Quantum Computing in 5 Easy Pages 10-1-17
Quantum Computing in 5 Easy Pages 10-1-17
David Tennenhouse, Ittai Abraham, Jayneel Gandhi, Parikshit Gopalan, Rob Johnson, David Ott & Benny Pinkas
VMware, Inc.
1
These are simplified/paraphrased from the so-called Copenhagen interpretation.
2
Although classical probabilities are only positive, quantum probabilities can have negative and/or imaginary
components. This enables interesting operations, e.g., probabilities can cancel each other out when they are summed.
3
Some teams claim to have already exceeded this scale, but with systems that are more “analog” in nature.
4
Nanoscale dots of material that are sufficiently small that they exhibit many of the properties of individual atoms.
Are there problems and/or algorithms where Quantum Computers could do better than √𝑵 speedup?
Yes there are – and, in a remarkable quirk of mathematics, one such algorithm addresses factoring, a
problem that has been highly resistant to attack by classical algorithms.
Shor’s algorithm can be used to factor an integer N, which can be represented with log(N) bits, using on
the order of log(N)2 quantum operations. This is amazingly better than the best known classical
factoring algorithms which require an (almost) exponentially larger number of operations.
Factoring is so hard for a classical computer that we have to come somewhat close, at least in
complexity terms, to trying all of the possible answers. So, let’s go back to thinking about the mythical
quantum computer that could do just that. Intuitively, the problem with its realization is that, prior to
measurement, all of the answers would be super-imposed on each other within the many qubit register,
i.e., they would all be screaming out for attention at the time of collapse and we would be unlikely to
measure the “right” answer.
What near/moderate term actions should VMware be taking with respect to Cryptography?
Create an inventory of cryptography used in VMware products and a timetable for the adoption
of the NSA’s guidance regarding key lengths.
Investigate the modernization plans for cryptography sourced from third parties and/or open
source software; partner/participate in those plans as appropriate.
Plan to incorporate crypto agility into our products, i.e., the ability to update the crypto
algorithms, protocols and key links of deployed software.
Take steps to ensure that shared keys used to protect long term customer data (e.g., archival
backups, data-at-rest, etc.) cannot easily be obtained by collecting messages encrypted with
public keys in the near term and quantum decrypting them in the future.
Participate in NIST and the efforts of other governments and standards bodies to create
quantum-resistant systems, especially public key and/or key distribution systems
Investigate opportunities for VMware to create and operate a quantum-resistant key distribution
system/infrastructure on behalf of its customers. Note that this would likely not be a quantum
key distribution (QKD) system (see appendix).
What other actions should VMware be taking with respect to Quantum Computing?
Monitor the work of researchers attempting to build quantum computers. Calibrating their
timelines so that we and our customers don’t invest either too early or too late will be very
important. The results of the near term Google and Microsoft efforts to demonstrate quantum
supremacy are likely to be loaded with caveats and will require careful analysis/interpretation.
Stay abreast of developments on quantum algorithms and novel applications of quantum
computing. Gain a modicum of familiarity with programming some of the early prototypes
accessible via the cloud. This could be a good venue for intern projects.
Update this document every 6 months to reflect changes in the above.
5
https://www.iad.gov/iad/programs/iad-initiatives/cnsa-suite.cfm and www.iad.gov/iad/library/ia-guidance/ia-
solutions-for-classified/algorithm-guidance/cnsa-suite-and-quantum-computing-faq.cfm