Book Image

Quantum Computing Algorithms

By : Barry Burd
5 (1)
Book Image

Quantum Computing Algorithms

5 (1)
By: Barry Burd

Overview of this book

Navigate the quantum computing spectrum with this book, bridging the gap between abstract, math-heavy texts and math-avoidant beginner guides. Unlike intermediate-level books that often leave gaps in comprehension, this all-encompassing guide offers the missing links you need to truly understand the subject. Balancing intuition and rigor, this book empowers you to become a master of quantum algorithms. No longer confined to canned examples, you'll acquire the skills necessary to craft your own quantum code. Quantum Computing Algorithms is organized into four sections to build your expertise progressively. The first section lays the foundation with essential quantum concepts, ensuring that you grasp qubits, their representation, and their transformations. Moving to quantum algorithms, the second section focuses on pivotal algorithms — specifically, quantum key distribution and teleportation. The third section demonstrates the transformative power of algorithms that outpace classical computation and makes way for the fourth section, helping you to expand your horizons by exploring alternative quantum computing models. By the end of this book, quantum algorithms will cease to be mystifying as you make this knowledge your asset and enter a new era of computation, where you have the power to shape the code of reality.
Table of Contents (19 chapters)
Free Chapter
Part 1 Nuts and Bolts
Part 2 Making Qubits Work for You
Part 3 Quantum Computing Algorithms
Part 4 Beyond Gate-Based Quantum Computing

A Fanciful Tale about Cryptography

In our modern society, information privacy is essential. If people knew your credit card number, you could lose lots of money. If your medical records became public, a potential employer may decide not to hire you. If a foolish remark you made when you were ten years old circulated on social media sites, you could be banned from public office. And if a snooper catches you sending certain kinds of sell all my shares emails, you could go to jail for years and years.

Methods for sending secret messages have been around for millennia. One of the older methods is called the Caesar Cipher because it’s named after the emperor himself – Julius Caesar. But secret messages can be intercepted and decrypted. One of the most famous cases took place during World War II when a team of researchers led by Alan Turing created a device to decrypt German military communications.

A common way to encrypt a message is to mix the message’s content...