SlideShare a Scribd company logo
2
Most read
3
Most read
5
Most read
Quantum Computing In Financial Sector
Presented By:
Abhas Dash
18030241051
ITBM (2018-20)
Symbiosis Centre for IT
Mentor :
Mandaar Pande
Abhas Dash
Monday, April 10, 2023
What Are Quantum Computers
• How Classical computers work
It deals in bits i.e. 0 and 1
• How a Quantum Computer works
It deals with qubits i.e. it can be in both the states 0 and 1 ( name
of this phenomenon is Superposition)
Abhas Dash
Monday, April 10, 2023
Quantum Computing Applications and Use Case
 How Quantum Computing is enhancing Traffic Management
 By Quantum Machine Learning better track of weather and
climate data at micro level.
 Quantum Computers can gather the social media data so as to
predict and prevent crimes.
 Many More
https://youtu.be/Bx9GLH_GklA
Abhas Dash
Monday, April 10, 2023
Big Sharks in the field
• Microsoft Services :
 Azure Quantum provides :-
 Quantum solutions, like pre-built solvers and algorithms that run at industrial scale
 Quantum software, including simulators and resource estimation tools, scaled by Azure compute
 Quantum hardware system options with a variety of different qubit architectures.
 Scale, security and support from Azure and trusted partners.
• Google Services:
 Launched TensorFlow Quantum (TFQ), an open-source library for prototyping quantum machine
learning models.
 Google has formed a new laboratory: Embryonic Quantum Data Center.
 Google plans to introduce a cloud service for quantum computing.
 Google has achieved Quantum Supremacy.
Abhas Dash
Monday, April 10, 2023
Quantum Cryptography
 Quantum cryptography is the science of exploiting quantum mechanical properties to
perform cryptographic tasks.
 The most well known and developed application of quantum cryptography is Quantum Key
distribution (QKD).
 An important and unique property of quantum key distribution is the ability of the two
communicating users to detect the presence of any third party trying to gain knowledge of the
key. (Explained in Slide no.7 and 8).
 Entanglement based protocols
The quantum states of two (or more) separate objects can become linked together in such a
way that they must be described by a combined quantum state, not as individual objects. This is
known as entanglement and means that, for example, performing a measurement on one object
affects the other. If an entangled pair of objects is shared between two parties, anyone
intercepting either object alters the overall system, revealing the presence of the third party
(and the amount of information they have gained).
(~wiki)
Abhas Dash
Monday, April 10, 2023
Traditional Banking Authentication Process
Abhas Dash
Monday, April 10, 2023
Tradition Overpowered by Quantum Computer
1. Login ID
2. Login ID sent
3. Login ID verified
4. Sent back Option to Customer
5. Service Options displayed
6. Transaction request
7. Transaction request transmitted
8. Quantum Key Distribution
9. Quantum code produced
10. Quantum code sent
11. Quantum code Verification
12. Transaction confirmation transmitted
13. Transaction confirmed
Abhas Dash
Monday, April 10, 2023
Abhas Dash
Monday, April 10, 2023
Medical use case to address recent CORONA Pandemic
• "In the field of computational chemistry, high accuracy
property prediction is considered to be very difficult.
Running quantum computing methods with Quantum
optimization solutions, we are getting results that are more
accurate than other algorithms."
- Scott Genin, Head of Materials Discovery, OTI Lumionics
Abhas Dash
Monday, April 10, 2023
Thank You
“Quantum Computing will be so powerful, those who
embrace it first have a historic opportunity to bring their
values and ethics into the world at scale.”
Abhas Dash,
Monday, April 10, 2023
Characteristics of quantum cryptography
-The concept of Quantum Cryptography was introduced by Bennett
and Brassard in 1984.
Classical cryptography:
• M=P*Q (Difficult to find P and Q when we know
both are prime numbers and value of M.)
• ABHAS =128119
• 128119 * 143 = 18,321,017 (This is the
cryptographic message but it has to be
converted to binary when it is made to read by
classical computers in the form of binary, 0 and
1).
• Even the best of the classical computer has
limitation in prime number. (Largest prime
number = 2^74207281 -1)
Quantum Cryptograpgy:
• In QC information is transferred in as
photon polarization. (Directions are
0,1,-,+ i.e. vertical and horizontal
and two diagonals)
• Polarization detectors translate
photons to bits if it is passed.
• It is p assed through the filter
because of the position of the
photon.
• Receiver then reaches out to the
sender for which detector he used for
photon.
• After confirmation then the quantum
key is found and used to decrypt
How the traditional encryption system works
Monday, April 10, 2023
For traditional secure transaction
Below 3 steps are followed:
Encryption (It is developed in
software using specific patterns.)
The Exchange (Eavesdropping can
be done just like the diagram.)
Encryption Algorithm (to decode the
encryption so as to get the data.)
e.g. Payroll company
How Quantum cryptography is enhancing the
process
In Quantum cryptography comes up with the following solutions:
 Random Number Generator (For
encryption)
 Quantum Key Distributor ( If also any
eavesdrop happens in the middle , then
Both the parties are alerted.)
Paper taken for reference : Authentication in Online Banking
Systems through Quantum Cryptography by Anand Sharma,
S.K.Lenka. FET, MITS, Lakshmangarh Sikar, Rajasthan, India
Monday, April 10, 2023

More Related Content

PPTX
Quantum computing
PPTX
Quantum Computing
PPTX
Quantum computer
PDF
Quantum computing
PPTX
Quantum Computing
PDF
Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...
PPTX
Quantum computing
Quantum computing
Quantum Computing
Quantum computer
Quantum computing
Quantum Computing
Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...
Quantum computing

What's hot (20)

PPTX
Aditya kulshreshtha, (QUANTUM COMPUTING)
PPTX
Quantum Computing: Welcome to the Future
PPTX
Presentation quantum computers
PPTX
Quantum computing
PPTX
Qunatum computing
PDF
Quantum computation - Introduction
PPT
Quantum computer
PPTX
Quantum computer
PPTX
Quantum Computing
PDF
Quantum Computing
PPTX
Quantum computer
PPTX
Presentation on quantum computers
PPTX
Quantum computers
PPTX
Quantum computing in machine learning
PPTX
Quantum computing
PPTX
Quantum computing
PPTX
Quantum computing - Introduction
PPTX
Quantum computing
PDF
Quantum Computing
Aditya kulshreshtha, (QUANTUM COMPUTING)
Quantum Computing: Welcome to the Future
Presentation quantum computers
Quantum computing
Qunatum computing
Quantum computation - Introduction
Quantum computer
Quantum computer
Quantum Computing
Quantum Computing
Quantum computer
Presentation on quantum computers
Quantum computers
Quantum computing in machine learning
Quantum computing
Quantum computing
Quantum computing - Introduction
Quantum computing
Quantum Computing
Ad

Similar to quantum computing (20)

PDF
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats
PPTX
Quantum Computing and Blockchain: Facts and Myths
PPT
Quantum Blockchains
PDF
Exploring Quantum Cryptography: The Future of Unbreakable Encryption
PDF
Quantum Computing Unlocking the Next Frontier in Technology.pdf
PDF
DEF CON 23 - Phillip Aumasson - quantum computers vs computers security
PPTX
quantum computing_quantum computing.pptx
PDF
What is Quantum Computing, and How,,, Does It Work.pdf
PPTX
Quantum_Computing_Presentation_Introductionn.pptx
PDF
Quantum Meets Blockchain - Different Perspectives
PDF
Exploring Quantum Cryptography: Next-Generation Security Protocols
PPTX
The convergence of IoT and Quantum Computing
PPTX
Quantum cryptography by Girisha Shankar, Sr. Manager, Cisco
PDF
Quantum Computing: Unleashing the Power of Quantum Mechanics
PPTX
Quantum computer in cryptography
PDF
DEF CON 27 - ANDREAS BAUMHOF - are quantum computers really a threat to crypt...
PDF
How Secure is Quantum Computing_ Quantum Cryptography Explained.pdf
PPTX
2K20_CO_258 QUANTUM COMPUTING ASSIGNMENT.pptx
PDF
Post quantum cryptography in vault (hashi talks 2020)
PDF
Blockchain Security in the Quantum Age 2024/03/18
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats
Quantum Computing and Blockchain: Facts and Myths
Quantum Blockchains
Exploring Quantum Cryptography: The Future of Unbreakable Encryption
Quantum Computing Unlocking the Next Frontier in Technology.pdf
DEF CON 23 - Phillip Aumasson - quantum computers vs computers security
quantum computing_quantum computing.pptx
What is Quantum Computing, and How,,, Does It Work.pdf
Quantum_Computing_Presentation_Introductionn.pptx
Quantum Meets Blockchain - Different Perspectives
Exploring Quantum Cryptography: Next-Generation Security Protocols
The convergence of IoT and Quantum Computing
Quantum cryptography by Girisha Shankar, Sr. Manager, Cisco
Quantum Computing: Unleashing the Power of Quantum Mechanics
Quantum computer in cryptography
DEF CON 27 - ANDREAS BAUMHOF - are quantum computers really a threat to crypt...
How Secure is Quantum Computing_ Quantum Cryptography Explained.pdf
2K20_CO_258 QUANTUM COMPUTING ASSIGNMENT.pptx
Post quantum cryptography in vault (hashi talks 2020)
Blockchain Security in the Quantum Age 2024/03/18
Ad

Recently uploaded (20)

PDF
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
PDF
“Getting Started with Data Analytics Using R – Concepts, Tools & Case Studies”
PDF
Fluorescence-microscope_Botany_detailed content
PPTX
IB Computer Science - Internal Assessment.pptx
PDF
TRAFFIC-MANAGEMENT-AND-ACCIDENT-INVESTIGATION-WITH-DRIVING-PDF-FILE.pdf
PPTX
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
PDF
Clinical guidelines as a resource for EBP(1).pdf
PPTX
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
PPTX
climate analysis of Dhaka ,Banglades.pptx
PPTX
STUDY DESIGN details- Lt Col Maksud (21).pptx
PDF
Business Analytics and business intelligence.pdf
PPTX
1_Introduction to advance data techniques.pptx
PDF
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
PPTX
Database Infoormation System (DBIS).pptx
PPTX
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
PPTX
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
PPTX
Business Ppt On Nestle.pptx huunnnhhgfvu
PPTX
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
PPTX
advance b rammar.pptxfdgdfgdfsgdfgsdgfdfgdfgsdfgdfgdfg
PDF
168300704-gasification-ppt.pdfhghhhsjsjhsuxush
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
“Getting Started with Data Analytics Using R – Concepts, Tools & Case Studies”
Fluorescence-microscope_Botany_detailed content
IB Computer Science - Internal Assessment.pptx
TRAFFIC-MANAGEMENT-AND-ACCIDENT-INVESTIGATION-WITH-DRIVING-PDF-FILE.pdf
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
Clinical guidelines as a resource for EBP(1).pdf
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
climate analysis of Dhaka ,Banglades.pptx
STUDY DESIGN details- Lt Col Maksud (21).pptx
Business Analytics and business intelligence.pdf
1_Introduction to advance data techniques.pptx
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
Database Infoormation System (DBIS).pptx
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
Business Ppt On Nestle.pptx huunnnhhgfvu
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
advance b rammar.pptxfdgdfgdfsgdfgsdgfdfgdfgsdfgdfgdfg
168300704-gasification-ppt.pdfhghhhsjsjhsuxush

quantum computing

  • 1. Quantum Computing In Financial Sector Presented By: Abhas Dash 18030241051 ITBM (2018-20) Symbiosis Centre for IT Mentor : Mandaar Pande Abhas Dash Monday, April 10, 2023
  • 2. What Are Quantum Computers • How Classical computers work It deals in bits i.e. 0 and 1 • How a Quantum Computer works It deals with qubits i.e. it can be in both the states 0 and 1 ( name of this phenomenon is Superposition) Abhas Dash Monday, April 10, 2023
  • 3. Quantum Computing Applications and Use Case  How Quantum Computing is enhancing Traffic Management  By Quantum Machine Learning better track of weather and climate data at micro level.  Quantum Computers can gather the social media data so as to predict and prevent crimes.  Many More https://youtu.be/Bx9GLH_GklA Abhas Dash Monday, April 10, 2023
  • 4. Big Sharks in the field • Microsoft Services :  Azure Quantum provides :-  Quantum solutions, like pre-built solvers and algorithms that run at industrial scale  Quantum software, including simulators and resource estimation tools, scaled by Azure compute  Quantum hardware system options with a variety of different qubit architectures.  Scale, security and support from Azure and trusted partners. • Google Services:  Launched TensorFlow Quantum (TFQ), an open-source library for prototyping quantum machine learning models.  Google has formed a new laboratory: Embryonic Quantum Data Center.  Google plans to introduce a cloud service for quantum computing.  Google has achieved Quantum Supremacy. Abhas Dash Monday, April 10, 2023
  • 5. Quantum Cryptography  Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks.  The most well known and developed application of quantum cryptography is Quantum Key distribution (QKD).  An important and unique property of quantum key distribution is the ability of the two communicating users to detect the presence of any third party trying to gain knowledge of the key. (Explained in Slide no.7 and 8).  Entanglement based protocols The quantum states of two (or more) separate objects can become linked together in such a way that they must be described by a combined quantum state, not as individual objects. This is known as entanglement and means that, for example, performing a measurement on one object affects the other. If an entangled pair of objects is shared between two parties, anyone intercepting either object alters the overall system, revealing the presence of the third party (and the amount of information they have gained). (~wiki) Abhas Dash Monday, April 10, 2023
  • 6. Traditional Banking Authentication Process Abhas Dash Monday, April 10, 2023
  • 7. Tradition Overpowered by Quantum Computer 1. Login ID 2. Login ID sent 3. Login ID verified 4. Sent back Option to Customer 5. Service Options displayed 6. Transaction request 7. Transaction request transmitted 8. Quantum Key Distribution 9. Quantum code produced 10. Quantum code sent 11. Quantum code Verification 12. Transaction confirmation transmitted 13. Transaction confirmed Abhas Dash Monday, April 10, 2023
  • 9. Medical use case to address recent CORONA Pandemic • "In the field of computational chemistry, high accuracy property prediction is considered to be very difficult. Running quantum computing methods with Quantum optimization solutions, we are getting results that are more accurate than other algorithms." - Scott Genin, Head of Materials Discovery, OTI Lumionics Abhas Dash Monday, April 10, 2023
  • 10. Thank You “Quantum Computing will be so powerful, those who embrace it first have a historic opportunity to bring their values and ethics into the world at scale.” Abhas Dash, Monday, April 10, 2023
  • 11. Characteristics of quantum cryptography -The concept of Quantum Cryptography was introduced by Bennett and Brassard in 1984. Classical cryptography: • M=P*Q (Difficult to find P and Q when we know both are prime numbers and value of M.) • ABHAS =128119 • 128119 * 143 = 18,321,017 (This is the cryptographic message but it has to be converted to binary when it is made to read by classical computers in the form of binary, 0 and 1). • Even the best of the classical computer has limitation in prime number. (Largest prime number = 2^74207281 -1) Quantum Cryptograpgy: • In QC information is transferred in as photon polarization. (Directions are 0,1,-,+ i.e. vertical and horizontal and two diagonals) • Polarization detectors translate photons to bits if it is passed. • It is p assed through the filter because of the position of the photon. • Receiver then reaches out to the sender for which detector he used for photon. • After confirmation then the quantum key is found and used to decrypt
  • 12. How the traditional encryption system works Monday, April 10, 2023 For traditional secure transaction Below 3 steps are followed: Encryption (It is developed in software using specific patterns.) The Exchange (Eavesdropping can be done just like the diagram.) Encryption Algorithm (to decode the encryption so as to get the data.) e.g. Payroll company
  • 13. How Quantum cryptography is enhancing the process In Quantum cryptography comes up with the following solutions:  Random Number Generator (For encryption)  Quantum Key Distributor ( If also any eavesdrop happens in the middle , then Both the parties are alerted.) Paper taken for reference : Authentication in Online Banking Systems through Quantum Cryptography by Anand Sharma, S.K.Lenka. FET, MITS, Lakshmangarh Sikar, Rajasthan, India Monday, April 10, 2023