Chapter 2

Fundamentals of Quantum Computing and Significance of Innovation

Swapna Mudrakola

Swapna Mudrakola

Department of CSE, Matrusri Engineering College, Hyderabad, India

Search for more papers by this author
V. Uma Maheswari

V. Uma Maheswari

Department of CSE, KG Reddy College of Engineering and Technology, Hyderabad, India

Search for more papers by this author
Krishna Keerthi Chennam

Krishna Keerthi Chennam

Vasavi College of Engineering, Hyderabad, India

Search for more papers by this author
MVV Prasad Kantipudi

MVV Prasad Kantipudi

Symbiosis Institute of Technology, Symbiosis International (Deemed University), Pune, India

Search for more papers by this author
First published: 29 May 2023

Summary

Digital transformation has changed the lifestyle of people, business applications, scientific approaches, and communication systems. Data security and protection plays important role in network systems and data repositories. The latest security techniques are being solved by many contemporary attacks. The traditional cryptography techniques applied to binary data, encryption, and decryption use keys. The keys are predicted and broken using hacking methods during the transmission of data. Cryptographic techniques are upgraded using different schemes. The security can be improvised using quantum computing in data transmission of qubits form of data. The property of qubits is liable with the no-cloning theorem, not possible to make no copies. The quantum theory principle can be operated using polarization with qubits and photons. The uncertainty in quantum computing on qubits can be asses at due to wrong polarization angles. The quantized properties are used to encryption of the data using photons. Quantum Key Distribution will share the keys.

The full text of this article hosted at iucr.org is unavailable due to technical difficulties.