generalized measurements, Encrypting quantum bits with the quantum one-time pad, Separable states, entangled states and purification, Sharing a classical secret using quantum states, Looking ahead to quantum key distribution: verifying entanglement using a Bell experiment, What it means to be ignorant: trace distance and its use in security definitions, Uncertainty principles as a guessing game, Randomness extraction using two-universal hashing, A construction of two-universal hash functions, Introduction to key distribution: the challenge of being correct and secure, Warmup: Security against a classical eavesdropper, E91 Protocol: purifying protocols using entanglement, Quantum key distribution: definitions and concepts, Introduction to device-independent quantum cryptography, Security of device-independent quantum key distribution against collective attacks, Two-party cryptography: bit commitment and oblivious transfer, A simple protocol for bit commitment in the noisy-storage model, A universal primitive: weak string erasure, Position verification from weak string erasure, Secure computations on a remote quantum computer. It contains citation for textbooks for further references. The optional AC book, by Boneh and Shoup, is more advanced (and free) and is intended for students wishing to go deeper. Quantum Cryptography courses from top universities and industry leaders. Prerequisites: PHYS 225, PHYS 324 or 315, MATH 308 or the quivalent. Week 9: Single photons, EPR pairs. For the more computer-science inclined types, suggested text is "Quantum Computer Science" by N. David Mermin (Cambridge University Press, 2007). Week 6: Physical realizations of qubits. Tentative schedule: Week 1: Brief review of qunatum mechanics; qubits and their representations. You all got used to the simplicity with which we can transfer and copy classical data. Both the quantum computation and the quantum cryptography are important for national security. This interdisciplinary course is an introduction to the exciting field of quantum cryptography, developed in collaboration between QuTech at Delft University of Technology and the California Institute of Technology. Please contact me if you're missing any of the required course, but really-really want to take this one! The former can be employed to time-efficiently break commonly used Internet public-key encryption methods, such as the RSA code. Next, the principles of quantum communication (Alice and Bob, single photon sources and detectors, entangled photons, teleportation, dense coding) and quantum cryptography (BB88 protocol, decoy states, privacy purification, eavesdropper effects) will be outlined. Week 2: The entanglement. Be armed with a fundamental toolbox for understanding, designing and analyzing quantum protocols. The online version of the course is another resource for the material covered in class. Week 3: Quantum logic gates. Assistant Professor, Computing and Mathematical Sciences, Pursue a Verified Certificate to highlight the knowledge and skills you gain, Basic quantum information theory, including qubits, unitaries and measurements (optional videos will provide additional support for those new to quantum information). Quantum Computation and Quantum Cryptography. It also includes gradings for homework, midterm and final exam. The Quantum Computation and Quantum Cryptography is a one-quarter course which focuses on the principles and ideas of the new paradigm for storing and manipulating information using quantum mechanical systems. Quantum cryptography is a reality of today, with commercially-produced and marketed systems, while a quantum computer may well be a reality of tomorrow. Fundamental ideas of quantum cryptography; Cryptographic concepts and tools: security definitions, the min-entropy, privacy amplification; Protocols and proofs of security for quantum key distribution; The basics of device-independent quantum cryptography; Modern quantum cryptographic tasks and protocols; Syllabus But in the case of quantum data, there's an obstacle called the no-cloning theorem. The evaluation will be based on weekly homeworks (50% of the grade) and a final project (50% of the grade). By comparing measurements of the properties of a fraction of these photons, the two endpoints can determine what the key is …