Quantum Teleportation

 

Group 3

 

Chris Gooch, Alfred Bonnabel, Jessica Russell, Destiny Logan

 

Key Words:  Quantum Teleportation, Auxiliary Pairs, Cryptology, Uncertainty Principle, Entangled Particles.

 

When you first hear the words “quantum teleportation”, one would probably think of Captain James T. Kirk requesting Scotty to “beam him up”.  The theory is that human material is broken down into transportable particles, then transported to another place and reassembled into the same form.  In Star Trek they teleport humans in this “quantum leap” but in quantum teleportation, they are teleporting information. The goal is not to send information quicker but, with the technology of quantum teleportation, businesses and organizations would be able send information with 100% security. Security sounds important but what exactly would this new technology mean to businesses in America? With the new hardware of Quantum teleportation it would prevent hackers and worms from reeking havoc on the computer systems in the United States and worldwide.  In fact, quantum computers would replace binary-based computers and the information highway would be transformed into an amazing new system.

 

In March 1993, Charles H. Bennett from IBM proposed the idea that quantum mechanics could be used to devise a way to teleport an object.  Physicists have been researching quantum teleportation for years.  What has baffled so many is the uncertainty of being able use two complementary properties (location and momentum) of a quantum particle that cannot be precisely measured at the same time.  So challenging is this problem, physicists have deemed it the “uncertainty principle”.  The instability of the particle also becomes the solution to the problem.  There is the possibility that the particles can be “entangled” in a way that they become perfectly correlated. 

 

Theorists explain that an auxiliary pair of entangled particles is created to be a transmitter to both particles. The particles have been named Alice and Bob to describe the transmission of the quantum information from point A to point B.  Alice entangles the object of teleportation with her auxiliary particle and then measures the joint state

(Bell measurement).  She sends the result to Bob in the classical manner.  He applies it to his auxiliary particle and conjures up the teleportation object from it. This quantum cryptology must be decoded and for the first time there will be teleportation between stationary atoms than can store quantum states and light.  Thus, we will be able to transmit information over great distances and it will be absolutely safe. So far there has been limited success but quantum teleportation has been successfully demonstrated on a photon.

 

It is great to transport humans because that would do away with cars, roads, accidents, and much more but, what does the quantum transport of information do for us.  In 2000, it was estimated that computer viruses and hacking incidents cost businesses around the world more than $1.6 trillion dollars.  Using a global survey of more than 4900 information technology professionals from over 30 nations, the study estimated the total bill to the U.S. firms around $266 billion, or more than 2.5% of the nation’s Gross Domestic Product.   What really brings the cost up is the lost in productivity due to the computer downtime and thus, the lost sales opportunities.  Steven Fink describes case after case of economic espionage by hackers.  From two Swedish teens that broke into a communication company’s network systems and downloaded the company’s five-year plan for its cellular systems (they wanted $2 million to destroy the information) to the notorious Kevin Mitnik who ended up the FBI’s #1 cyber criminal by costing businesses hundreds of million of dollars in damages.  These problems would be solved by the secure quantum teleportation network.

 

It is definitely the beginning of a new age of technology if these quantum particles can be teleported.  The future of this discovery would take humans to a new frontier of information processing and then on to a more exciting realm of teleportation.  The savings and the possibilities for the global economy are as limitless as the fictional world of Star Trek.  The effects of the security of information will be felt from the average citizen all the way up to the highest levels of government.  It will not only keep information safe from those who want to steal information for monetary gain but, will protect us from terrorists who use technology for political gain. The main gist of it all is the overall secure transmission of sensitive information and increase of telecommuting will primarily provide competitive advantages for business of all kinds. 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

References

 

Fink, Steven B. (2002).  Sticky Fingers: Managing the Global Risk of Economic  

            Espionage.  Lexicom Communications Corp. Retrieved on February 7, 2007, from http://www.economicespionage.com/StickyFingers.html

 

Jackson, Paul (October 23, 2006).  New Breakthrough in Quantum Teleportation.

            Retrieved on February 7, 2005, from     http://www.nationalacademies.org/headlines/20061023.html.

 

Physorg, First quantum teleportation between light and matter. Retrieved February 6,           2007, from http://www.physorg.com/printnews.php?newsid=79265847

 

Quantum Optics Group, Norman Bridge Laboratory of Physics, California Institute of   

             Technology (n.d.).  Quantum Teleportation.  Retrieved on February 7, 2007, from   http://www.cco.caltech.edu/~qoptics/teleport.html. 

 

Quantum Teleportation, Information and Cryptography (n.d.).  Retrieved February 7, 

             2007, from http://www.upscale.utoronto.ca/GeneralInterest/Harrison/QuantTeleport/QuantTeleport.html

 

Smart, Richie (2000).  Viruses and hacking cost $1.6 trillion worldwide.  Retrieved

            February 7, 2007, from http://www.globalcontinuity.com/current_headlines/viruses_and_hacking_cost_1_6_trillion_worldwide. 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Questions:

 

  1. What are the names given to the A and B entangled particles in quantum teleportation?

A.                 Adam and Beth                              B.         Alvin and Barbara

C.       Alice and Bob                                D.        Anthony and Brad

 

 

  1. Two complimentary properties of quantum particles in quantum teleportation are:

A.                 Location and Matter

B.                 Location and Momentum

C.                 Momentum and Time

D.                 Location and Time

 

 

  1. The development of quantum teleportation technology would allow for:

A.                 Faster than light travel.

B.                 Nuclear destruction.

C.                 Increased information security.

D.                 Shorter commute times.

 

 

  1. _____________ pairs are used to facilitate quantum teleportation.

A.                 Shared

B.                 Twisted

C.                 Entangled

D.                 Dangling

 

  1. Quantum teleportation has been successfully demonstrated on a:

A.                 Rat.

B.                 Photon.

C.                 Monkey.

D.                 Atom.

 

 

  1. The use of quantum teleportation by businesses will primarily provide what competitive advantages:

A.                 Secure transmission of sensitive information.

B.                 Shipment of products quickly and cheaply.

C.                 Increased telecommuting.

D.                 Both A and C.

 

 

  1. In the year 2000 alone, hackers and computer viruses caused how much in damage worldwide?

A.                 $1.7 trillion

B.                 $1.7 million

C.                 $1.7 billion

D.                 $1.7 thousand