SlideShare a Scribd company logo
Juniper Business Use Only
QUANTUM
NATURE
“Can Quantum-Mechanical
Description of Physical Reality be
Considered Complete?”
May, 15, 1935 Physical Review, Vol.47
October, 15, 1935, Physical review, Vol.48
Juniper Business Use Only
QUANTUM “SUPREMACY”
QUANTUM GEOPOLITICAL STRATEGY
QUATUM COMPUTER AND QUBITS
QUANTUM ENCRYPTION
QUANTUM SENSORS
QUANTUM EXECUTIVE SUMMARY
Juniper Business Use Only
QUANTUM SUPREMACY: A BUZZ OR HYPE?
Juniper Business Use Only
Sycamore QC (Google) has processed n=53 qubits, m=20 cycles and Ns=1E6
samples with 0.1% of fidelity in 200sec. Classical sampling (classical computer
process) and 1M cores would take 10.000 years
The same configuration on Google Cloud cluster (classical) would take 50
Trillions/core hrs (50 millions hrs or 6.000 years) and 1M cores with 1
PetaWatt*hr of consumed power
Summit SC (the most powerful supercomputer on earth) stops at m=14 cycles
because not enough memory
QUANTUM SUPREMACY PILLS
Juniper Business Use Only
IS THERE A QUANTUM GOLDEN RUSH ?
VC HW investments in QC are the
majority (still) but longer time to
return
$110M in SW investments across
28 deals. Quantum Cloudification
will drive emerging of new Apps
Emerging opportunities and short
term in encryption, super-
sensitive detection devices and
new forms of imaging
Juniper Business Use Only
AN ECOSYSTEM IN DEVELOPMENT:WHERE ARE WE?
HW
• Psiquantum (CA)
• Qbami (CH)
• ID Quantique (CHF)
• D-Wave (CA)
• Rigetti (CA)
• QuantumCTek (CH)
• ……
SW
• QCWare (CA)
• Zapata Comp. (MA)
• Cambridge QC (UK)
• …..
VC
• Quantonation (FR)
• …..
…YET A COMPLETE MAPPING IS NOT AVAILABLE….
Area Total # Total $ (disclosed)
Instrumentation, tools and services 5 12.25
$
Quantum communication 26 130.19
$
Quantum computing 26 419.27
$
Quantum software 28 113.05
$
Sensors and Material 3 0.13
$
Total 88 674.89
$
Juniper Business Use Only
A STRATEGIC POINT OF VIEW
Link : https://www.nature.com/QUANTUM-GOLDEN-RUSH
$1.2B from US congress on strategic
Quantum projects and development
Eu1B investments in 10 years over 20
countries on Quantum Flagship
Eu650M investment until 2022, plus
other sponsored programs
$10B committed for Hefei Tech Park on
Quantum Information
Link: https://www.nature.com/EU-fund
Juniper Business Use Only
QUANTUM COMPUTER RACE: GAME CHANGER?
https://www.scientificamerican.com/article/how-quantum-computers-work/
https://www.scientificamerican.com/article/quantum-computers-compete-for-supremacy/
Bit & Qubit: A common metaphor used to compare the two is a
coin. In conventional computer processor a transistor is either up
or down, heads or tails. But if I ask you whether that coin is heads
or tails while it’s spinning, you might say the answer is both. That’s
what a quantum computer builds on. Instead, a conventional bit
that’s either 0 or 1, you have a quantum bit that simultaneously
represents 0 and 1, until that qubit stops spinning and comes to a
resting state (de-coherence).
Superposition: The state space—or the ability to sample many
possible combinations—is exponential with a quantum computer.
Taking the coin metaphor further, imagine I have two coins in my
hand, and I toss them in the air at the same time. While they’re
both spinning, they would represent four possible states. If I
tossed three coins in the air, they would represent eight possible
states. If I had 50 coins and tossed them all up in the air and asked
you how many states that represents, the answer would be more
states than is possible with the largest supercomputer in the world
today. Three hundred coins—still a relatively small number—
would represent more states than there are atoms in the universe.
Collapsing a state-space return qubits in bits of information
NISQ & Information theory: The reality is that the coins, or qubits,
eventually stop spinning and collapse into a state, whether it’s
heads or tails. The goal with quantum computing is to keep them
spinning in the superposition of multiple states for a long time.
Imagine I have a coin spinning on a table, and someone is shaking
that table. That might cause the coin to fall over faster. Noise,
temperature change, an electrical fluctuation or vibration—all
these things can disturb a qubit’s operation and cause it to lose its
data. One way to stabilize certain types of qubits is to keep them
very cold. Our qubits operate in a dilution refrigerator that’s about
the size of a 55-gallon drum and uses a special isotope of helium
to cool them a fraction of a degree above absolute zero (roughly –
273 degrees Celsius).
Beyond that we want to improve the quality of the qubits, which
will help us test algorithms and build our system. Quality refers to
the fidelity with which information is passed along over time.
While many parts of the system will improve quality, the biggest
advances will come through materials engineering and
improvements in the accuracy of the microwave pulses and other
control electronics.
Juniper Business Use Only
QUANTUM COMPUTER AND THEN?
https://www.scientificamerican.com/article/how-quantum-computers-work/
https://www.scientificamerican.com/article/quantum-computers-compete-for-supremacy/
https://www.scientificamerican.com/article/beyond-quantum-supremacy-the-hunt-for-useful-quantum-computers/
Field of application (to begin with): Typically, the first quantum
algorithms that get proposed are for security (such as
cryptography) or chemistry (including bio and bio-engineering)
and materials modeling. These are problems that are essentially
intractable with conventional computers.
Such a computer would make use of entanglement, a
phenomenon unique to quantum systems, that particle’s
properties are affected by what happens to other particles with
which it shares intimate quantum connections.
NISQ systems won’t be able to perform full-scale chemistry
simulations. But when combined with conventional computers,
they might demonstrate an advantage over existing classical
simulations. “The classically hard part of the simulation is solved
on a quantum processor, while the rest of the work is done on a
classical computer
An algorithm called variational quantum factoring (VQF), which
aims to bring the encryption-breaking, large-number-factoring
capabilities of quantum processing to NISQ-era machines. Other
quantum algorithm for such work are Shor’s and Grover
algorithms. That approach offers a fast route to factoring large
numbers but is likely to require hundreds of thousands of qubits to
go beyond what is possible on classical machines.
Other application can be in processing large data set with “noise”
in Quantum ML applications
One general problem for NISQ computing comes down to time.
Conventional computers can effectively operate indefinitely. A
quantum system can lose its correlations, and thus its computing
power, in fractions of a second. As a result, a classical computer
does not have to run for very long before it can outstrip the
capabilities of today’s quantum machines.
For now, however, researchers must contend with the fact that
there is still no proof that today’s quantum machines will yield
anything of use. NISQ could simply turn out to be the name for the
broad, possibly featureless landscape researchers must traverse
before they can build quantum computers capable of outclassing
conventional ones in helpful ways.
The history will repeat: The first transistor was introduced in
1947. The first integrated circuit followed in 1958. Intel’s first
microprocessor—which had only about 2,500 transistors—didn’t
arrive until 1971. Each of those milestones was more than a
decade apart. People think quantum computers are just around
the corner, but history shows these advances take time. If 10 years
from now we have a quantum computer that has a few thousand
qubits, that would certainly change the world in the same way the
first microprocessor did. We and others have been saying it’s 10
years away. Some are saying it’s just three years away, and I would
argue that they don’t understand how complex the technology is.
Juniper Business Use Only
QUANTUM INTERNET: BACK TO THE FUTURE?
The horizons of Quantum Internet and Networking: Quantum
Internet Alliance, coordinated by the Delft University of Technology
in the Netherlands, is tasked with creating a quantum network.
Europe is competing with similar national efforts in China—which in
2016 launched Micius, a quantum communications satellite—as well
as in the United States. Last December, the U.S. government enacted
the National Quantum Initiative Act, which will lavishly fund several
research hubs dedicated to quantum technologies, including
quantum computers and networks.
The main feature of a quantum network is that you are sending
quantum information instead of classical information that deals in
bits that have values of either 0 or 1. Quantum information, however,
uses quantum bits, or qubits, which can be in a superposition of both
0 and 1 at the same time. Qubits can be encoded, for example, in the
polarization states of a photon or in the spin states of electrons and
atomic nuclei.
QKD (Quantum Key Distribution) and QRNG (Quantum Random
Number Generator) : First application is quantum encryptions (see
Quantum Encryption and Information Theoretic Security). In July last
year, University of Geneva, Switzerland, and colleagues reported
distributing secret keys using QKD over a record distance of more
than 400 kilometers of optical fiber, at 6.5 kilobits per second. In
contrast, commercially available systems, provide QKD over 50
kilometers of fiber.
Quantum State Transmission: Ideally, quantum networks will do more than
QKD. The next step would be to transfer quantum states directly
between nodes. There is a more robust way to exchange quantum
information—via the use of another property of quantum systems, called
entanglement. When two particles or quantum systems interact, they can get
entangled. Once entangled, both systems are described by a single quantum
state, so measuring the state of one system instantly influences the state of
the other, even if they are kilometers apart. Einstein called entanglement
“spooky action at a distance,” and it is an invaluable resource for quantum
networks (non superluminal, non faster than speed of light )
Entanglement Swapping : Each node would transmit an entangled photon
through 50 kilometers of optical fiber to a station in the middle. There, the
photons would be measured in such a way that they lose entanglement with
their respective ions, causing the ions themselves to get entangled with each
other. Therefore, the two nodes, 100 kilometers apart, will each form a
quantum link via a pair of entangled qubits. The entire process is called
entanglement swapping. The photon wavelengths were also designed to
cross-connect different transmission systems: optical fibers on one end (1,535
nm) and satellite communications on the other (794 nm). The latter is
important because if quantum networks are to go intercontinental,
entanglement will need to be distributed via satellites. In 2017, a team of the
University of Science and Technology of China in Hefei used Micius, China’s
quantum satellite, to distribute entanglement between ground stations on the
Tibetan Plateau and southwest China. The next best choice may be relatively
inexpensive drones.
Juniper Business Use Only
QUANTUM CRYPTOGRAPHY: IS IT REAL?
The horizons of Quantum Internet and Networking: To send secure
messages online or encrypt the files on a computer, most modern
systems employ asymmetric, or public-key, cryptography. With this
technique, data are encoded with a so-called public key, which is
accessible to all; decoding that information requires a private key
that only one party knows. Although both parts of this system are
called keys, the public key is more like a slotted lockbox: anyone can
drop something in, or encode a secret message, but only the private
key’s holder can unlock the box or decrypt the message. This
arrangement makes such asymmetric cryptography more secure
than a symmetric system—one that is more like an unlocked lockbox
(security depends on keeping the box hidden because a person who
can get to it to drop in a message can also access its contents).
Public-key cryptography (PKC) uses a mathematical algorithm to
generate much more complex keys so the code cannot be run
backward in this way. Different public-key systems can utilize
different algorithms, as long as they are based on mathematical
problems that are easy to put into place but hard to reverse
engineer. For instance, any computer can multiply two extremely
large prime numbers together, yet factoring the result is nearly
impossible— at least, it would be for a classical machine. Quantum
computers can solve the sort of these cryptographic problems on
which we built our cryptography in the 1980s exponentially faster
than classical computers. There are, however, still equations that
quantum algorithms have not yet managed to solve.
For example, a quantum technique called Shor’s algorithm can factor large
numbers exponentially faster than classical machines. That ability means a
quantum computer could crack systems like RSA, a widely used method for
encrypting data. However, while quantum computers can do some things
better against a set of problems, there are tons of other things they just do
not help with—almost at all.
Because there are many of these types of problems, organizations such as
NIST are trying to narrow down the potential options in order to develop a
standardized method for quantum-proof encryption. In 2016 NIST put out a
call for potential postquantum algorithms, and earlier in 2019 it announced it
had winnowed 69 accepted submissions down to 26 leading candidates. The
plan is to select the final algorithms in the next couple of years and to make
them available in draft form by 2024.
Quantum cryptographic devices typically employ individual photons of light
and take advantage that measuring a quantum system in general disturbs it
and yields incomplete information about its state before the measurement.
Eavesdropping on a quantum communications channel therefore causes an
unavoidable disturbance, alerting the legitimate users. Quantum cryptography
exploits this effect to allow two parties who have never met and who share no
secret information beforehand to communicate in absolute secrecy under the
nose of an adversary. Quantum techniques also assist in the achievement of
subtler cryptographic goals, important in the post-cold war world, such as
enabling two mutually distrustful parties to make joint decisions based on
private information, while compromising its confidentiality as little as
possible.
Juniper Business Use Only
QUANTUM SENSORS: REALITY IN QUANTUM REALM ?
Early Quantum Sensor application : Technology improvements in
both HW and SW will drive quantum system further from NISQ
capabilities and fidelity of quantum circuits. However, QC supremacy
applications will require large width of qubits circuits (thousands to
millions), depth circuit cycles and quantum error forward correction
schemes to improve efficiency, on the other side quantum sensor
applications might reach interesting performances in the same NIQS
range but with limited number of qubits (tenths to hundreds) and
low depth for circuit.
There are immediate area for practical applications as in Chemistry,
Biology, Drugs, Medical, Industrial and Environmental and in long
term for Robotic, IoT.
The specialty of Quantum Sensors are to work in low-scale energy
and be able to interpret phenomena at atomic/sub-atomic particle
scales.
Marletto and her colleagues argue the bacteria did more than just couple with the cavity, though. In
their analysis they demonstrate the energy signature produced in the experiment could be consistent
with the bacteria’s photosynthetic systems becoming entangled with the light inside the cavity. In
essence, it appears certain photons were simultaneously hitting and missing photosynthetic molecules
within the bacteria—a hallmark of entanglement. “Our models show that this phenomenon being
recorded is a signature of entanglement between light and certain degrees of freedom inside the
bacteria,” she says.
Juniper Business Use Only
THANKS Q&A

More Related Content

PDF
Age of Quantum computing
PPTX
From Bits to Qubits: Can Medicine Benefit From Quantum Computing?
PDF
Quantum Computers PART 4 Quantum Computer’sHardware by Lili Saghafi
PPTX
Quantum computers
PPTX
Quantum Computing: Welcome to the Future
PDF
The Evolution of Quantum Computers
PDF
Quantum Computers PART 1 & 2 by Prof Lili Saghafi
PDF
Quantum Computers New Generation of Computers part 6 by Prof Lili Saghafi
Age of Quantum computing
From Bits to Qubits: Can Medicine Benefit From Quantum Computing?
Quantum Computers PART 4 Quantum Computer’sHardware by Lili Saghafi
Quantum computers
Quantum Computing: Welcome to the Future
The Evolution of Quantum Computers
Quantum Computers PART 1 & 2 by Prof Lili Saghafi
Quantum Computers New Generation of Computers part 6 by Prof Lili Saghafi

What's hot (20)

PPTX
Quantum computers
PPTX
2013.09.13 quantum computing has arrived s.nechuiviter
PPTX
Quantum Computing by Rajeev Chauhan
PDF
Quantum Computing
PDF
Quantum Computers PART 3 Computer That Program itself by Prof. Lili Saghafi
PPTX
Quantum Computers
PPTX
QUANTUM COMPUTERS
PDF
Quantum Computers New Generation of Computers PART1 by Prof Lili Saghafi
PDF
Quantum computation: EPR Paradox and Bell's Inequality
PDF
Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...
PDF
You always dreamt of your own quantum computer. now you can have it in the cloud
PDF
Quantum computing
PPTX
Quantum computer ppt
PDF
Quantum computing
PPTX
Let's build a quantum computer!
DOCX
Quantum Computing
PPTX
Quantum computing seminar
PPT
Quantum Computers
PPT
Des2017 quantum computing_final
PPT
Quantum Computing
Quantum computers
2013.09.13 quantum computing has arrived s.nechuiviter
Quantum Computing by Rajeev Chauhan
Quantum Computing
Quantum Computers PART 3 Computer That Program itself by Prof. Lili Saghafi
Quantum Computers
QUANTUM COMPUTERS
Quantum Computers New Generation of Computers PART1 by Prof Lili Saghafi
Quantum computation: EPR Paradox and Bell's Inequality
Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...
You always dreamt of your own quantum computer. now you can have it in the cloud
Quantum computing
Quantum computer ppt
Quantum computing
Let's build a quantum computer!
Quantum Computing
Quantum computing seminar
Quantum Computers
Des2017 quantum computing_final
Quantum Computing
Ad

Similar to Quantum nature poli_mi_ddm_200115 (20)

PPTX
Quantum computing COMPLETE LECTURE
PPTX
preskill.pptx
PPTX
Presentation on quantum computers
PDF
Quantum Computing in Financial Services - Executive Summary
PDF
Quantum Computing in Financial Services Executive Summary
PDF
Quantum Computing Explained.pdf
PDF
Quantum computing
DOCX
What is a quantum computerA quantum computer harnesses some of th.docx
PPTX
Quantum Computing and AI
PPT
Ibm quantum computing
PPTX
Quantum Internet Explained
PPTX
Quantum Computing: A Primer on U.S. Preparedness
PPTX
Quantum Information FINAL.pptx
PPTX
QuantumComputersPresentation
PPTX
Introduction to quantum computing
PPTX
quantum computing22.pptx
PPTX
The Future of Quantum Computing
PPTX
Quantum Computing preserntation tamplete.pptx
DOCX
Write up QUANTUM COMPUTING.docx
DOCX
Discover the Future of Computing: Quantum Computers Explained
Quantum computing COMPLETE LECTURE
preskill.pptx
Presentation on quantum computers
Quantum Computing in Financial Services - Executive Summary
Quantum Computing in Financial Services Executive Summary
Quantum Computing Explained.pdf
Quantum computing
What is a quantum computerA quantum computer harnesses some of th.docx
Quantum Computing and AI
Ibm quantum computing
Quantum Internet Explained
Quantum Computing: A Primer on U.S. Preparedness
Quantum Information FINAL.pptx
QuantumComputersPresentation
Introduction to quantum computing
quantum computing22.pptx
The Future of Quantum Computing
Quantum Computing preserntation tamplete.pptx
Write up QUANTUM COMPUTING.docx
Discover the Future of Computing: Quantum Computers Explained
Ad

More from domenico di mola (15)

PDF
Solving the quantum computing security problem
PDF
Issnaf ddm polytechnic of turin_210330 alumni presentation
PDF
Issnaf ddm politecnicodi torino_210330
PDF
Ecoc 2020 25-years_autonomusnetwork_ddm_201208
PDF
Domenico di mola_2023 i_iot_whole_190613
PDF
Onf connect 2019 ddm ver5.2_reviewed_final_slideshare_190906
PDF
Ofc2019 automating 400 g-flyer
PDF
Ihs juniper webinar disaggrgation&automation-2019
PDF
Ofc2014 ddm 100-g
PDF
The dev-theory-talk-v1-final-180423190802
PDF
Tnc18 slides 1___2018-06-09-garr-terenav1
PDF
Tnc18 ddm final_190609
PDF
tip oopt pse-summit2017
PDF
Mwc 2017 oopt-pse_ddm_juniper_1709
PDF
Packet optical transformation ofc2017
Solving the quantum computing security problem
Issnaf ddm polytechnic of turin_210330 alumni presentation
Issnaf ddm politecnicodi torino_210330
Ecoc 2020 25-years_autonomusnetwork_ddm_201208
Domenico di mola_2023 i_iot_whole_190613
Onf connect 2019 ddm ver5.2_reviewed_final_slideshare_190906
Ofc2019 automating 400 g-flyer
Ihs juniper webinar disaggrgation&automation-2019
Ofc2014 ddm 100-g
The dev-theory-talk-v1-final-180423190802
Tnc18 slides 1___2018-06-09-garr-terenav1
Tnc18 ddm final_190609
tip oopt pse-summit2017
Mwc 2017 oopt-pse_ddm_juniper_1709
Packet optical transformation ofc2017

Recently uploaded (20)

PPTX
Presentation for DGJV QMS (PQP)_12.03.2025.pptx
PPTX
The spiral of silence is a theory in communication and political science that...
PPTX
Human Mind & its character Characteristics
PPTX
Project and change Managment: short video sequences for IBA
PPTX
BIOLOGY TISSUE PPT CLASS 9 PROJECT PUBLIC
PPTX
Relationship Management Presentation In Banking.pptx
PPTX
worship songs, in any order, compilation
PDF
Nykaa-Strategy-Case-Fixing-Retention-UX-and-D2C-Engagement (1).pdf
PPTX
Tablets And Capsule Preformulation Of Paracetamol
PPTX
nose tajweed for the arabic alphabets for the responsive
DOCX
ENGLISH PROJECT FOR BINOD BIHARI MAHTO KOYLANCHAL UNIVERSITY
PPTX
Non-Verbal-Communication .mh.pdf_110245_compressed.pptx
PDF
oil_refinery_presentation_v1 sllfmfls.pdf
PPTX
Emphasizing It's Not The End 08 06 2025.pptx
PPTX
INTERNATIONAL LABOUR ORAGNISATION PPT ON SOCIAL SCIENCE
PPTX
_ISO_Presentation_ISO 9001 and 45001.pptx
PPTX
Role and Responsibilities of Bangladesh Coast Guard Base, Mongla Challenges
PPTX
Intro to ISO 9001 2015.pptx wareness raising
PPTX
Tour Presentation Educational Activity.pptx
PPTX
2025-08-10 Joseph 02 (shared slides).pptx
Presentation for DGJV QMS (PQP)_12.03.2025.pptx
The spiral of silence is a theory in communication and political science that...
Human Mind & its character Characteristics
Project and change Managment: short video sequences for IBA
BIOLOGY TISSUE PPT CLASS 9 PROJECT PUBLIC
Relationship Management Presentation In Banking.pptx
worship songs, in any order, compilation
Nykaa-Strategy-Case-Fixing-Retention-UX-and-D2C-Engagement (1).pdf
Tablets And Capsule Preformulation Of Paracetamol
nose tajweed for the arabic alphabets for the responsive
ENGLISH PROJECT FOR BINOD BIHARI MAHTO KOYLANCHAL UNIVERSITY
Non-Verbal-Communication .mh.pdf_110245_compressed.pptx
oil_refinery_presentation_v1 sllfmfls.pdf
Emphasizing It's Not The End 08 06 2025.pptx
INTERNATIONAL LABOUR ORAGNISATION PPT ON SOCIAL SCIENCE
_ISO_Presentation_ISO 9001 and 45001.pptx
Role and Responsibilities of Bangladesh Coast Guard Base, Mongla Challenges
Intro to ISO 9001 2015.pptx wareness raising
Tour Presentation Educational Activity.pptx
2025-08-10 Joseph 02 (shared slides).pptx

Quantum nature poli_mi_ddm_200115

  • 1. Juniper Business Use Only QUANTUM NATURE “Can Quantum-Mechanical Description of Physical Reality be Considered Complete?” May, 15, 1935 Physical Review, Vol.47 October, 15, 1935, Physical review, Vol.48
  • 2. Juniper Business Use Only QUANTUM “SUPREMACY” QUANTUM GEOPOLITICAL STRATEGY QUATUM COMPUTER AND QUBITS QUANTUM ENCRYPTION QUANTUM SENSORS QUANTUM EXECUTIVE SUMMARY
  • 3. Juniper Business Use Only QUANTUM SUPREMACY: A BUZZ OR HYPE?
  • 4. Juniper Business Use Only Sycamore QC (Google) has processed n=53 qubits, m=20 cycles and Ns=1E6 samples with 0.1% of fidelity in 200sec. Classical sampling (classical computer process) and 1M cores would take 10.000 years The same configuration on Google Cloud cluster (classical) would take 50 Trillions/core hrs (50 millions hrs or 6.000 years) and 1M cores with 1 PetaWatt*hr of consumed power Summit SC (the most powerful supercomputer on earth) stops at m=14 cycles because not enough memory QUANTUM SUPREMACY PILLS
  • 5. Juniper Business Use Only IS THERE A QUANTUM GOLDEN RUSH ? VC HW investments in QC are the majority (still) but longer time to return $110M in SW investments across 28 deals. Quantum Cloudification will drive emerging of new Apps Emerging opportunities and short term in encryption, super- sensitive detection devices and new forms of imaging
  • 6. Juniper Business Use Only AN ECOSYSTEM IN DEVELOPMENT:WHERE ARE WE? HW • Psiquantum (CA) • Qbami (CH) • ID Quantique (CHF) • D-Wave (CA) • Rigetti (CA) • QuantumCTek (CH) • …… SW • QCWare (CA) • Zapata Comp. (MA) • Cambridge QC (UK) • ….. VC • Quantonation (FR) • ….. …YET A COMPLETE MAPPING IS NOT AVAILABLE…. Area Total # Total $ (disclosed) Instrumentation, tools and services 5 12.25 $ Quantum communication 26 130.19 $ Quantum computing 26 419.27 $ Quantum software 28 113.05 $ Sensors and Material 3 0.13 $ Total 88 674.89 $
  • 7. Juniper Business Use Only A STRATEGIC POINT OF VIEW Link : https://www.nature.com/QUANTUM-GOLDEN-RUSH $1.2B from US congress on strategic Quantum projects and development Eu1B investments in 10 years over 20 countries on Quantum Flagship Eu650M investment until 2022, plus other sponsored programs $10B committed for Hefei Tech Park on Quantum Information Link: https://www.nature.com/EU-fund
  • 8. Juniper Business Use Only QUANTUM COMPUTER RACE: GAME CHANGER? https://www.scientificamerican.com/article/how-quantum-computers-work/ https://www.scientificamerican.com/article/quantum-computers-compete-for-supremacy/ Bit & Qubit: A common metaphor used to compare the two is a coin. In conventional computer processor a transistor is either up or down, heads or tails. But if I ask you whether that coin is heads or tails while it’s spinning, you might say the answer is both. That’s what a quantum computer builds on. Instead, a conventional bit that’s either 0 or 1, you have a quantum bit that simultaneously represents 0 and 1, until that qubit stops spinning and comes to a resting state (de-coherence). Superposition: The state space—or the ability to sample many possible combinations—is exponential with a quantum computer. Taking the coin metaphor further, imagine I have two coins in my hand, and I toss them in the air at the same time. While they’re both spinning, they would represent four possible states. If I tossed three coins in the air, they would represent eight possible states. If I had 50 coins and tossed them all up in the air and asked you how many states that represents, the answer would be more states than is possible with the largest supercomputer in the world today. Three hundred coins—still a relatively small number— would represent more states than there are atoms in the universe. Collapsing a state-space return qubits in bits of information NISQ & Information theory: The reality is that the coins, or qubits, eventually stop spinning and collapse into a state, whether it’s heads or tails. The goal with quantum computing is to keep them spinning in the superposition of multiple states for a long time. Imagine I have a coin spinning on a table, and someone is shaking that table. That might cause the coin to fall over faster. Noise, temperature change, an electrical fluctuation or vibration—all these things can disturb a qubit’s operation and cause it to lose its data. One way to stabilize certain types of qubits is to keep them very cold. Our qubits operate in a dilution refrigerator that’s about the size of a 55-gallon drum and uses a special isotope of helium to cool them a fraction of a degree above absolute zero (roughly – 273 degrees Celsius). Beyond that we want to improve the quality of the qubits, which will help us test algorithms and build our system. Quality refers to the fidelity with which information is passed along over time. While many parts of the system will improve quality, the biggest advances will come through materials engineering and improvements in the accuracy of the microwave pulses and other control electronics.
  • 9. Juniper Business Use Only QUANTUM COMPUTER AND THEN? https://www.scientificamerican.com/article/how-quantum-computers-work/ https://www.scientificamerican.com/article/quantum-computers-compete-for-supremacy/ https://www.scientificamerican.com/article/beyond-quantum-supremacy-the-hunt-for-useful-quantum-computers/ Field of application (to begin with): Typically, the first quantum algorithms that get proposed are for security (such as cryptography) or chemistry (including bio and bio-engineering) and materials modeling. These are problems that are essentially intractable with conventional computers. Such a computer would make use of entanglement, a phenomenon unique to quantum systems, that particle’s properties are affected by what happens to other particles with which it shares intimate quantum connections. NISQ systems won’t be able to perform full-scale chemistry simulations. But when combined with conventional computers, they might demonstrate an advantage over existing classical simulations. “The classically hard part of the simulation is solved on a quantum processor, while the rest of the work is done on a classical computer An algorithm called variational quantum factoring (VQF), which aims to bring the encryption-breaking, large-number-factoring capabilities of quantum processing to NISQ-era machines. Other quantum algorithm for such work are Shor’s and Grover algorithms. That approach offers a fast route to factoring large numbers but is likely to require hundreds of thousands of qubits to go beyond what is possible on classical machines. Other application can be in processing large data set with “noise” in Quantum ML applications One general problem for NISQ computing comes down to time. Conventional computers can effectively operate indefinitely. A quantum system can lose its correlations, and thus its computing power, in fractions of a second. As a result, a classical computer does not have to run for very long before it can outstrip the capabilities of today’s quantum machines. For now, however, researchers must contend with the fact that there is still no proof that today’s quantum machines will yield anything of use. NISQ could simply turn out to be the name for the broad, possibly featureless landscape researchers must traverse before they can build quantum computers capable of outclassing conventional ones in helpful ways. The history will repeat: The first transistor was introduced in 1947. The first integrated circuit followed in 1958. Intel’s first microprocessor—which had only about 2,500 transistors—didn’t arrive until 1971. Each of those milestones was more than a decade apart. People think quantum computers are just around the corner, but history shows these advances take time. If 10 years from now we have a quantum computer that has a few thousand qubits, that would certainly change the world in the same way the first microprocessor did. We and others have been saying it’s 10 years away. Some are saying it’s just three years away, and I would argue that they don’t understand how complex the technology is.
  • 10. Juniper Business Use Only QUANTUM INTERNET: BACK TO THE FUTURE? The horizons of Quantum Internet and Networking: Quantum Internet Alliance, coordinated by the Delft University of Technology in the Netherlands, is tasked with creating a quantum network. Europe is competing with similar national efforts in China—which in 2016 launched Micius, a quantum communications satellite—as well as in the United States. Last December, the U.S. government enacted the National Quantum Initiative Act, which will lavishly fund several research hubs dedicated to quantum technologies, including quantum computers and networks. The main feature of a quantum network is that you are sending quantum information instead of classical information that deals in bits that have values of either 0 or 1. Quantum information, however, uses quantum bits, or qubits, which can be in a superposition of both 0 and 1 at the same time. Qubits can be encoded, for example, in the polarization states of a photon or in the spin states of electrons and atomic nuclei. QKD (Quantum Key Distribution) and QRNG (Quantum Random Number Generator) : First application is quantum encryptions (see Quantum Encryption and Information Theoretic Security). In July last year, University of Geneva, Switzerland, and colleagues reported distributing secret keys using QKD over a record distance of more than 400 kilometers of optical fiber, at 6.5 kilobits per second. In contrast, commercially available systems, provide QKD over 50 kilometers of fiber. Quantum State Transmission: Ideally, quantum networks will do more than QKD. The next step would be to transfer quantum states directly between nodes. There is a more robust way to exchange quantum information—via the use of another property of quantum systems, called entanglement. When two particles or quantum systems interact, they can get entangled. Once entangled, both systems are described by a single quantum state, so measuring the state of one system instantly influences the state of the other, even if they are kilometers apart. Einstein called entanglement “spooky action at a distance,” and it is an invaluable resource for quantum networks (non superluminal, non faster than speed of light ) Entanglement Swapping : Each node would transmit an entangled photon through 50 kilometers of optical fiber to a station in the middle. There, the photons would be measured in such a way that they lose entanglement with their respective ions, causing the ions themselves to get entangled with each other. Therefore, the two nodes, 100 kilometers apart, will each form a quantum link via a pair of entangled qubits. The entire process is called entanglement swapping. The photon wavelengths were also designed to cross-connect different transmission systems: optical fibers on one end (1,535 nm) and satellite communications on the other (794 nm). The latter is important because if quantum networks are to go intercontinental, entanglement will need to be distributed via satellites. In 2017, a team of the University of Science and Technology of China in Hefei used Micius, China’s quantum satellite, to distribute entanglement between ground stations on the Tibetan Plateau and southwest China. The next best choice may be relatively inexpensive drones.
  • 11. Juniper Business Use Only QUANTUM CRYPTOGRAPHY: IS IT REAL? The horizons of Quantum Internet and Networking: To send secure messages online or encrypt the files on a computer, most modern systems employ asymmetric, or public-key, cryptography. With this technique, data are encoded with a so-called public key, which is accessible to all; decoding that information requires a private key that only one party knows. Although both parts of this system are called keys, the public key is more like a slotted lockbox: anyone can drop something in, or encode a secret message, but only the private key’s holder can unlock the box or decrypt the message. This arrangement makes such asymmetric cryptography more secure than a symmetric system—one that is more like an unlocked lockbox (security depends on keeping the box hidden because a person who can get to it to drop in a message can also access its contents). Public-key cryptography (PKC) uses a mathematical algorithm to generate much more complex keys so the code cannot be run backward in this way. Different public-key systems can utilize different algorithms, as long as they are based on mathematical problems that are easy to put into place but hard to reverse engineer. For instance, any computer can multiply two extremely large prime numbers together, yet factoring the result is nearly impossible— at least, it would be for a classical machine. Quantum computers can solve the sort of these cryptographic problems on which we built our cryptography in the 1980s exponentially faster than classical computers. There are, however, still equations that quantum algorithms have not yet managed to solve. For example, a quantum technique called Shor’s algorithm can factor large numbers exponentially faster than classical machines. That ability means a quantum computer could crack systems like RSA, a widely used method for encrypting data. However, while quantum computers can do some things better against a set of problems, there are tons of other things they just do not help with—almost at all. Because there are many of these types of problems, organizations such as NIST are trying to narrow down the potential options in order to develop a standardized method for quantum-proof encryption. In 2016 NIST put out a call for potential postquantum algorithms, and earlier in 2019 it announced it had winnowed 69 accepted submissions down to 26 leading candidates. The plan is to select the final algorithms in the next couple of years and to make them available in draft form by 2024. Quantum cryptographic devices typically employ individual photons of light and take advantage that measuring a quantum system in general disturbs it and yields incomplete information about its state before the measurement. Eavesdropping on a quantum communications channel therefore causes an unavoidable disturbance, alerting the legitimate users. Quantum cryptography exploits this effect to allow two parties who have never met and who share no secret information beforehand to communicate in absolute secrecy under the nose of an adversary. Quantum techniques also assist in the achievement of subtler cryptographic goals, important in the post-cold war world, such as enabling two mutually distrustful parties to make joint decisions based on private information, while compromising its confidentiality as little as possible.
  • 12. Juniper Business Use Only QUANTUM SENSORS: REALITY IN QUANTUM REALM ? Early Quantum Sensor application : Technology improvements in both HW and SW will drive quantum system further from NISQ capabilities and fidelity of quantum circuits. However, QC supremacy applications will require large width of qubits circuits (thousands to millions), depth circuit cycles and quantum error forward correction schemes to improve efficiency, on the other side quantum sensor applications might reach interesting performances in the same NIQS range but with limited number of qubits (tenths to hundreds) and low depth for circuit. There are immediate area for practical applications as in Chemistry, Biology, Drugs, Medical, Industrial and Environmental and in long term for Robotic, IoT. The specialty of Quantum Sensors are to work in low-scale energy and be able to interpret phenomena at atomic/sub-atomic particle scales. Marletto and her colleagues argue the bacteria did more than just couple with the cavity, though. In their analysis they demonstrate the energy signature produced in the experiment could be consistent with the bacteria’s photosynthetic systems becoming entangled with the light inside the cavity. In essence, it appears certain photons were simultaneously hitting and missing photosynthetic molecules within the bacteria—a hallmark of entanglement. “Our models show that this phenomenon being recorded is a signature of entanglement between light and certain degrees of freedom inside the bacteria,” she says.
  • 13. Juniper Business Use Only THANKS Q&A