Professional Documents
Culture Documents
ITFM Project Report Group 2 Sec B
ITFM Project Report Group 2 Sec B
22624- Arjun D
22626- B Griheeta
1
i
ACKNOWLEDGEMENT
We, the members of Group 2, 1st year PGDM “B” section of SDMIMD have worked
diligently to finish our Information Technology for Management project report on the topic
of "QUANTUM COMPUTING". We are grateful for the chance to study this subject, and we
have undoubtedly learned a lot from it. However, without the assistance, backing, direction,
and encouragement of a few people, to whom we would like to express our profound
gratitude, this would not have been possible.
We owe Prof. Mohamed Minhaj, a member of our ITFM faculty, a debt of gratitude for his
generosity, cooperation, and inspiration. His valuable advice and assistance were quite
helpful in finishing this project report.
Second, we want to acknowledge and thank our parents and friends for being our pillars of
support and for being there for us in every way.
Thanking you,
Group 2 (Section B).
ii
ABSTRACT
We have made an effort to understand the meaning of quantum computing, its business
applications, implementations, potential management obstacles, current developments in
quantum computing, and what the future may hold in this paper. The methodology of the
investigation involved an examination of secondary quantum computing data and academic
articles. We are confident that the readers will be able to comprehend this growing
technology and its significance in the commercial world. In the project, we attempted to
demonstrate how the U.K.-based security firm Kets is applying this new technology to their
operational environment. The study reveals how quantum computing is changing and will
continue to change corporate environments in the future.
iii
Table of Contents
INTRODUCTION:..............................................................................................................................1
History of Quantum Computing:...................................................................................................1
Difference between classic and quantum computing:...................................................................2
QUANTUM COMPUTING – TRENDS AND FUTURE PROSPECTS.........................................3
Trends in the industry.....................................................................................................................3
Future Prospects of Quantum Computing.....................................................................................3
Advantages of Quantum Computing..................................................................................................4
Managerial issues with quantum computing.....................................................................................4
Applications Of Quantum Computing...............................................................................................5
COMPANY SPECIFIC IMPLICATION:.........................................................................................7
KETS QUANTUM SECURITY (UK)............................................................................................7
Applications:....................................................................................................................................8
CONCLUSION....................................................................................................................................9
REFERENCES:.................................................................................................................................10
iv
INTRODUCTION:
Richard Feynman was the one who lit the fuse for quantum computing. He presented the
conundrum that effective simulation of the development of quantum systems is impossible
with conventional computers in 1981 at MIT. In order to create a quantum computer that
1
could do these simulations, he put out a fundamental concept. He thereby shown the potential
to exponentially outperform traditional computers. The Shor algorithm, a unique technique
that changed the way people thought about quantum computing, wasn't developed until after
more than ten years.
Large number factorization on quantum computers has advanced dramatically since the
creation of Peter Shor's algorithm in 1994, outpacing the best classical method on
conventional machines. Calculating 300-digit figures for the latter would need millions of
years. Several of the current cryptosystems might possibly be broken using the Shor
algorithm. The potential to break cryptosystems with quantum computers in a matter of hours
rather than millions of years has sparked interest in quantum computing and its applications.
A quantum database search technique was created in 1996 by Lov Grover and gave some
issues a quadratic speedup. Any issue that required a random search or brute-force technique
in the past may now be solved four times faster.
The first quantum algorithms, including Grover's algorithm, were solved in 1998 using a
working 2-qubit quantum computer. As the race for increased processing power intensified,
more and more applications were created.
The first practical quantum computer was made available by IBM in 2017, raising the bar for
rivalry.
Difference between classic and quantum computing:
Source:
https://research-assets.cbinsights.com/2021/01/25190817/Quantum_computing_classical_computing_
comparison_feature_image.png
2
QUANTUM COMPUTING – TRENDS AND FUTURE PROSPECTS
1. Competition:
Through many recent articles it had been conveyed that the race to develop quantum
computers is between China and Unites States of America. But the real story is that
there are many other countries like United Kingdom, Australia, Japan, Canada and
many more who are thriving towards the development of the same. The Governments
put together have set aside US$25 Billion to quantum research and development. The
companies like Amazon, Google, IBM, Microsoft etc are trying to make quantum
computing as one of the ordinary tools for business.
Utilizing data collected from an article written by Forbes, it has been claimed that quantum
computing would play a significant role in the near future. According to five quantum system
developers interviewed by Forbes, fault-tolerant quantum systems will be available by 2030.
Applications in the discovery of new drugs have a certain benefit.
From their interviews to several researches the data collected are as follows:
According to The Quantum Economic Development Consortium's executive director,
quantum computing will be extensively used in mistake correction (QED-C).
3
The market will witness the launch of Noisy-Intermediate Scale Quantum machines
during the next five years, claims the managing editor of Quantum Computing Report.
The widespread usage of error-corrected fault-tolerant quantum computers should be
seen in five years, even if NISQ devices won't be used at that time.
The directors of the Chicago Quantum Exchange and Q-NEXT, a Department of
Energy Quantum Information Science Centre, expect a metropolitan-scaled entangled
quantum network to offer secure communication.
Another study by the co-founder and CEO of Classic Technologies concluded that by
2027, if quantum software and hardware continue to advance together, it would be
useful for material science, carbon capture, supply chain optimization, and
therapeutical research.
Security issue: The main disadvantage is the current Internet of things security,
whether it is organizational or government data like banking, defence, etc., or it may
be personal data, undue control over the data is a risk.
4
Working environment: Quantum computers need cooler environmental conditions
for regular operations. Engineering and designing of quantum computing is also a
complicated task.
2. Computational chemistry
In the computational chemistry field, IBM said that quantum computing will
be the most promising.
5
For the conventional memory to process the quantum states is difficult.
Because the tiniest molecule of the number of quantum states is extremely
vast.
Therefore, quantum computing which has the ability to simultaneously process
0 and 1 can give immense power to successfully map the molecules which
gives great advantages to pharmaceutical research.
Currently, online security threats have been increasing due to the number of
cyber threats happening around the world.
And on the other side digitization is also increasing which in turn makes us
even more vulnerable. With the help of machine learning and quantum
computing, there are various methods to counter these cyber-attacks.
Additionally, quantum cryptography is well known for creating encryption
methods which is done with the help of quantum computing.
4. Financial Modelling
For investors to survive in the market they need to know the right method for
profitable investments based on their expected returns, and the risk included in
it, and some other factors.
A simulation technique called Monte Carlo is repeatedly run-on conventional
computers which can take a lot of time.
With the help of quantum computing, the companies can not only reduce the time to
develop them but also, they can increase the quality of the solutions.
6
5. Retail: Due to the large quantity of data that's produced in retail markets, the
calculation and computing could be hard in conventional computers to analyze and
store the data. This problem can be tackled by quantum computing.
6. Data Analysis: As mentioned in the previous point, the storing and analysis of the
data gets relatively harder with large quantities of data and complex relationships
between those data’s, this can be evaded by Quantum computing.
7. Self-driving technology: With self-driving comes numerous different scenarios to
simulate and emulate, the count of these scenarios is only limited by one's
imagination. To tackle the complexities involved in a greater number of scenarios and
simulation, Tesla and few other self-driving automobile industries are rapidly making
use of quantum computing
In general, scientists have been debating quantum technology for decades, and quantum
dynamics is fraught with difficulties. However, quantum technologies are gaining traction,
and they are expected to make the transition from research labs to real-world commercial
settings over the next decade. In terms of potential scope and influence, quantum
technologies are similar to cloud computing.
KETS Quantum Security was founded in 2016 in Bristol, close to the southwest of England,
and has intriguing intellectual property (IP) in quantum random number generation and
quantum key distribution (QKD) (QRNG). Two years after its creation, the company was
named by Info security Europe as the UK's Most Innovative Small Cyber Security Company.
The fact that the startup's founders, Chris Erven, Jake Kennard, Carolina Clark, and Philip
Gibson, are in the process of creating actual quantum communications systems, in addition to
7
being a finalist in the Best Tech Start-up category and the Business Leader Go: Tech Awards,
is sufficient proof. In order to overcome challenging issues with randomness generation, safe
key distribution, and allow ultra-secure communications, KETS Quantum Security makes
advantage of quantum mechanics principles. The emergence of quantum computing, complex
algorithms, and sophisticated models pose a danger to traditional cyber security. A workable
alternative is offered by KETS' on-chip Quantum Key Distribution, which optically
distributes safe cryptographic keys.
In order to develop technology to defend data from a new breed of assaults that would
employ quantum computers to go through all current encryption protections, KETS Quantum
Security has secured £3.1 million in a fundraising round. The extra financing will be used to
hasten the creation, production, and delivery of the first products. It will also enable KETS to
extend significant early testing of the technology in currently under development real-world
contexts and applications. In order to execute on all of this, KETS will continue to assemble a
top-tier staff that is enthusiastic about the products and principles of the business.
Applications:
● The network's future is protected by security that can be updated. secures the integrity
of access, backbone, and connection networks.
● enhances data center efficiency with quantum random numbers, or secures the most
sensitive information with secure emergency data center backup and cloud
accessibility.
● The highest level of security in some of the most challenging situations is offered by
KETS' scalable, light-weight, low-power, and quantum security devices.
● provides the highest level of security for industrial control systems and sensors used
in critical infrastructure, factory automation, and connected cars. This is made
possible by our hardware's small size and low power consumption.
8
CONCLUSION
Quantum computing is no longer a pipe dream; it is already a reality. It has begun to take
shape, and businesses have even begun to invest in it. Even big corporations like Google and
IBM began to invest in it. Which demonstrates that people are beginning to trust this
technology; more people only need to be made aware of it. The superiority of quantum
computers over conventional computers has been demonstrated, and this will be very
beneficial and result in a tremendous deal of change. One shouldn't pass up a chance like this.
All of the aforementioned factors make it ever more crucial for us to invest in it and strive
toward its implementation.
9
References
(2022, September 18). Retrieved from Analytics Insight: https://www.analyticsinsight.net/top-
ten-quantum-computing-trends-to-look-out-for-in-2023/
10