Science
Learning Corner
Beginner 28 min read

Quantum Computing

From Schrödinger's cat to quantum supremacy — understand the computers that could change everything

Think of it as a

Parallel Universe Computer

Instead of checking one possibility at a time, quantum computers exploit the weird rules of physics to process information in fundamentally new ways — solving certain problems that would take classical computers longer than the age of the universe.

The Coin Analogy

A classical bit is like a coin lying on a table — it's either heads (1) or tails (0). That's it. Every bit in your phone, your laptop, every server on earth stores information this way: definite, certain, one or the other.

A qubit is like a coin spinning in the air. While it spins, it's not heads and tails — it's in a state that has some probability of landing heads and some probability of landing tails. Only when it lands (when you measure it) does it become a definite value. This is superposition.

Classical Bit HEADS = 1 (definite) OR TAILS = 0 (definite) Qubit undetermined until measured

⚠️ Important: Superposition is not "being in two states at once." It's a mathematical description of a state that has amplitudes (complex numbers) associated with each possible outcome. These amplitudes determine the probability of each result when measured. The coin analogy is useful but imperfect — a spinning coin already "is" one side, we just can't see it. A qubit genuinely has no definite value until observed.

Why Do We Need Quantum Computers?

Classical computers are incredible. But some problems grow so explosively that even all the computers on Earth working together until the heat death of the universe couldn't solve them. These aren't obscure puzzles — they're problems in drug discovery, cryptography, materials science, and optimization that affect billions of lives.

The Exponential Wall Problem Size (n) Time to Solve Classical: 2ⁿ Quantum Gap grows exponentially

💊 Drug Discovery

Simulating molecular interactions to find new drugs. A caffeine molecule needs ~10⁴⁸ classical states to fully simulate.

🔐 Cryptography

Factoring a 2048-bit RSA key would take classical computers billions of years. Shor's algorithm could do it in hours.

📦 Optimization

Finding the best route among millions of possibilities. Logistics, finance, scheduling — combinatorial explosion.

A Brief History

1981 Feynman proposes QC 1994 Shor's Algorithm 1996 Grover's Search 2001 IBM factors 15 = 3 × 5 2019 Google "Supremacy" 2023 IBM 1,121 qubits 2024 NIST PQC Standards

Classical vs Quantum: Side by Side

🖥️ Classical Computer

  • Bits: 0 or 1
  • Deterministic operations
  • Perfect at sequential tasks
  • Error-free (at logic level)
  • Billions of reliable transistors
  • Room temperature operation
  • Great at: databases, web, video, AI training

⚛️ Quantum Computer

  • Qubits: superposition of 0 and 1
  • Probabilistic outcomes
  • Exploits interference & entanglement
  • Extremely error-prone (for now)
  • Dozens to ~1000 noisy qubits
  • Near absolute zero (15 mK)
  • Great at: simulation, factoring, optimization

Key insight: Quantum computers are not faster at everything. They are specialized tools that exploit quantum mechanical phenomena to solve specific types of problems exponentially or polynomially faster. Your laptop will always be better at browsing the web.

Bits vs Qubits: The Deep Dive

Part 2: Core Concepts

Classical Bit

A classical bit exists in one of two states: 0 or 1. That's the foundation of all classical computing. Every photo, video, program, and website is encoded as sequences of 0s and 1s.

Qubit

A qubit's state is described mathematically as:

|ψ⟩ = α|0⟩ + β|1⟩

Here, α and β are complex numbers called amplitudes. The notation |0⟩ and |1⟩ are called kets (from Dirac notation) and represent the two basis states.

The key rule: the probabilities must sum to 1.

|α|² + |β|² = 1

When you measure, the probability of getting |0⟩ is |α|² and the probability of |1⟩ is |β|². This is the Born rule.

The Bloch Sphere

Every possible state of a single qubit can be visualized as a point on the surface of a sphere. The north pole is |0⟩, the south pole is |1⟩, and every other point represents a superposition.

|0⟩ |1⟩ |+⟩ |−⟩ x y z |ψ⟩ θ φ |ψ⟩ = cos(θ/2)|0⟩ + e^(iφ) sin(θ/2)|1⟩

Two angles fully describe any single-qubit state: θ (theta, shown in yellow) measures the angle from the north pole (z-axis) down to the state vector — it controls how much |0⟩ vs |1⟩ you have. φ (phi, shown in cyan) measures the rotation around the equator — it controls the phase between |0⟩ and |1⟩. Together, they show that a qubit carries far more information than a classical bit — it's a point on a continuous sphere, not just 0 or 1.

Superposition: Not What You Think

Pop science says "a qubit is 0 and 1 at the same time." This is misleading. A qubit in superposition is in a state that's a linear combination of |0⟩ and |1⟩ with complex amplitudes. It doesn't "have" both values simultaneously — it has neither value until measured.

Think of it more like a probability cloud. The qubit exists in a mathematical state that encodes the potential for different outcomes. Measurement forces the cloud to collapse into a single, definite result.

Before Measurement α|0⟩ + β|1⟩ MEASURE After Measurement |0⟩ prob = |α|² or |1⟩ prob = |β|² Superposition is destroyed — the qubit is now definite

Entanglement: "Spooky Action at a Distance"

Einstein called it "spooky action at a distance" because he thought it was too weird to be real. He was wrong — entanglement is real, experimentally verified, and one of quantum computing's most powerful resources.

The Gloves Analogy (Classical Version)

Put a left glove in one box and a right glove in another. Ship them to different cities. Open one box and find a left glove — you instantly know the other box has a right glove. No magic here — the gloves were always left and right. This is just correlation.

The Quantum Version (Weirder)

Quantum entanglement is fundamentally different. The "gloves" don't have a definite handedness until you open a box. The act of opening one box creates the definite state for both simultaneously. Bell's theorem (1964) and subsequent experiments proved this isn't just hidden information — the universe genuinely doesn't assign values until measurement.

A City 1 ENTANGLED Correlated — not communicating B City 2 Measure → |0⟩ Instantly → |1⟩

⚠️ No faster-than-light communication: Entanglement creates correlation, not communication. You can't use it to send a message — the measurement outcome is random. You only discover the correlation when you classically compare results. This is a crucial point that many pop-science explanations get wrong.

Quantum Gates

Just as classical computers use logic gates (AND, OR, NOT) to manipulate bits, quantum computers use quantum gates to manipulate qubits. Every quantum gate is a unitary matrix — a reversible transformation that preserves probabilities.

Hadamard (H)

Creates superposition. Takes |0⟩ to an equal mix of |0⟩ and |1⟩.

1/√2 ×
[ 1   1 ]
[ 1  -1 ]

H|0⟩ = |+⟩ = (|0⟩ + |1⟩)/√2

Pauli-X (NOT)

Quantum NOT gate. Flips |0⟩ ↔ |1⟩. Like a classical NOT.

[ 0   1 ]
[ 1   0 ]

X|0⟩ = |1⟩   X|1⟩ = |0⟩

CNOT (Controlled-NOT)

Two-qubit gate. Flips target if control is |1⟩. Creates entanglement.

[ 1 0 0 0 ]
[ 0 1 0 0 ]
[ 0 0 0 1 ]
[ 0 0 1 0 ]

CNOT|10⟩ = |11⟩

A Simple Quantum Circuit: Creating a Bell State

This circuit creates an entangled pair (Bell state). Apply Hadamard to the first qubit, then CNOT with the first as control and second as target.

|0⟩ |0⟩ H 0 or 1 same! Output: (|00⟩ + |11⟩) / √2 — the Bell state Φ⁺

Measurement: The Act of Looking

Measurement in quantum mechanics is irreversible and destructive. When you measure a qubit, its superposition collapses to one of the basis states. You get a classical bit of information, and the quantum state is gone forever.

The Born Rule tells us the probability of each outcome:

P(|0⟩) = |α|²      P(|1⟩) = |β|²

For example, if α = 1/√2 and β = 1/√2 (the |+⟩ state), then:

  • P(|0⟩) = |1/√2|² = 1/2 = 50%
  • P(|1⟩) = |1/√2|² = 1/2 = 50%
  • Each run gives a random result, but statistics match the probabilities exactly

This is why quantum algorithms run the same circuit many times — to build up statistics and extract the answer from the probability distribution.

Quantum Interference: The Secret Sauce

Here's the real magic of quantum computing. Amplitudes are complex numbers, and like waves, they can add together (constructive interference) or cancel out (destructive interference).

Quantum algorithms are carefully designed to make the amplitudes of wrong answers cancel each other out, while the amplitudes of correct answers reinforce each other. After enough steps, measuring the qubit gives you the right answer with high probability.

Wave Interference Constructive = Amplitudes ADD → bigger probability Destructive = Amplitudes CANCEL → zero probability

The No-Cloning Theorem

One of quantum mechanics' most important results: you cannot copy an unknown quantum state. There is no quantum Ctrl+C. This is mathematically proven — it follows directly from the linearity of quantum mechanics.

This sounds like a limitation, but it's actually a feature for quantum cryptography. If an eavesdropper tries to copy quantum-encrypted data, they inevitably disturb it — and the sender and receiver can detect the intrusion. This is the foundation of Quantum Key Distribution (QKD).

  • Classical: you can copy bits perfectly, endlessly
  • Quantum: copying destroys the original state's information
  • This enables provably secure communication (QKD)
  • Also means you can't "back up" a quantum computation mid-way

Dirac Notation Deep Dive

Part 3: The Math

Dirac notation (bra-ket notation) is the standard language of quantum mechanics. It's elegant and surprisingly simple once you get used to it.

Kets (column vectors)

|0⟩ = [1]     |1⟩ = [0]
      [0]           [1]

Bras (row vectors — conjugate transpose)

⟨0| = [1, 0]     ⟨1| = [0, 1]

Inner Product ⟨φ|ψ⟩

The inner product gives overlap between states. Orthogonal states have zero inner product:

⟨0|0⟩ = 1     (same state → probability 1)
⟨0|1⟩ = 0     (orthogonal → probability 0)
⟨1|1⟩ = 1

General Single-Qubit State

|ψ⟩ = α|0⟩ + β|1⟩   where   α, β ∈ ℂ   and   |α|² + |β|² = 1

Two-Qubit System

Two qubits have four basis states:

|ψ⟩ = α₀₀|00⟩ + α₀₁|01⟩ + α₁₀|10⟩ + α₁₁|11⟩

Four complex amplitudes, four probabilities summing to 1
|α₀₀|² + |α₀₁|² + |α₁₀|² + |α₁₁|² = 1

Matrix Math of Quantum Gates

Every quantum gate is a unitary matrix. A matrix U is unitary if U†U = I (its conjugate transpose times itself equals the identity). This ensures probabilities are preserved and operations are reversible.

Applying Hadamard to |0⟩ — Step by Step

// H gate matrix
H = 1/√2 × [ 1   1 ]
              [ 1  -1 ]

// Apply to |0⟩
H|0⟩ = 1/√2 × [ 1   1 ] × [ 1 ]
               [ 1  -1 ]   [ 0 ]

     = 1/√2 × [ 1×1 + 1×0 ]
               [ 1×1 + (-1)×0 ]

     = 1/√2 × [ 1 ]
               [ 1 ]

     = 1/√2 |0⟩ + 1/√2 |1⟩  =  |+⟩

// 50/50 superposition! Each outcome has probability (1/√2)² = 1/2

CNOT Matrix (4×4)

CNOT = [ 1  0  0  0 ]   |00⟩ → |00⟩
        [ 0  1  0  0 ]   |01⟩ → |01⟩
        [ 0  0  0  1 ]   |10⟩ → |11⟩  ← flipped!
        [ 0  0  1  0 ]   |11⟩ → |10⟩  ← flipped!

// When control qubit is |1⟩, the target qubit gets flipped

Unitarity means every quantum gate is reversible. Unlike classical computing (where AND gates lose information), quantum computation is always reversible — you can always undo a gate by applying its inverse (conjugate transpose).

Tensor Products & Multi-Qubit States

This is where quantum computing's power comes from. When you add qubits, the state space grows exponentially.

// Tensor product: combining two qubits
|0⟩ ⊗ |0⟩ = |00⟩ = [ 1 ]
                       [ 0 ]
                       [ 0 ]
                       [ 0 ]

// General: |ψ⟩ ⊗ |φ⟩ multiplies every amplitude of |ψ⟩
// with every amplitude of |φ⟩

Exponential State Space

1

qubit

2 amplitudes

10

qubits

1,024

50

qubits

~10¹⁵

A 50-qubit system requires about 10¹⁵ (a quadrillion) complex numbers to describe its state. A classical computer needs ~32 petabytes of RAM just to store this state vector, let alone manipulate it. At ~300 qubits, you'd need more numbers than there are atoms in the observable universe.

This is the quantum advantage: Nature "computes" with all 2ⁿ amplitudes simultaneously. Quantum algorithms cleverly arrange gates so that interference channels this exponential workspace toward the correct answer.

Deutsch-Jozsa Algorithm

Part 4: Quantum Algorithms — where quantum computers actually beat classical ones

🎯 The Everyday Analogy

Imagine you have a mysterious machine with a button. You can feed it any number from 1 to a billion, and it outputs either "yes" or "no". You're told this machine does one of two things:

Option A: "Boring"

It always says the same thing — "yes" for everything, or "no" for everything. Like a broken vending machine that always gives you Coke regardless of what you press.

Option B: "Fair"

It says "yes" for exactly half the numbers and "no" for the other half. Like a fair coin flip that's predetermined for each number.

Your job: figure out which type of machine you have. Each time you test a number, it costs you $1 million. How many tests do you need?

Classical Approach

In the worst case, you might test half the numbers plus one before you know for sure. If there are a billion possible inputs, that's 500 million + 1 tests.

Why? Because a "boring" machine and a "fair" machine could give the same answer for the first 500 million numbers — you can't tell them apart until you've checked enough.

Quantum Approach

The quantum computer tests the machine exactly once. One query. One dollar. Done.

How? It feeds the machine a superposition of all billion numbers simultaneously, then uses interference to extract the global property (boring vs fair) from a single answer.

How does one query tell you everything?

Think of it like this: instead of checking numbers one at a time, the quantum computer creates a wave that represents all numbers at once. When this wave passes through the mystery machine, the machine imprints a pattern on the wave. If the machine is "boring" (constant), the wave comes out undisturbed. If it's "fair" (balanced), the wave gets a distinctive ripple pattern. One look at the output wave tells you which.

This works because of interference: the quantum amplitudes for all billion inputs either all add up (constant function → strong signal) or perfectly cancel out (balanced function → zero signal on the original state). It's like how a perfectly calm pond tells you no one threw a stone, but a specific ripple pattern tells you exactly where one landed.

The Quantum Circuit

Don't worry if this looks abstract — it's a visual shorthand for the steps described above. Each line is a qubit, boxes are operations.

Step 1: Superposition Step 2: Ask once Step 3: Interference Step 4: Read |0⟩ⁿ |1⟩ H⊗ⁿ H Mystery Machine (oracle) H⊗ⁿ All 0s → boring Not all 0s → fair

Reading the circuit: Lines are qubits traveling left to right through time. Purple "H" boxes create superposition (and later, interference). The yellow box is our mystery machine. The meter symbol means "measure" — look at the qubit and get a definite answer. If all qubits read 0, the machine was boring. Any other result means fair.

Grover's Search Algorithm

🎯 The Everyday Analogy

You're in a massive library with 1 million books, and one of them has a golden bookmark hidden inside. The books aren't sorted — no index, no catalog. You can only open one book at a time and check.

Classical: On average, you'd need to open 500,000 books. Could take your entire life.

Quantum: You'd only need to check about 1,000 books. That's the square root of a million.

How does it narrow things down so fast?

Imagine all million books are on a giant table, and each has a tiny voice whispering "pick me!" at the same volume. Grover's algorithm does something clever in two repeating steps:

Step 1: "Mark it"

The quantum computer asks: "Is this the one with the golden bookmark?" The correct book's whisper gets flipped — it now whispers negatively (its amplitude becomes negative). Everything else stays the same.

Step 2: "Amplify it"

A mathematical trick called "inversion about the mean" takes the average of all whispers, then mirrors everything around that average. Since the marked book was negative, it bounces to become louder than all the others. The wrong books get quieter.

Repeat these two steps about √N times (for 1 million books, that's ~1,000 repetitions), and the correct book is screaming while everything else is silent. When you finally measure, you almost certainly find the golden bookmark.

Watching the Amplitudes Grow

Each bar represents the probability of measuring that item. The target item (green) gets amplified with each iteration while others shrink.

Amplitude Amplification — Simplified with 4 items, looking for item 3 Start All items equal 1 2 3✓ 4 25% each After 1 round Target boosted! 1 2 3✓ 4 ~78% on target Optimal point Almost certain! 1 2 3✓ 4 ~99.5% on target For N items, this takes ~√N rounds. That's 1,000 rounds for 1 million items instead of 500,000 checks. This is a quadratic speedup — not as dramatic as exponential, but still game-changing for large databases.

What's "inversion about the mean"? Think of a seesaw with all items balanced on it. The marked item is pushed down (made negative). When you "invert about the mean," it's like flipping the seesaw around its balance point — the item that was pushed down bounces up high, while the ones that were slightly above average get pushed down a bit. Each round, the contrast gets sharper.

Shor's Algorithm: The Cryptography Threat

🎯 The Everyday Analogy

Imagine someone gives you the number 15 and asks: "What two numbers multiply together to make this?" Easy: 3 × 5. Now try with a number that has 600 digits. That's what keeps your online banking safe — it's a math problem that's easy to create but nightmarishly hard to reverse.

RSA encryption (used in HTTPS, banking, email) relies on exactly this: multiply two huge prime numbers together — the result is public, but finding the original primes would take all the world's computers longer than the universe has existed.

Shor's algorithm could do it in hours. That's why people pay attention.

How does it work? (No PhD required)

The key insight is surprisingly elegant: factoring can be turned into a pattern-finding problem, and quantum computers are exceptionally good at finding patterns.

1

Turn it into a repeating pattern

Pick a random number (say 7), and compute: 7¹ mod 15, 7² mod 15, 7³ mod 15... You get: 7, 4, 13, 1, 7, 4, 13, 1... See the pattern? It repeats every 4 steps. That "4" is the period. There's a mathematical theorem that says: once you know this period, you can find the factors using simple arithmetic (GCD).

2

Finding the period is the hard part

For small numbers like 15, you can spot the pattern quickly. For a 600-digit number, the period could be hundreds of digits long, and checking each value one by one would take forever. Classical computers are stuck here.

3

Quantum Fourier Transform finds patterns instantly

Think of the Quantum Fourier Transform (QFT) like a prism for numbers. A prism takes a beam of white light and reveals all the hidden frequencies (colors) inside it. QFT does the same with number sequences — it takes the repeating pattern and reveals its frequency (period). The quantum computer computes all values simultaneously via superposition, then QFT extracts the period in one shot.

4

Period → Factors (easy math)

Once you have the period r, compute GCD(aʳ/² + 1, N) and GCD(aʳ/² − 1, N). These give you the factors. For our example: period 4, so GCD(7² + 1, 15) = GCD(50, 15) = 5 and GCD(7² − 1, 15) = GCD(48, 15) = 3. Done: 15 = 3 × 5.

The Speed Difference

Classical (RSA-2048)

The best classical approach takes roughly 10³⁰ years — that's a million trillion trillion years. The universe is only 13.8 billion years old. Your secrets are safe.

Shor's (future quantum computer)

Could be done in hours. But it needs ~4,000+ perfect logical qubits, which translates to millions of physical qubits with error correction. We're not there yet — not by a long shot.

Reality check: Shor's algorithm has been demonstrated on small numbers (IBM factored 15 = 3 × 5 in 2001). Factoring cryptographically relevant numbers requires millions of physical qubits due to error correction overhead. We're likely decades away. But the threat is taken seriously — intelligence agencies worry about "harvest now, decrypt later" attacks, where adversaries record encrypted traffic today and decrypt it once quantum computers are ready. That's why we need post-quantum cryptography now.

Quantum Error Correction

Real qubits are incredibly fragile. They interact with their environment and lose their quantum properties — this is decoherence. Gate operations are imperfect too. Current error rates are ~0.1-1% per gate, far too high for complex algorithms.

The Solution: Redundancy

Just as classical error correction uses redundant bits, quantum error correction encodes one logical qubit across many physical qubits. But it's harder because:

  • You can't copy qubits (no-cloning theorem)
  • Measuring destroys the state
  • Errors are continuous, not just bit-flips
  • Need to detect errors without learning the quantum state

Surface Codes

The leading approach uses a 2D grid of qubits where "data" qubits store information and "syndrome" qubits detect errors. Current estimates: ~1,000 to 10,000 physical qubits per logical qubit, depending on the target error rate.

Shor's algorithm on RSA-2048: ~4,000 logical qubits × ~1,000 physical each
= ~4 million physical qubits needed
Current state-of-the-art: ~1,100 physical qubits (IBM Condor, 2023)

Types of Quantum Computers

Part 5: Hardware & Real World

⚡ Superconducting

IBM, Google, Rigetti

  • Tiny circuits cooled to ~15 millikelvin
  • Fast gate speeds (~10-100 ns)
  • Short coherence times (~100 μs)
  • Most mature technology
  • Scalability challenges with wiring

🔬 Trapped Ions

IonQ, Quantinuum

  • Individual atoms held by electromagnetic fields
  • Long coherence times (seconds to minutes)
  • Slower gate speeds (~1-100 μs)
  • High-fidelity gates (>99.5%)
  • All-to-all connectivity

💡 Photonic

Xanadu, PsiQuantum

  • Qubits encoded in light particles (photons)
  • Room temperature operation possible
  • Natural for networking/communication
  • Measurement-based quantum computing
  • Hard to make photons interact

🔷 Topological

Microsoft

  • Uses exotic quasiparticles (anyons)
  • Inherently error-protected by topology
  • Still largely theoretical
  • Could drastically reduce error correction overhead
  • Microsoft claims progress with Majorana qubits (2025)

The Decoherence Problem

Qubits are absurdly sensitive. A stray photon, a vibration, a cosmic ray, even thermal noise at temperatures above near-absolute-zero can destroy the quantum state. This loss of quantum information is called decoherence, and it's the single biggest engineering challenge in quantum computing.

Coherence Times by Hardware Supercond. ~100 μs Trapped ion ~seconds to minutes Photonic ~ns (but different model)

Superconducting quantum computers (IBM, Google) operate at 15 millikelvin — colder than outer space. They use dilution refrigerators, which are the large, chandelier-like structures you see in photos of quantum computers.

The race is to either: (a) make qubits last longer, (b) make gates faster, or (c) use error correction to compensate. All three approaches are being pursued simultaneously.

Current State (2024–2025)

We're in the NISQ era — Noisy Intermediate-Scale Quantum. Current quantum computers have enough qubits to be interesting but too much noise to be broadly useful.

Key Milestones

  • Google (2019): "Quantum supremacy" — Sycamore (53 qubits) performed a specific sampling task in 200 seconds that would take classical supercomputers ~10,000 years. Contested — classical algorithms improved significantly since.
  • IBM (2023): Condor processor with 1,121 superconducting qubits. Heron processor (133 qubits) with improved error rates.
  • IBM (2024): Demonstrated useful quantum computation with error mitigation on 127-qubit Eagle processor, matching classical simulation for certain physics problems.
  • Google (2024): Willow chip — demonstrated quantum error correction below threshold for the first time, a major milestone.
  • Quantinuum (2024): Achieved record quantum volume scores with trapped-ion systems.
  • Microsoft (2025): Announced Majorana-based topological qubit progress.

What's Real vs. Hype

✅ Real

  • Quantum advantage for specific artificial problems
  • Error correction below threshold (Google Willow)
  • Useful quantum chemistry simulations emerging
  • Post-quantum cryptography standardized (NIST 2024)

⚠️ Overhyped

  • "Quantum computers will replace classical"
  • "Encryption is broken" (decades away)
  • "Quantum AI will be conscious" (nonsense)
  • "10,000 qubit = useful" (noise matters more)

Quantum Cryptography & Post-Quantum

Quantum Key Distribution (QKD)

QKD uses quantum mechanics to generate shared secret keys between two parties with provable security. The most famous protocol is BB84 (Bennett & Brassard, 1984):

  • Alice sends qubits encoded in random bases (rectilinear or diagonal)
  • Bob measures in random bases
  • They publicly compare bases (not values) and keep only matching ones
  • Any eavesdropper (Eve) disturbs the qubits — detected by error rate check
  • No-cloning theorem ensures Eve can't copy without disturbing

Post-Quantum Cryptography (PQC)

While QKD needs special hardware, PQC runs on normal computers using math problems that even quantum computers can't efficiently solve. NIST finalized standards in August 2024:

ML-KEM (CRYSTALS-Kyber)

Lattice-based key encapsulation. Replaces key exchange (Diffie-Hellman, ECDH).

ML-DSA (CRYSTALS-Dilithium)

Lattice-based digital signatures. Replaces RSA/ECDSA signatures.

SLH-DSA (SPHINCS+)

Hash-based signatures. Backup option with different mathematical assumptions.

FN-DSA (FALCON)

Lattice-based compact signatures. Smaller signatures than Dilithium.

Why this matters NOW: "Harvest now, decrypt later" — adversaries can store encrypted data today and decrypt it when quantum computers are powerful enough. Sensitive data with long shelf lives (government, medical, financial) needs PQC migration now. Google Chrome already uses hybrid ML-KEM + X25519 for TLS by default.

Applications: What Can Quantum Computers Do?

🔬 Near-Term (5-10 years)

  • Quantum chemistry — simulating small molecules for drug discovery and materials science
  • Optimization — logistics, portfolio optimization, scheduling (with quantum-inspired classical too)
  • Machine learning — quantum kernel methods, certain sampling tasks
  • Cryptography — QKD systems already commercially available

🚀 Far-Future (15-30+ years)

  • Breaking RSA — requires millions of physical qubits
  • Large-scale molecular simulation — designing drugs, catalysts, superconductors
  • Quantum machine learning at scale — if quantum advantage exists for ML
  • Full fault-tolerant quantum computing — arbitrary quantum algorithms

Common Misconceptions

Part 6: Wrap-Up

❌ "Quantum computers are faster at everything"

Reality: Quantum advantage exists only for specific problem classes (factoring, unstructured search, simulation). For everyday tasks — web browsing, databases, video rendering, most AI training — classical computers are and will remain superior.

❌ "Quantum computers try all answers at once"

Reality: This is a dangerous oversimplification. A quantum computer creates superposition over many states, but you can only extract one answer per measurement. The art is using interference to make the right answer overwhelmingly probable.

❌ "Quantum computing will break all encryption tomorrow"

Reality: Shor's algorithm threatens RSA and ECC specifically. Symmetric encryption (AES) only needs doubled key sizes. Breaking RSA-2048 needs millions of physical qubits — decades away. And post-quantum standards are already finalized.

❌ "Qubits are in two states at the same time"

Reality: A qubit in superposition is in a single quantum state that is a linear combination of basis states. It doesn't simultaneously "have" both values. The state is described by amplitudes, and measurement produces one definite outcome probabilistically.

Getting Started: Try It Yourself

You can run quantum circuits today on real hardware — for free.

IBM Quantum

Free access to real quantum hardware. Qiskit SDK (Python). Best for learning.

Google Cirq

Python framework for quantum circuits. Integrates with Google's hardware.

Microsoft Q#

Dedicated quantum programming language. Azure Quantum platform.

Amazon Braket

Access multiple quantum hardware providers through AWS.

Creating a Bell State in Qiskit

# Create an entangled Bell state: (|00⟩ + |11⟩) / √2
from qiskit import QuantumCircuit
from qiskit_aer import AerSimulator

# Build the circuit
qc = QuantumCircuit(2, 2)   # 2 qubits, 2 classical bits

qc.h(0)          # Hadamard on qubit 0 → superposition
qc.cx(0, 1)      # CNOT: qubit 0 controls qubit 1 → entanglement
qc.measure([0, 1], [0, 1])  # Measure both

# Run on simulator
simulator = AerSimulator()
result = simulator.run(qc, shots=1000).result()
counts = result.get_counts()

print(counts)
# Output: ${'00': ~500, '11': ~500$}
# Always correlated! Never '01' or '10'.
# That's entanglement in action.

Key Takeaways

1

Qubits use superposition — a linear combination of |0⟩ and |1⟩ with complex amplitudes, not "both at once."

2

Entanglement creates correlations between qubits — but doesn't allow faster-than-light communication.

3

Interference is the secret sauce — amplifying correct answers and canceling wrong ones.

4

Quantum advantage is problem-specific. Classical computers are better for most everyday tasks.

5

n qubits = 2ⁿ dimensional state space. This exponential scaling is the source of quantum power.

6

Shor's algorithm threatens RSA, but needs millions of qubits. Post-quantum crypto standards are already finalized (NIST 2024).

7

We're in the NISQ era — noisy, intermediate-scale quantum. Useful fault-tolerant QC is likely 10-20+ years away.

8

Decoherence is the #1 engineering challenge. Qubits lose their quantum properties from any environmental interaction.

9

You can try it today — IBM Quantum offers free access to real quantum hardware through Qiskit.

10

The no-cloning theorem prevents copying qubits — a limitation that enables provably secure quantum cryptography.