What is quantum computing?

Click For Summary
SUMMARY

Quantum computing significantly outperforms conventional computing in specific tasks, particularly in breaking encryption methods like RSA. Shor’s algorithm is pivotal in demonstrating this capability, as it enables the factoring of large numbers, which is essential for decrypting RSA keys. IBM has achieved a milestone by factoring a small RSA key into its prime components, asserting its quantum supremacy. Understanding these concepts is crucial for grasping the implications of quantum computing on security and computational power.

PREREQUISITES
  • Understanding of RSA encryption and its reliance on prime factorization
  • Familiarity with Shor’s algorithm and its applications in quantum computing
  • Basic knowledge of quantum computing principles and terminology
  • Awareness of IBM's advancements in quantum computing technology
NEXT STEPS
  • Research Shor’s algorithm and its implementation in quantum computers
  • Explore the implications of quantum computing on current encryption standards
  • Study IBM's quantum computing advancements and their impact on the industry
  • Investigate the differences between quantum and conventional computing capabilities
USEFUL FOR

Individuals interested in cybersecurity, quantum computing enthusiasts, software developers, and researchers exploring the future of computational technology.

capslfern
Messages
5
Reaction score
0
TL;DR
what is quantum computing and why is it different from conventional computing? what can it be used for?
I've heard that quantum computing is faster than conventional computing and can break almost all of our security, but how?
What could quantum computing be used for?
What can conventional computers do that quantum cant?
What can quantum computers do that conventional cant?
 
Computer science news on Phys.org
What reading have you been doing on these questions? It's best if you do some reading on your own and then post links to your reading and ask questions about the parts you do not yet understand.
 
  • Like
Likes   Reactions: pines-demon
Yes I concur wth @berkeman. Find some articles on quantum computing.

One thing to search for is Shor’s algorithm which will answer your security questions.

Many of our secure systems use RSA encryption which relies on the difficulty of factoring really large numbers of anywhere from 300 to 1200 digits into prime components. The numbers are based on the product of two large primes.

Quantum computers hold the promise of factoring RSA keys into their two primes breaking its security feature as either prime can be used to decrypt the message.

So far, IBM has successfully factored a rather small key into its two primes of 3 and 5 and claimed quantum supremacy.

Jedi
 

Similar threads

  • · Replies 29 ·
Replies
29
Views
3K
  • · Replies 1 ·
Replies
1
Views
2K
  • · Replies 9 ·
Replies
9
Views
1K
  • · Replies 6 ·
Replies
6
Views
2K
  • · Replies 1 ·
Replies
1
Views
2K
  • · Replies 2 ·
Replies
2
Views
2K
Replies
43
Views
6K
  • · Replies 12 ·
Replies
12
Views
4K
  • · Replies 6 ·
Replies
6
Views
3K
Replies
1
Views
2K