Chapter 1

Introduction to Quantum Computing

V. Padmavathi

V. Padmavathi

Dept. of Computer Science and Engineering, Chaitanya Bharathi Institute of Technology, Hyderabad, India

Search for more papers by this author
C. N. Sujatha

C. N. Sujatha

Dept. of Computer Science and Engineering, Sreenidhi Institute of Science and Technology, Hyderabad, India

Search for more papers by this author
V. Sitharamulu

V. Sitharamulu

Dept. of Computer Science and Engineering, GITAM (Deemed to be University), Hyderabad, India

Search for more papers by this author
K. Sudheer Reddy

K. Sudheer Reddy

Dept. of Information Technology, Anurag University, Hyderabad, India

Search for more papers by this author
A. Mallikarjuna Reddy

A. Mallikarjuna Reddy

Dept. of Artificial Intelligence, Anurag University, Hyderabad, India

Search for more papers by this author
First published: 29 May 2023

Summary

Over the past few decades, tremendous growth has been witnessed in cryptography in which different security techniques and concerns were projected and put into practice. The classical methods of cryptography are depended on binary bits, which are susceptible to predicting the key during transit. Hence, moving the classical cryptographic scheme to a new fast, and non-vulnerable scheme is time. The principles of quantum mechanics are applied in quantum computing to enhance security which uses qubits for communication. The advantage of using qubits is that it is impossible to make copies of qubits due to the no-cloning theorem. The computations are performed through photons or qubits produced using the photon's polarization. The qubits are disturbed when measured at an incorrect polarization angle due to the principle of uncertainty. The photons are quantized features used to encode the information. They can be applied in Quantum Key Distribution (QKD), in which distantly apart communicators share a standard secret key.

The full text of this article hosted at iucr.org is unavailable due to technical difficulties.