Quantum Computing — Revision Notes
⚡ 30-Second Revision
- <b>Qubits:</b> Quantum bits (0, 1, or superposition).
- <b>Superposition:</b> Qubit exists in multiple states simultaneously.
- <b>Entanglement:</b> Linked qubits, states correlated instantly.
- <b>Decoherence:</b> Loss of quantum state due to noise (major challenge).
- <b>Shor's Algorithm:</b> Breaks RSA/ECC encryption (factoring).
- <b>Grover's Algorithm:</b> Speeds up database search.
- <b>NM-QT (India):</b> INR 8000 Cr, 5 years, indigenous quantum tech (2020-2025).
- <b>QKD:</b> Quantum Key Distribution, physics-based secure key exchange.
- <b>PQC:</b> Post-Quantum Cryptography, classical algorithms quantum-resistant.
- <b>Quantum Supremacy:</b> Quantum computer outperforms classical for specific task (Google Sycamore, China Jiuzhang).
- <b>Applications:</b> Drug discovery, finance, cybersecurity, materials, AI.
2-Minute Revision
Quantum computing leverages quantum mechanics (superposition, entanglement) to process information using qubits, which can exist in multiple states simultaneously. This enables exponential speedups for specific complex problems, unlike classical bits that are strictly 0 or 1.
Key algorithms include Shor's (threat to current encryption) and Grover's (database search). A major challenge is decoherence, the fragility of qubits, leading to high error rates. Global players like IBM, Google, and China are racing in hardware development, with milestones like 'quantum supremacy' demonstrating potential.
For cybersecurity, quantum computing poses a threat to current public-key encryption, necessitating two solutions: Quantum Key Distribution (QKD) for physics-based secure key exchange, and Post-Quantum Cryptography (PQC) for quantum-resistant algorithms running on classical computers.
India's National Mission on Quantum Technologies (NM-QT) is a strategic initiative (INR 8000 Cr, 5 years) to build indigenous capabilities in quantum computing, communication, sensing, and materials, crucial for national security and economic competitiveness.
Applications span drug discovery, finance, logistics, and advanced AI, promising a transformative impact across sectors.
5-Minute Revision
Quantum computing is a revolutionary field utilizing quantum mechanical phenomena—superposition, entanglement, and interference—to perform computations. Its fundamental unit, the qubit, unlike a classical bit, can exist in a superposition of 0 and 1 simultaneously, allowing for parallel processing.
Entanglement links qubits, creating complex correlations vital for quantum algorithms. However, qubits are fragile, suffering from decoherence, the loss of their quantum state due to environmental noise, which is a primary challenge requiring sophisticated quantum error correction.
Key quantum algorithms include Shor's, which can efficiently factor large numbers, posing a significant threat to current public-key encryption (RSA, ECC), and Grover's, which offers a quadratic speedup for unstructured database searches. The concept of 'quantum supremacy' (or advantage) has been demonstrated by Google (Sycamore) and China (Jiuzhang), proving quantum computers can solve specific problems beyond classical capabilities.
In cybersecurity, two main approaches address the quantum threat: Quantum Key Distribution (QKD), which uses quantum physics to establish unconditionally secure cryptographic keys, and Post-Quantum Cryptography (PQC), which are classical algorithms designed to be resistant to quantum attacks. PQC is the focus for widespread migration due to its scalability and compatibility with existing infrastructure, while QKD offers ultra-secure point-to-point communication, often via satellites.
Globally, major players like IBM, Google, and China are leading hardware development, with significant investments. India has launched its National Mission on Quantum Technologies (NM-QT) with an outlay of INR 8000 Crores over five years (2020-2025).
This mission aims to develop indigenous capabilities in quantum computing, communication, sensing, and materials, involving institutions like DST, DRDO, IISc, and IITs. NM-QT is crucial for India's national security, technological sovereignty, and economic competitiveness.
Applications of quantum computing are vast, including accelerating drug discovery and materials design, optimizing financial models and logistics, enhancing artificial intelligence, and securing communications. While still in its early 'NISQ' (Noisy Intermediate-Scale Quantum) era, quantum computing promises to redefine technological frontiers, making it a critical area for UPSC aspirants to understand from technical, strategic, and policy perspectives.
Prelims Revision Notes
<b>Core Concepts:</b>
- <b>Qubit:</b> Quantum bit, can be 0, 1, or both (superposition).
- <b>Superposition:</b> Qubit exists in multiple states simultaneously. Enables parallel processing.
- <b>Entanglement:</b> Qubits linked, state of one affects others instantly. Key for complex algorithms.
- <b>Decoherence:</b> Loss of quantum state due to environmental interaction. Major challenge, causes errors.
- <b>Quantum Gates:</b> Operations on qubits (e.g., Hadamard for superposition, CNOT for entanglement).
<b>Key Algorithms:</b>
- <b>Shor's Algorithm:</b> Factors large numbers. Threat to RSA/ECC encryption.
- <b>Grover's Algorithm:</b> Quadratic speedup for unstructured database search.
- <b>VQE/QAOA:</b> Hybrid algorithms for NISQ devices (optimization, chemistry).
<b>Hardware & Milestones:</b>
- <b>Superconducting Qubits:</b> IBM, Google (Sycamore). Requires extreme cooling.
- <b>Trapped Ions:</b> IonQ, Quantinuum. High coherence.
- <b>Photonic Qubits:</b> Xanadu, China (Jiuzhang). Room temperature potential.
- <b>Quantum Supremacy:</b> Google Sycamore (2019), China Jiuzhang (2020). Quantum computer outperforms classical for specific task.
<b>Cybersecurity:</b>
- <b>Quantum Threat:</b> Shor's algorithm can break current public-key crypto.
- <b>QKD (Quantum Key Distribution):</b> Physics-based secure key exchange. Dedicated hardware, distance limited. China's Micius satellite.
- <b>PQC (Post-Quantum Cryptography):</b> Classical algorithms resistant to quantum attacks. Software-based, scalable. NIST standardization.
<b>India's NM-QT:</b>
- <b>Launch:</b> 2020, 5 years, INR 8000 Crores.
- <b>Objectives:</b> R&D, HRD, infrastructure, tech/app development (computing, communication, sensing, materials).
- <b>Key Institutions:</b> DST (nodal), DRDO (defense), IISc, IITs, C-DAC.
- <b>Relevance:</b> Strategic autonomy, national security, economic competitiveness.
Mains Revision Notes
<b>Introduction:</b> Quantum computing as a paradigm shift, leveraging quantum mechanics for intractable problems.
<b>1. Fundamental Principles & Working:</b> - <b>Qubits:</b> Superposition (parallel processing), Entanglement (correlated states). - <b>Quantum Gates:</b> Manipulation of qubits. - <b>Decoherence:</b> Primary challenge, leads to errors, limits coherence time. - <b>Quantum Error Correction:</b> Essential for fault tolerance, but resource-intensive.
<b>2. Applications & Impact:</b> - <b>Healthcare:</b> Drug discovery (molecular simulation), personalized medicine. - <b>Finance:</b> Portfolio optimization, fraud detection, risk analysis. - <b>Cybersecurity:</b> Threat (Shor's), Solution (QKD, PQC).
- <b>Materials Science:</b> Novel material design (superconductors, catalysts). - <b>AI/ML:</b> Quantum machine learning (QML) for complex data. - <b>Logistics:</b> Supply chain optimization, routing.
- <b>National Security:</b> Secure communication, defense applications, intelligence.
<b>3. Challenges & Road Ahead:</b> - <b>Technical:</b> Decoherence, scalability, fault tolerance, environmental control (cryogenics). - <b>Economic:</b> High R&D cost, infrastructure investment, skilled manpower shortage. - <b>Ethical/Governance:</b> Data privacy, algorithmic bias, quantum divide, regulation. - <b>NISQ Era:</b> Current stage, noisy intermediate-scale quantum devices.
<b>4. India's Strategic Response (NM-QT):</b> - <b>Rationale:</b> Technological sovereignty, economic competitiveness, national security. - <b>Objectives:</b> Comprehensive R&D, HRD, infrastructure, application development. - <b>Outlay & Duration:</b> INR 8000 Cr, 5 years (2020-2025). - <b>Institutional Players:</b> DST, DRDO, IISc, IITs, C-DAC. - <b>Impact:</b> Indigenous capabilities, quantum-safe infrastructure, global leadership.
<b>5. Cybersecurity in Quantum Era:</b> - <b>Quantum Threat:</b> Shor's algorithm breaking RSA/ECC. - <b>QKD:</b> Physics-based, point-to-point, hardware-dependent, limited distance (satellite QKD for long range). - <b>PQC:</b> Mathematical, software-based, scalable, replaces existing crypto, NIST standardization (key for widespread adoption).
<b>Conclusion:</b> Quantum computing is a dual-use technology with transformative potential but significant challenges. India's proactive NM-QT is vital for securing its future in this critical technological race, necessitating a balanced approach to R&D, policy, and international collaboration.
Vyyuha Quick Recall
<b>Vyyuha QUICK RECALL 'QUEST' for Quantum Computing Essentials:</b>
- <b>Q</b>ubits: Superposition & Entanglement are key.
- <b>U</b>nderlying Principles: Quantum Mechanics (not classical physics).
- <b>E</b>ncryption Threat: Shor's Algorithm breaks RSA/ECC.
- <b>S</b>olutions: QKD (Quantum Key Distribution) & PQC (Post-Quantum Cryptography).
- <b>T</b>echnology for India: NM-QT (National Mission on Quantum Technologies).
<b>Vyyuha '3C Framework' for Quantum Computing Analysis:</b>
- <b>C</b>oncepts: Superposition, Entanglement, Decoherence.
- <b>C</b>hallenges: Decoherence, Scalability, Error Correction.
- <b>C</b>onsequences: Cybersecurity threat, Applications, National Security.