Featured Research

from universities, journals, and other organizations

NIST Demonstrates Key Step In Use Of Quantum Computers For Code-Breaking

Date:
June 7, 2005
Source:
National Institute Of Standards And Technology
Summary:
A crucial step in a procedure that could enable future quantum computers to break today's most commonly used encryption codes has been demonstrated by physicists at the U.S. Commerce Department's National Institute of Standards and Technology (NIST).

This colorized image shows the fluorescence from three trapped beryllium ions illuminated with an ultraviolet laser beam. Black and blue areas indicate lower intensity, and red and white higher intensity.
Credit: NIST

Boulder, Colo. -- A crucial step in a procedure that could enable future quantum computers to break today's most commonly used encryption codes has been demonstrated by physicists at the U.S. Commerce Department's National Institute of Standards and Technology (NIST).

As reported in the May 13 issue of the journal Science,* the NIST team showed that it is possible to identify repeating patterns in quantum information stored in ions (charged atoms). The NIST work used three ions as quantum bits (qubits) to represent 1s or 0s--or, under the unusual rules of quantum physics, both 1 and 0 at the same time. Scientists believe that much larger arrays of such ions could process data in a powerful quantum computer. Previous demonstrations of similar processes were performed with qubits made of molecules in a liquid, a system that cannot be expanded to large numbers of qubits.

"Our demonstration is important, because it helps pave the way toward building a large-scale quantum computer," says John Chiaverini, lead author of the paper. "Our approach also requires fewer steps and is more efficient than those demonstrated previously."

The NIST team used electromagnetically trapped beryllium ions as qubits to demonstrate a quantum version of the "Fourier transform" process, a widely used method for finding repeating patterns in data. The quantum version is the crucial final step in Shor's algorithm, a series of steps for finding the "prime factors" of large numbers--the prime numbers that when multiplied together produce a given number.

Developed by Peter Shor of Bell Labs in 1994, the factoring algorithm sparked burgeoning interest in quantum computing. Modern cryptography techniques, which rely on the fact that even the fastest supercomputers require very long times to factor large numbers, are used to encode everything from military communications to bank transactions. But a quantum computer using Shor's algorithm could factor a number several hundred digits long in a reasonably short time. This algorithm made code breaking the most important application for quantum computing.

Quantum computing, which harnesses the unusual behavior of quantum systems, offers the possibility of parallel processing on a grand scale. Unlike switches that are either fully on or fully off in today's computer chips, quantum bits can be on, off, or on and off at the same time. The availability of such "superpositions," in addition to other strange quantum properties, means that a quantum computer could solve certain problems in an exponentially shorter time than a conventional computer with the same number of bits. Researchers often point out that, for specific classes of problems, a quantum computer with 300 qubits has potentially more processing power than a classical computer containing as many bits as there are particles in the universe.

Harnessing all this potential for practical use is extremely difficult. One problem is that measuring a qubit causes its delicate quantum state to collapse, producing an output of an ordinary 1 or 0, without a record of what happened during the computation. Nevertheless, Shor's algorithm uses these properties to perform a useful task. It enables scientists to analyze the final quantum state after the computation to find repeating patterns in the original input, and to use this information to determine the prime factors of a number.

The work described in the Science paper demonstrated the pattern-finding step of Shor's algorithm. This demonstration involves fewer and simpler operations than those previously implemented, a significant benefit in designing practical quantum computers.

In the experiments, NIST researchers performed the same series of operations on a set of three beryllium qubits thousands of times. Each set of operations lasted less than 4 milliseconds, and consisted of using ultraviolet laser pulses to manipulate individual ions in sequence, based on measurements of the other ions. Each run produced an output consisting of measurements of each of the three ions. The NIST team has the capability to measure ions' quantum states precisely and use the results to manipulate other ions in a controlled way, before the delicate quantum information is lost.

The same NIST team has previously demonstrated all the basic components for a quantum computer using ions as qubits, arguably a leading candidate for a large-scale quantum processor. About a dozen different types of quantum systems are under investigation around the world for use in quantum processing, including the approach of using ions as qubits.

The new work was supported in part by the Advanced Research and Development Activity/National Security Agency.

As a non-regulatory agency, NIST develops and promotes measurement, standards and technology to enhance productivity, facilitate trade and improve the quality of life.

*J. Chiaverini, J. Britton, D. Leibfried, E. Knill, M.D. Barrett, R.B. Blakestad, W.M. Itano, J.D. Jost, C. Langer, R. Ozeri, T. Schaetz and D.J. Wineland. 2005. Implementation of the semiclassical quantum Fourier transform in a scalable system. Science. May 13, 2005.


Story Source:

The above story is based on materials provided by National Institute Of Standards And Technology. Note: Materials may be edited for content and length.


Cite This Page:

National Institute Of Standards And Technology. "NIST Demonstrates Key Step In Use Of Quantum Computers For Code-Breaking." ScienceDaily. ScienceDaily, 7 June 2005. <www.sciencedaily.com/releases/2005/06/050604202933.htm>.
National Institute Of Standards And Technology. (2005, June 7). NIST Demonstrates Key Step In Use Of Quantum Computers For Code-Breaking. ScienceDaily. Retrieved April 17, 2014 from www.sciencedaily.com/releases/2005/06/050604202933.htm
National Institute Of Standards And Technology. "NIST Demonstrates Key Step In Use Of Quantum Computers For Code-Breaking." ScienceDaily. www.sciencedaily.com/releases/2005/06/050604202933.htm (accessed April 17, 2014).

Share This



More Computers & Math News

Thursday, April 17, 2014

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

German Researchers Crack Samsung's Fingerprint Scanner

German Researchers Crack Samsung's Fingerprint Scanner

Newsy (Apr. 16, 2014) German researchers have used a fake fingerprint made from glue to bypass the fingerprint security system on Samsung's new Galaxy S5 smartphone. Video provided by Newsy
Powered by NewsLook.com
Twitter, Apple Social Data Purchases Likely to Spur More Mergers and Acquisitions

Twitter, Apple Social Data Purchases Likely to Spur More Mergers and Acquisitions

TheStreet (Apr. 16, 2014) The social media data space is likely to see more mergers and acquisitions following Twitter Inc.'s acquisition of tweet analyzer Gnip Inc. on Tuesday and Apples Inc.'s purchase of Topsy Labs Inc. back in December. One firm in particular, the U.K.'s DataSift Inc., could be on the list of potential buyers. Among other social media startups that could be ripe for picking is Banjo, whose mobile app provides aggregated content by topic and location. Banjo could also be a good fit for Twitter. Video provided by TheStreet
Powered by NewsLook.com
Bitcoin Exchange Mt. Gox to Liquidate After Rebuilding Rejected

Bitcoin Exchange Mt. Gox to Liquidate After Rebuilding Rejected

TheStreet (Apr. 16, 2014) Bitcoin exchange Mt. Gox has agreed to liquidate after a Japanese court rejected its plans to rebuild, according to a report by the Wall Street Journal. Mt. Gox filed for bankruptcy protection in February after announcing about 850,000 bitcoins, worth around $454 million at today's rates, may have been stolen by hackers. It has since recovered 200,000 of the missing bitcoins. The court put Mt. Gox's assets under a provisional administrator's control until bankruptcy proceedings begin. Video provided by TheStreet
Powered by NewsLook.com
BlackBerry: The Crash That Launched 1,000 Startups

BlackBerry: The Crash That Launched 1,000 Startups

Reuters - Business Video Online (Apr. 16, 2014) Tech startups in BlackBerry's hometown of Waterloo, Ontario, are tapping talent from the struggling smartphone company and filling the void left in the region by its meltdown. Reuters correspondent Euan Rocha visits the region that could become Canada's Silicon Valley. Video provided by Reuters
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:

Breaking News:
from the past week

In Other News

... from NewsDaily.com

Science News

Health News

Environment News

Technology News



Save/Print:
Share:

Free Subscriptions


Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

Get Social & Mobile


Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

Have Feedback?


Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
Mobile: iPhone Android Web
Follow: Facebook Twitter Google+
Subscribe: RSS Feeds Email Newsletters
Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins