P283 QC Studie-V 1 0.Pdf
Total Page:16
File Type:pdf, Size:1020Kb
Entwicklungsstand Quantencomputer Document history Version Date Editor Description 1.0 May 2018 Document status after main phase of project Federal Offce for Information Security Post Box 20 03 63 D-53133 Bonn Phone: +49 22899 9582-0 E-Mail: [email protected] Internet: https://www.bsi.bund.de © Federal Offce for Information Security 2017 Introduction Introduction This study discusses the current (Fall 2017) state of affairs in the physical implementation of quantum computing as well as algorithms to be run on them, focused on application in cryptanalysis. It is supposed to be an orientation to scientists with a connection to one of the felds involved—mathematicians, computer scientists. These will fnd the treatment of their own feld slightly superfcial but beneft from the discussion in the other sections. The executive summary as well as the introduction and conclusions to each chapter provide actionable information to decision makers. The text is separated into multiple parts that are related (but not identical) to previous work packages of this project. Authors Frank K. Wilhelm, Saarland University Rainer Steinwandt, Florida Atlantic University, USA Brandon Langenberg, Florida Atlantic University, USA Per J. Liebermann, Saarland University Anette Messinger, Saarland University Peter K. Schuhmacher, Saarland University Copyright The study including all its parts are copyrighted by the BSI–Federal Offce for Information Security. Any use outside the limits defned by the copyright law without approval by the BSI is not permitted and punishable. This covers reproduction, translation, micro flming, and storing and processing in electronic systems. BSI-Reference BSI Title: Entwicklungsstand Quantencomputer BSI Project Number: 283 Federal Office for Information Security 3 Table of Contents Table of Contents Introduction......................................................................................................................................................................................... 3 Authors............................................................................................................................................................................................. 3 Copyright......................................................................................................................................................................................... 3 BSI-Reference................................................................................................................................................................................ 3 Index of Figures................................................................................................................................................................................ 10 Index of Tables.................................................................................................................................................................................. 14 1 Deutsche Zusammenfassung..................................................................................................................................................... 17 1.1 Was ist ein Quantencomputer?.......................................................................................................................................... 17 1.2 Die Relevanz von Quantencomputern für die Kryptoanalyse............................................................................17 1.3 Hardware für Quantencomputer......................................................................................................................................18 1.4 Aktuelle Entwicklungen........................................................................................................................................................ 20 1.5 Extrapolation.............................................................................................................................................................................. 20 2 Synopsis................................................................................................................................................................................................ 23 2.1 Basic idea....................................................................................................................................................................................... 23 2.2 Hardware platforms................................................................................................................................................................. 23 2.3 Algorithmic goals...................................................................................................................................................................... 24 2.4 Computational Models........................................................................................................................................................... 25 2.5 Evaluation along computational models.......................................................................................................................26 2.6 Evaluation of platforms......................................................................................................................................................... 27 2.7 Extrapolation.............................................................................................................................................................................. 31 2.8 Alternative platforms.............................................................................................................................................................. 32 2.9 Global activities and potential for development........................................................................................................33 2.10 Risks................................................................................................................................................................................................. 33 Part I: Evaluating and benchmarking quantum computing hardware..................................................................34 3 Introduction to computational models and their requirements..............................................................................35 3.1 Structure and requirements of an evaluation system.............................................................................................35 3.2 Basic principles and notions of evaluating fault tolerant gate-based quantum computing.................36 4 Are recent quantum supremacy proposals relevant for cryptanalysis?................................................................39 4.1 Fault tolerance vs. near-term quantum supremacy.................................................................................................39 4.2 Quantitative Analysis.............................................................................................................................................................. 39 5 Low-level analysis of qubit systems........................................................................................................................................ 41 5.1 Initial remarks............................................................................................................................................................................ 41 5.2 The DiVincenzo criteria reviewed..................................................................................................................................... 41 5.3 Coherence time scales............................................................................................................................................................. 43 5.4 Qubit defnition indicators................................................................................................................................................... 46 5.5 Qubit initialization indicators............................................................................................................................................. 47 5.6 Readout indicators.................................................................................................................................................................... 47 5.7 Final remarks.............................................................................................................................................................................. 49 6 Benchmarking qubits..................................................................................................................................................................... 50 Federal Office for Information Security 5 Table of Contents 6.1 Introduction................................................................................................................................................................................ 50 6.2 Benchmarking and error mitigation techniques.......................................................................................................50 6.3 Qualitative criteria beyond DiVincenzo.........................................................................................................................50 6.4 Benchmarking operations.................................................................................................................................................... 51 7 Connecting physical and logical qubits with fault tolerant quantum