|
|
xi | |
|
|
xv | |
Preface |
|
xvii | |
Acknowledgments |
|
xix | |
Intro |
|
1 | (22) |
|
Part 01 Quantum Technologies |
|
|
23 | (280) |
|
1 Small Phenomena, Big Implications |
|
|
25 | (6) |
|
|
25 | (1) |
|
|
26 | (1) |
|
|
27 | (2) |
|
|
29 | (2) |
|
2 Quantum Sensing and Metrology |
|
|
31 | (46) |
|
2.1 First-Generation Quantum Sensing |
|
|
36 | (3) |
|
2.2 Modern Quantum Sensing Approaches |
|
|
39 | (8) |
|
2.3 Quantum Sensing Applications |
|
|
47 | (27) |
|
|
47 | (4) |
|
|
51 | (14) |
|
2.3.3 Sensing Gravitational Fields |
|
|
65 | (3) |
|
2.3.4 Quantum Illumination |
|
|
68 | (3) |
|
|
71 | (3) |
|
2.4 From SIGINT to MASINT |
|
|
74 | (1) |
|
2.5 Quantum Sensing: Conclusion |
|
|
75 | (2) |
|
3 Understanding Computation |
|
|
77 | (44) |
|
3.1 Mechanical Calculation |
|
|
78 | (2) |
|
3.2 The Birth of Machine Computation |
|
|
80 | (3) |
|
3.2.1 Combinatorial Problems |
|
|
80 | (2) |
|
|
82 | (1) |
|
|
83 | (8) |
|
3.3.1 Encoding Digital Information |
|
|
86 | (4) |
|
3.3.2 Digital Computation |
|
|
90 | (1) |
|
3.4 Computing, Computability and Turing Complete |
|
|
91 | (7) |
|
3.4.1 Introducing The Halting Problem |
|
|
94 | (2) |
|
3.4.2 The Halting Problem Cannot Be Solved |
|
|
96 | (1) |
|
3.4.3 Using The Halting Problem |
|
|
97 | (1) |
|
3.5 Moore's Law, Exponential Growth, and Complexity Theory |
|
|
98 | (20) |
|
|
102 | (4) |
|
3.5.2 Polynomial Complexity (P) |
|
|
106 | (1) |
|
|
107 | (3) |
|
3.5.4 NP-Complete and NP-Hard |
|
|
110 | (5) |
|
3.5.5 NP-Complete Problems Are Solvable! |
|
|
115 | (1) |
|
3.5.6 BQP, BPP, and Beyond |
|
|
116 | (2) |
|
|
118 | (1) |
|
|
119 | (2) |
|
4 The Birth of Quantum Computing |
|
|
121 | (52) |
|
4.1 Why Quantum Computers? |
|
|
122 | (2) |
|
4.1.1 Richard Feynman and Quantum Computing |
|
|
122 | (2) |
|
|
124 | (12) |
|
|
125 | (1) |
|
4.2.2 The Second Law of Thermodynamics |
|
|
126 | (4) |
|
4.2.3 Reversible Computation |
|
|
130 | (4) |
|
|
134 | (2) |
|
4.3 Cellular Automata and Conway's Life |
|
|
136 | (9) |
|
4.3.1 Computing with CPUs, GPUs, and CA(s) |
|
|
136 | (4) |
|
|
140 | (5) |
|
|
145 | (6) |
|
4.4.1 Edward Fredkin and Project MAC |
|
|
146 | (5) |
|
4.5 Reversible Computing and Supercomputing |
|
|
151 | (8) |
|
4.5.1 A Most Successful Term Paper |
|
|
151 | (2) |
|
4.5.2 Reversible Computing Today |
|
|
153 | (4) |
|
|
157 | (2) |
|
4.6 The Conference on The Physics of Computation (1981) |
|
|
159 | (3) |
|
4.7 Russia and Quantum Computing |
|
|
162 | (2) |
|
4.8 Aftermath: The Quantum Computing Baby |
|
|
164 | (9) |
|
4.8.1 Growing Academic Interest |
|
|
164 | (4) |
|
4.8.2 The First Quantum Computers |
|
|
168 | (1) |
|
|
169 | (4) |
|
5 Quantum Computing Applications |
|
|
173 | (56) |
|
5.1 Simulating Physical Chemistry |
|
|
174 | (14) |
|
5.1.1 Nitrogen Fixation, without Simulation |
|
|
181 | (3) |
|
5.1.2 Modeling Chemical Reactions |
|
|
184 | (4) |
|
5.2 Quantum Factoring (Shor's Algorithm) |
|
|
188 | (22) |
|
5.2.1 An Introduction to Cryptography |
|
|
190 | (6) |
|
5.2.2 Forty Years of Public Key Cryptography |
|
|
196 | (3) |
|
5.2.3 Cracking Public Key with Shor's Algorithm |
|
|
199 | (4) |
|
5.2.4 Evaluating The Quantum Computer Threat to Public Key Cryptography |
|
|
203 | (5) |
|
5.2.5 Post-Quantum Cryptography |
|
|
208 | (2) |
|
5.3 Quantum Search (Graver's Algorithm) |
|
|
210 | (16) |
|
5.3.1 Symmetric Ciphers: DES and AES |
|
|
210 | (4) |
|
5.3.2 Brute-Force Key Search Attacks |
|
|
214 | (4) |
|
5.3.3 Cracking AES-128 with Graver's Algorithm |
|
|
218 | (5) |
|
5.3.4 Graver's Algorithm Today |
|
|
223 | (3) |
|
|
226 | (3) |
|
6 Quantum Computing Today |
|
|
229 | (28) |
|
6.1 How to Build a Quantum Computer |
|
|
231 | (4) |
|
6.2 The Quantum Computer Landscape |
|
|
235 | (7) |
|
6.2.1 Comparing Quantum Media |
|
|
236 | (1) |
|
6.2.2 Five Kinds of Quantum Computers |
|
|
237 | (5) |
|
6.3 Skeptics Present Quantum Computing's Challenges |
|
|
242 | (11) |
|
6.3.1 Scientific Challenges |
|
|
243 | (2) |
|
6.3.2 Engineering Challenges |
|
|
245 | (3) |
|
6.3.3 Validation Challenges |
|
|
248 | (1) |
|
6.3.4 Ecosystem Challenges |
|
|
248 | (1) |
|
6.3.5 Quantum Supremacy and Quantum Advantage |
|
|
249 | (4) |
|
6.4 The Outlook for Quantum Computing |
|
|
253 | (4) |
|
|
257 | (46) |
|
7.1 Information-Theoretic Security |
|
|
260 | (4) |
|
7.1.1 An Easy Math Problem |
|
|
260 | (1) |
|
7.1.2 A Hard Math Problem |
|
|
261 | (1) |
|
7.1.3 An Impossible Math Problem |
|
|
262 | (2) |
|
7.2 Golden Ages: SIGINT and Encryption Adoption |
|
|
264 | (7) |
|
7.2.1 The Golden Age of SIGINT |
|
|
264 | (6) |
|
7.2.2 The Golden Age of Encryption |
|
|
270 | (1) |
|
7.3 Quantum Random Number Generation (QRNG) |
|
|
271 | (5) |
|
7.4 Quantum Key Distribution |
|
|
276 | (17) |
|
|
277 | (2) |
|
|
279 | (4) |
|
|
283 | (3) |
|
|
286 | (3) |
|
7.4.5 QKD Commercialized, Miniaturized |
|
|
289 | (4) |
|
|
293 | (7) |
|
|
300 | (3) |
|
Part 10 Shaping the Quantum Future |
|
|
303 | (166) |
|
8 Quantum Technologies and Possible Futures |
|
|
305 | (70) |
|
8.1 Do Quantum Artifacts Have Politics? |
|
|
305 | (4) |
|
|
307 | (1) |
|
8.1.2 Future Quantum Technology Scenarios |
|
|
308 | (1) |
|
8.2 Scenario 1: Government Superior and Dominant |
|
|
309 | (38) |
|
|
310 | (5) |
|
8.2.2 Strategic Surprise: Cryptanalysis |
|
|
315 | (7) |
|
8.2.3 Forged Signatures and Our Legal Realities |
|
|
322 | (3) |
|
8.2.4 Attacks on Passwords and Other Authentication Systems |
|
|
325 | (6) |
|
8.2.5 Strategic Surprise: Nuclear Weapons |
|
|
331 | (1) |
|
8.2.6 Quantum Strategic Surprise: Chemical, Biological, and Genetic Weapons |
|
|
332 | (3) |
|
8.2.7 Strategic Surprise: Remote Sensing |
|
|
335 | (4) |
|
8.2.8 Quantum Strategic Surprise: QKD and Quantum Internet |
|
|
339 | (2) |
|
8.2.9 Quantum Strategic Surprise: Secrecy and Leakage |
|
|
341 | (3) |
|
8.2.10 Countermeasures in a Government-Dominant Scenario: Disruption, Denial, Degradation, Destruction, and Deception |
|
|
344 | (3) |
|
8.3 Scenario 2: Public/Private Utopia |
|
|
347 | (14) |
|
8.3.1 How Quantum Technologies Could Change Governance and Law |
|
|
350 | (5) |
|
8.3.2 Implications for Human Primacy |
|
|
355 | (6) |
|
8.4 Scenario 3: Public/Private, East/West Bloc |
|
|
361 | (5) |
|
8.5 Scenario 4: Quantum winter |
|
|
366 | (6) |
|
|
372 | (3) |
|
|
375 | (82) |
|
9.1 Quantum Technology's Policy Impact |
|
|
376 | (4) |
|
9.1.1 Game-Changers: Code-Breaking and Possibly Machine Learning |
|
|
378 | (1) |
|
9.1.2 Quantum Technology Dominance |
|
|
379 | (1) |
|
|
380 | (21) |
|
9.2.1 National Quantum Investments outside The US |
|
|
380 | (3) |
|
9.2.2 US Quantum Technology Industrial Policy |
|
|
383 | (2) |
|
9.2.3 Industrial Policy: Options and Risks |
|
|
385 | (7) |
|
9.2.4 Innovation and The Taxpayer |
|
|
392 | (5) |
|
9.2.5 The Risk of Choosing Poorly |
|
|
397 | (4) |
|
|
401 | (10) |
|
9.3.1 Graduate Training in QIS |
|
|
401 | (6) |
|
9.3.2 The Human Capital Challenge |
|
|
407 | (1) |
|
9.3.3 Faculty Research Incentives |
|
|
408 | (3) |
|
9.4 National Security and Quantum Technologies |
|
|
411 | (15) |
|
|
413 | (9) |
|
9.4.2 Quantum Technology and Space Law |
|
|
422 | (2) |
|
9.4.3 Quantum Technology and Cybersecurity |
|
|
424 | (2) |
|
9.5 Quantum Technology and Privacy |
|
|
426 | (14) |
|
9.5.1 Secrets and Their Time Value |
|
|
427 | (1) |
|
9.5.2 Regulation of Decryption |
|
|
428 | (5) |
|
9.5.3 Challenges of Government Power |
|
|
433 | (4) |
|
9.5.4 The European Approach to Privacy Rights |
|
|
437 | (3) |
|
|
440 | (6) |
|
9.6.1 Product development |
|
|
441 | (2) |
|
|
443 | (3) |
|
9.7 Measuring Quantum's Research Output |
|
|
446 | (8) |
|
9.7.1 Academic Publications |
|
|
446 | (5) |
|
9.7.2 Quantum Technology's Patent Output |
|
|
451 | (3) |
|
|
454 | (3) |
|
10 The Quantum Age: Conclusions |
|
|
457 | (12) |
|
10.1 Quantum Computing Winter Is a Probable Scenario for 2030 |
|
|
458 | (2) |
|
10.1.1 Public/Private Scenario |
|
|
459 | (1) |
|
10.2 Assessing the Next Decade of Quantum Technologies |
|
|
460 | (4) |
|
10.2.1 Prospects for Quantum Sensing |
|
|
460 | (1) |
|
10.2.2 Prospects for Quantum Computing |
|
|
461 | (1) |
|
10.2.3 Prospects for Quantum Communications |
|
|
462 | (2) |
|
10.3 Law and Policy Priorities for the Quantum Age |
|
|
464 | (5) |
|
|
469 | (2) |
|
A Introduction to the Quantum Realm |
|
|
471 | (12) |
|
A.1 The Quantum World: A Brief Introduction |
|
|
472 | (1) |
|
A.2 Terminology, Size, and Frequency |
|
|
473 | (10) |
|
|
474 | (1) |
|
|
475 | (2) |
|
|
477 | (2) |
|
|
479 | (4) |
|
B Introduction to Quantum Effects |
|
|
483 | (42) |
|
|
483 | (18) |
|
|
484 | (4) |
|
B.1.2 Light: Newton Thought It Was a Particle |
|
|
488 | (1) |
|
B.1.3 Light: It Acts Like a Wave |
|
|
488 | (4) |
|
B.1.4 Light: How Can It Possibly Be a Wave? |
|
|
492 | (9) |
|
B.2 Quantum Effects 1: Uncertainty |
|
|
501 | (4) |
|
B.3 Quantum Effects 2: Polarization |
|
|
505 | (8) |
|
B.3.1 Six Experiments with Quantum Polarization |
|
|
509 | (4) |
|
B.4 Quantum Effects 3: Entanglement |
|
|
513 | (4) |
|
B.5 Quantum Effects 4: Superposition |
|
|
517 | (5) |
|
|
522 | (3) |
Bibliography |
|
525 | (42) |
Index |
|
567 | (10) |
Colophon |
|
577 | |