Book Image

Quantum Computing with Silq Programming

By : Srinjoy Ganguly, Thomas Cambier
Book Image

Quantum Computing with Silq Programming

By: Srinjoy Ganguly, Thomas Cambier

Overview of this book

Quantum computing is a growing field, with many research projects focusing on programming quantum computers in the most efficient way possible. One of the biggest challenges faced with existing languages is that they work on low-level circuit model details and are not able to represent quantum programs accurately. Developed by researchers at ETH Zurich after analyzing languages including Q# and Qiskit, Silq is a high-level programming language that can be viewed as the C++ of quantum computers! Quantum Computing with Silq Programming helps you explore Silq and its intuitive and simple syntax to enable you to describe complex tasks with less code. This book will help you get to grips with the constructs of the Silq and show you how to write quantum programs with it. You’ll learn how to use Silq to program quantum algorithms to solve existing and complex tasks. Using quantum algorithms, you’ll also gain practical experience in useful applications such as quantum error correction, cryptography, and quantum machine learning. Finally, you’ll discover how to optimize the programming of quantum computers with the simple Silq. By the end of this Silq book, you’ll have mastered the features of Silq and be able to build efficient quantum applications independently.
Table of Contents (19 chapters)
Section 1: Essential Background and Introduction to Quantum Computing
Section 2: Challenges in Quantum Programming and Silq Programming
Section 3: Quantum Algorithms Using Silq Programming
Section 4: Applications of Quantum Computing

Understanding quantum key distribution

Most widely used classical cryptographic algorithms rely on the assumption that an attacker cannot easily solve hard mathematical problems due to the limitation of their computational power. However, some quantum algorithms, such as Shor's factorization of integers, could break this assumption should a large enough quantum computer be built one day.

The goal of quantum cryptography is thus to design new cryptographic techniques that make use of the properties of quantum mechanics, such as the no-cloning theorem and the Heisenberg uncertainty principle, to build secure systems. Thus, unlike its classical counterpart, quantum cryptography does not need computational assumptions to defend against attacks, but relies instead on the laws of quantum physics.

Several protocols have been defined to tackle quantum key distribution, the two most famous being BB84 introduced by Charles H. Bennett and Gilles Brassard in 1984 and E91 introduced...