Download as pdf or txt
Download as pdf or txt
You are on page 1of 68

Introduction to Quantum Computing

(River Publishers Series in Rapids in


Computing and Information Science
and Technology) 1st Edition Ahmed
Banafa
Visit to download the full and correct content document:
https://ebookmass.com/product/introduction-to-quantum-computing-river-publishers-s
eries-in-rapids-in-computing-and-information-science-and-technology-1st-edition-ahm
ed-banafa/
Introduction to Quantum Computing
Published 2023 by River Publishers
River Publishers
Alsbjergvej 10, 9260 Gistrup, Denmark
www.riverpublishers.com

Distributed exclusively by Routledge


605 Third Avenue, New York, NY 10017, USA
4 Park Square, Milton Park, Abingdon, Oxon OX14 4RN

Introduction to Quantum Computing / by Ahmed Banafa.

© 2023 River Publishers. All rights reserved. No part of this publication may be
reproduced, stored in a retrieval systems, or transmitted in any form or by any
means, mechanical, photocopying, recording or otherwise, without prior written
permission of the publishers.

Routledge is an imprint of the Taylor & Francis Group, an informa


business

ISBN 978-87-7022-841-1 (paperback)

ISBN 978-10-0096-238-3 (online)

ISBN 978-1-003-44023-9 (ebook master)

A Publication in the River Publishers series


RAPIDS SERIES IN COMPUTING AND INFORMATION SCIENCE AND
TECHNOLOGY

While every effort is made to provide dependable information, the


publisher, authors, and editors cannot be held responsible for any errors
or omissions.
Introduction to Quantum Computing

Ahmed Banafa
San Jose State University, USA

River Publishers
In the loving memory of my son Malik
Contents

Preface ix

About the Author xi

1 What is Quantum Computing? 1


1.1 A Comparison of Classical and Quantum Computing . . . . . . . . . . . . . . . . . 2
1.2 Quantum Superposition and Entanglement . . . . . . . . . . . . . . . . . . . . . 2
1.3 Difficulties with Quantum Computers . . . . . . . . . . . . . . . . . . . . . . . 3
1.4 The Future of Quantum Computing . . . . . . . . . . . . . . . . . . . . . . . . 3

2 Quantum Cryptography 5
2.1 Problems with Using Quantum Cryptography . . . . . . . . . . . . . . . . . . . . 7

3 Quantum Internet 9
3.1 What is the Quantum Internet? . . . . . . . . . . . . . . . . . . . . . . . . . . 11
3.2 Quantum Communications . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

4 Quantum Teleportation 13
4.1 Quantum Teleportation: Paving the Way for a Quantum Internet . . . . . . . . . . . . 15

5 Quantum Computing and the IoT 17


5.1 A Comparison of Classical and Quantum Computing . . . . . . . . . . . . . . . . . 18

vii
Contents

5.2 Quantum Communications . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

6 Quantum Computing and Blockchain: Myths and Facts 21


6.1 Difficulties with Quantum Computers [31] . . . . . . . . . . . . . . . . . . . . . 22
6.2 What is Quantum Supremacy? . . . . . . . . . . . . . . . . . . . . . . . . . . 22
6.3 Quantum Cryptography? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

7 Quantum Computing and AI: A Mega-Buzzword 25


7.1 What is Quantum Computing? . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
7.2 Difficulties with Quantum Computers . . . . . . . . . . . . . . . . . . . . . . . 26
7.3 Applications of Quantum Computing and AI . . . . . . . . . . . . . . . . . . . . . 26
7.4 Processing Large Sets of Data . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
7.5 Solve Complex Problem Faster . . . . . . . . . . . . . . . . . . . . . . . . . . 27
7.6 Better Business Insights and Models . . . . . . . . . . . . . . . . . . . . . . . . 28
7.7 Integration of Multiple Sets of Data . . . . . . . . . . . . . . . . . . . . . . . . 28
7.8 The Future . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

8 Quantum Computing Trends 31


8.1 A Comparison of Classical and Quantum Computing . . . . . . . . . . . . . . . . . 32
8.2 Physical vs. Logical Qubits . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
8.3 Quantum Superposition and Entanglement . . . . . . . . . . . . . . . . . . . . . 33
8.4 Quantum Emulator/Simulator . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
8.5 Quantum Annealer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
8.6 Noisy Intermediate-scale Quantum (NISQ) Computers . . . . . . . . . . . . . . . . 34
8.7 Universal Quantum Computers/Cryptographically Relevant Quantum Computers (CRQC) 35
8.8 Post-quantum/Quantum-resistant Codes . . . . . . . . . . . . . . . . . . . . . . 35
8.9 Difficulties with Quantum Computers [41] . . . . . . . . . . . . . . . . . . . . . 35

References 37

Index 39

viii
Preface

Quantum Computing is the area of study focused on developing computer


technology based on the principles of quantum theory. Tens of billions of public
and private capitals are being invested in quantum technologies. Countries
across the world have realized that quantum technologies can be a major
disruptor of existing businesses, they have collectively invested billions of
dollars in quantum research and applications. In this book you will learn the
difference between quantum computing and classic computing, also different
categories of quantum computing will be discussed in details, applications of
quantum computing in AI, IoT, Blockchain, communications, and encryption
will be covered, in addition, quantum internet, quantum cryptography, quantum
teleportation, and post-quantum technologies will be explained.

This is a list of the chapters of the book:

Chapter 1 : What is Quantum Computing?


Chapter 2: Quantum Cryptography
Chapter 3: Quantum Internet
Chapter 4 : Quantum Teleportation
Chapter 5: Quantum Computing and the IoT
Chapter 6: Quantum Computing and Blockchain: Myths and Facts
Chapter 7 : Quantum Computing and AI: A Mega-Buzzword
Chapter 8: Quantum Computing Trends

Audience

This is book is for everyone who would like to have a good understanding of
Quantum Computing and its applications and its relationship with business
operations, and also gain insight to other transformative technologies like
IoT, cloud computing, deep learning, Blockchain, Big Data and wearable
technologies. The audience includes: C-Suite executives, IT managers,

ix
Preface

marketing and sales professionals, lawyers, product and project managers,


business professionals, journalists, students.

Acknowledgment

I am grateful for all the support I received from my family during the stages of
writing this book.

x
About the Author

Professor Ahmed Banafa has extensive experience in research, operations and


management, with a focus on IoT, Blockchain, Cybersecurity and AI. He is the
recipient of the Certificate of Honor from the City and County of San Francisco
and Author & Artist Award 2019 of San Jose State University. He was named as
No. 1 tech voice to follow, technology fortune teller and influencer by LinkedIn
in 2018, his research has featured on Forbes, IEEE and MIT Technology Review,
and he has been interviewed by ABC, CBS, NBC, CNN, BBC, NPR, Washington
Post, and Fox. He is a member of the MIT Technology Review Global Panel.
He is the author of the book Secure and Smart Internet of Things (IoT) using
Blockchain and Artificial Intelligence (AI) which won three awards – the San Jose
State University Author and Artist Award, One of the Best Technology Books of
all Time Award, and One of the Best AI Models Books of All Time Award. His
second book was Blockchain Technology and Applications, which won San Jose
State University Author and Artist, One of the Best New Private Blockchain
Books and is used at Stanford University and other prestigious schools in
the USA. His most recent book is Quantum Computing. He studied Electrical
Engineering at Lehigh University, Cybersecurity at Harvard University and
Digital Transformation at Massachusetts Institute of Technology (MIT).

xi
CHAPTER

What is Quantum Computing?

Quantum computing is the area of study focused on developing computer


technology based on the principles of quantum theory. The quantum computer,
following the laws of quantum physics, would gain enormous processing power

1
What is Quantum Computing?

through the ability to be in multiple states and to perform tasks using all
possible permutations simultaneously.

1.1 A Comparison of Classical and Quantum Computing

Classical computing relies, at its ultimate level, on principles expressed by


Boolean algebra. Data must be processed in an exclusive binary state at any
point in time or bits. While the time that each transistor or capacitor needs to
be either in 0 or 1 before switching states is now measurable in billionths of
a second, there is still a limit as to how quickly these devices can be made to
switch state. As we progress to smaller and faster circuits, we begin to reach
the physical limits of materials and the threshold for classical laws of physics
to apply. Beyond this, the quantum world takes over. [1]

In a quantum computer, a number of elemental particles such as electrons


or photons can be used with either their charge or polarization acting as a
representation of 0 and/or 1. Each of these particles is known as a quantum bit,
or qubit; the nature and behavior of these particles form the basis of quantum
computing.

1.2 Quantum Superposition and Entanglement

The two most relevant aspects of quantum physics are the principles of
superposition and entanglement.

Superposition: Think of a qubit as an electron in a magnetic field. The electron’s


spin may be either in alignment with the field, which is known as a spin-up
state, or opposite to the field, which is known as a spin-down state. According to
quantum law, the particle enters a superposition of states, in which it behaves
as if it were in both states simultaneously. Each qubit utilized could take a
superposition of both 0 and 1.

Entanglement: Particles that have interacted at some point retain a type of


connection and can be entangled with each other in pairs, in a process known
as correlation. Knowing the spin state of one entangled particle – up or down
– allows one to know that the spin of its mate is in the opposite direction.
Quantum entanglement allows qubits that are separated by incredible distances
to interact with each other instantaneously (not limited to the speed of light).
No matter how great the distance between the correlated particles, they will
remain entangled as long as they are isolated.

2
What is Quantum Computing?

Taken together, quantum superposition and entanglement create an


enormously enhanced computing power. Where a 2-bit register in an ordinary
computer can store only one of four binary configurations (00, 01, 10, or 11)
at any given time, a 2-qubit register in a quantum computer can store all four
numbers simultaneously, because each qubit represents two values. If more
qubits are added, the increased capacity is expanded exponentially. [2]

1.3 Difficulties with Quantum Computers

• Interference: During the computation phase of a quantum calculation, the slightest


disturbance in a quantum system (say a stray photon or a wave of EM radiation) causes the
quantum computation to collapse, a process known as de-coherence. A quantum computer
must be totally isolated from all external interference during the computation phase.
• Error correction: Given the nature of quantum computing, error correction is ultra critical –
even a single error in a calculation can cause the validity of the entire computation to collapse.
• Output observance: Closely related to the above two, retrieving output data after a quantum
calculation is complete risks corrupting the data. [3]

1.4 The Future of Quantum Computing

The biggest and most important one is the ability to factorize a very large
number into two prime numbers. This is really important because this is what
almost all encryption of internet applications uses and can be de-encrypted.
A quantum computer should be able to calculate the positions of individual
atoms in very large molecules like polymers and in viruses relatively quickly. If
you have a quantum computer you could use it, and the way that the particles
interact with each other, to develop drugs and understand how molecules work a
bit better.Even though there are many problems to overcome, the breakthroughs
in the last 15 years, and especially in the last 3, have made some form of practical
quantum computing possible. However, the potential that this technology offers
is attracting tremendous interest from both the government and the private
sector. It is this potential that is rapidly breaking down the barriers to this
technology, but whether all barriers can be broken, and when, is very much an
open question. [4, 5]

3
CHAPTER

Quantum Cryptography

Quantum cryptography uses physics to develop a cryptosystem completely


secure against being compromised, without the sender or the receiver of
messages being known. The word quantum itself refers to the most fundamental
behavior of the smallest particles of matter and energy.

Quantum cryptography is different from traditional cryptographic systems


in that it relies more on physics, rather than mathematics, as a key aspect of its
security model. [7]

Essentially, quantum cryptography is based on the usage of individual


particles/waves of light (photon) and their intrinsic quantum properties to
develop an unbreakable cryptosystem (because it is impossible to measure the
quantum state of any system without disturbing that system).

5
Quantum Cryptography

Quantum cryptography uses photons to transmit a key. Once the key is


transmitted, coding and encoding using the normal secret-key method can take
place. But how does a photon become a key? How do you attach information to
a photon’s spin? [8]

This is where binary code comes into play. Each type of a photon’s spin
represents one piece of information – usually a 1 or a 0, for binary code. This
code uses strings of 1s and 0s to create a coherent message. For example,
11100100110 could correspond to h-e-l-l-o. So a binary code can be assigned to
each photon – for example, a photon that has a vertical spin ( | ) can be assigned
a 1.

“If you build it correctly, no hacker can hack the system. The question is
what it means to build it correctly,” said physicist Renato Renner from the
Institute of Theoretical Physics in Zurich. [9]

Regular, non-quantum encryption can work in a variety of ways but


generally a message is scrambled and can only be unscrambled using a secret
key. The trick is to make sure that whomever you’re trying to hide your
communication from doesn’t get their hands on your secret key. Cracking the
private key in a modern crypto system would generally require figuring out the
factors of a number that is the product of two insanely huge prime numbers.
The numbers are chosen to be so large that, with the given processing power
of computers, it would take longer than the lifetime of the universe for an
algorithm to factor their product.

However, such encryption techniques have their vulnerabilities. Certain


products – called weak keys – happen to be easier to factor than others. Also,
Moore’s Law continually ups the processing power of our computers. Even more
importantly, mathematicians are constantly developing new algorithms that
allow for easier factorization. Quantum cryptography avoids all these issues.
Here, the key is encrypted into a series of photons that get passed between two
parties trying to share secret information. The Heisenberg uncertainty principle
dictates that an adversary can’t look at these photons without changing or
destroying them.

“In this case, it doesn’t matter what technology the adversary has, they’ll
never be able to break the laws of physics,” said physicist Richard Hughes
of Los Alamos National Laboratory in New Mexico, who works on quantum
cryptography. [10]

6
Quantum Cryptography

2.1 Problems with Using Quantum Cryptography

However, in practice, quantum cryptography comes with its own load of


weaknesses. It was recognized in 2010, for instance, that a hacker could blind
a detector with a strong pulse, rendering it unable to see the secret-keeping
photons.

Renner points to many other problems. Photons are often generated using
a laser tuned to such a low intensity that it is producing one single photon
at a time. There is a certain probability that the laser will make a photon
encoded with your secret information and then a second photon with that same
information. In this case, all an enemy has to do is steal that second photon
and they could gain access to your data while you would be none the wiser.
Alternatively, noticing when a single photon has arrived can be tricky. Detectors
might not register that a particle has hit them, making you think that your
system has been hacked when it is really quite secure. [11]

“If we had better control over quantum systems than we have with today’s
technology” then perhaps quantum cryptography could be less susceptible to
problems,” said Renner. But such advances are at least 10 years away. Still,
he added, no system is 100% perfect and even more advanced technology will
always deviate from theory in some ways. A clever hacker will always find a way
to exploit such security holes.

Any encryption method will only be as secure as the humans running it,
added Hughes. Whenever someone claims that a particular technology “is
fundamentally unbreakable, people will say that’s snake oil,” he said. “Nothing
is unbreakable.” [12]

7
CHAPTER

Quantum Internet

Building a quantum internet is a key ambition for many countries around


the world as such a breakthrough will give them competitive advantage in a
promising disruptive technology, and opens a new world of innovations and
unlimited possibilities.

9
Quantum Internet

Recently the US Department of Energy (DoE) published the first blueprint


of its kind, laying out a step-by-step strategy to make the quantum internet
dream come true. The main goal is to make it impervious to any cyber hacking.
It will “metamorphosize our entire way of life,” says the Department of Energy.
Nearly $625 million in federal funding is expected to be allocated to the
project. A quantum internet would be able to transmit large volumes of data
across immense distances at a rate that exceeds the speed of light. You can
imagine all the applications that could benefit from such speed.

Traditional computer data is coded in either zeros or ones. Quantum


information is superimposed in both zeros and ones simultaneously. Academics,
researchers, and IT professionals will need to create devices for the
infrastructure of quantum internet including: quantum routers, repeaters,
gateways, hubs, and other quantum tools. A whole new industry will be
born based on the idea of a quantum internet existing in parallel with the
current ecosystem of companies we have in a regular internet. The “traditional
internet”, as the regular internet is sometimes called, will still exist. It
is expected that large organizations will rely on the quantum internet to
safeguard data, but that individual consumers will continue to use the classical
internet. [13]

Experts predict that the financial sector will benefit from the quantum
internet when it comes to securing online transactions. The healthcare sectors
and the public sectors are also expected to see benefits. In addition to providing
a faster, safer internet experience, quantum computing will better position
organizations to solve complex problems, like supply chain management.
Furthermore, it will expedite the exchange of vast amounts of data, and carrying
out large-scale sensing experiments in astronomy, materials discovery, and life
sciences. [13, 15]

But first let’s explain some of the basic terms of the quantum world: Quantum
computing is the area of study focused on developing computer technology
based on the principles of quantum theory. The quantum computer, following
the laws of quantum physics, would gain enormous processing power through
the ability to be in multiple states, and to perform tasks using all possible
permutations simultaneously. [14]

In a quantum computer, a number of elemental particles such as electrons


or photons can be used with either their charge or polarization acting as a
representation of 0 and/or 1. Each of these particles is known as a quantum bit,
or qubit, the nature and behavior of these particles form the basis of quantum
computing. [14]

10
Quantum Internet

3.1 What is the Quantum Internet?

The quantum internet is a network that will let quantum devices exchange some
information within an environment that harnesses the odd laws of quantum
mechanics. In theory, this would lend the quantum internet unprecedented
capabilities that are impossible to carry out with today’s web applications.

In the quantum world, data can be encoded in the state of qubits, which
can be created in quantum devices like a quantum computer or a quantum
processor. And the quantum internet, in simple terms, will involve sending
qubits across a network of multiple quantum devices that are physically
separated. Crucially, all of this would happen thanks to the wild properties that
are unique to quantum states.

That might sound similar to the standard internet, but sending qubits
around through a quantum channel, rather than a classical one, effectively
means leveraging the behavior of particles when taken at their smallest scale –
so-called “quantum states”.

Unsurprisingly, qubits cannot be used to send the kind of data we


are familiar with, like emails and WhatsApp messages. But the strange
behavior of qubits is opening up huge opportunities in other, more niche
applications. [13]

3.2 Quantum Communications

One of the most exciting avenues that researchers, armed with qubits, are
exploring, is communications security. [13] Quantum security leads us to the
concept of quantum cryptography which uses physics to develop a cryptosystem
completely secure against being compromised without knowledge of the sender
or the receiver of the messages.

Essentially, quantum cryptography is based on the usage of individual


particles/waves of light (photon) and their intrinsic quantum properties to
develop an unbreakable cryptosystem (because it is impossible to measure the
quantum state of any system without disturbing that system). [16] Quantum
cryptography uses photons to transmit a key. Once the key is transmitted, coding
and encoding using the normal secret-key method can take place. But how
does a photon become a key? How do you attach information to a photon’s
spin? [16] This is where binary code comes into play. Each type of a photon’s
spin represents one piece of information – usually a 1 or a 0, for binary code.

11
Quantum Internet

This code uses strings of 1s and 0s to create a coherent message. For example,
11100100110 could correspond to h-e-l-l-o. So a binary code can be assigned
to each photon, for example, a photon that has a vertical spin ( | ) can be
assigned a 1.

Regular, non-quantum encryption can work in a variety of ways but


generally a message is scrambled and can only be unscrambled using a secret
key. The trick is to make sure that whomever you’re trying to hide your
communication from doesn’t get their hands on your secret key. However, such
encryption techniques have their vulnerabilities. Certain products – called
weak keys – happen to be easier to factor than others. Also, Moore’s law
continually ups the processing power of our computers. Even more importantly,
mathematicians are constantly developing new algorithms that allow for easier
factorization of the secret key. [16]

Quantum cryptography avoids all these issues. Here, the key is encrypted
into a series of photons that get passed between two parties trying to share
secret information. The Heisenberg uncertainty principle dictates that an
adversary can’t look at these photons without changing or destroying them. [16]

12
CHAPTER

Quantum Teleportation

Quantum teleportation is a technique for transferring quantum information


from a sender at one location to a receiver some distance away. While
teleportation is commonly portrayed in science fiction as a means to transfer

13
Quantum Teleportation

Figure 4.1: Spooky action at a distance.

physical objects from one location to the next, quantum teleportation only
transfers quantum information. An interesting note is that the sender knows
neither the location of the recipient nor the quantum state that will be
transferred. [17]

For the first time, a team of scientists and researchers have achieved
sustained, high-fidelity “quantum teleportation” – the instant transfer of
“qubits”, the basic unit of quantum information. The collaborative team, which
includes NASA’s jet propulsion laboratory, successfully demonstrated sustained,
long-distance teleportation of qubits of photons (quanta of light) with fidelity
greater than 90%. The qubits (quantum bits) were teleported 44 km (27 miles)
over a fiber-optic network using state-of-the-art single-photon detectors and
off-the-shelf equipment. [20]

Quantum teleportation is the transfer of quantum states from one location


to another. Through quantum entanglement, two particles in separate locations
are connected by an invisible force, famously referred to as “spooky action
at a distance” by Albert Einstein (Figure 4.1). Regardless of the distance, the

14
Quantum Teleportation

encoded information shared by the “entangled” pair of particles can be passed


between them. [20]

By sharing these quantum qubits, the basic units of quantum computing,


researchers are hoping to create networks of quantum computers that can
share information at blazing-fast speeds. However, keeping this information
flow stable over long distances has proven extremely difficult, and researchers
are now hoping to scale up such a system, using both entanglement to send
information and quantum memory to store it as well. [20]

On the same front, researchers have advanced their quantum technology


researches with a chip that could be scaled up and used to build the quantum
simulator of the future using nanochip that allows them to produce enough
stable photons encoded with quantum information to scale up the technology.
The chip, which is said to be less than one-tenth of the thickness of a human
hair, may enable the researchers to achieve “quantum supremacy” – where a
quantum device can solve a given computational task faster than the world’s
most powerful supercomputer. [20]

But first let’s explain some of the basic terms of the quantum world: Quantum
computing is the area of study focused on developing computer technology
based on the principles of quantum theory. The quantum computer, following
the laws of quantum physics, would gain enormous processing power through
the ability to be in multiple states, and to perform tasks using all possible
permutations simultaneously. [18]

4.1 Quantum Teleportation: Paving the Way for a Quantum Internet

In July, the US Department of Energy unveiled a blueprint for the first quantum
internet, connecting several of its National Laboratories across the country.
A quantum internet would be able to transmit large volumes of data across
immense distances at a rate that exceeds the speed of light. You can imagine
all the applications that can benefit from such speed. [18]

Traditional computer data is coded in either zeros or ones. Quantum


information is superimposed in both zeros and ones simultaneously. Academics,
researchers and IT professionals will need to create devices for the
infrastructure of quantum internet including: quantum routers, repeaters,
gateways, hubs, and other quantum tools. A whole new industry will be born
based on the idea of the quantum internet existing in parallel to the current
ecosystem of companies we have in regular internet. [18] The “traditional
internet”, as the regular internet is sometimes called, will still exist. It

15
Quantum Teleportation

is expected that large organizations will rely on the quantum internet to


safeguard data, but that individual consumers will continue to use the classical
internet. [18]

Experts predict that the financial sector will benefit from the quantum
internet when it comes to securing online transactions. The healthcare sectors
and the public sectors are also expected to see benefits. In addition to providing
a faster, safer internet experience, quantum computing will better position
organizations to solve complex problems like supply chain management.
Furthermore, it will expedite the exchange of vast amounts of data, and carrying
out large-scale sensing experiments in astronomy, materials discovery and life
sciences. [18]

16
CHAPTER

Quantum Computing and the IoT

Consumers, companies, and governments will install 40 billion IoT devices


globally. Smart tech finds its way into every business and consumer domain
there is – from retail to healthcare, from finances to logistics – and a missed
opportunity strategically employed by a competitor can easily qualify as a
long-term failure for companies who don’t innovate.

17
Quantum Computing and the IoT

Moreover, the 2020 challenges, including : data breaches, malware and


ransomware that paralyzed IoT components namely sensors, networks, cloud,
and applications, just confirmed the need to secure all four components of
the IoT: model: sensors, networks (communications), analytics (cloud), and
applications [21, 23].

One of the top candidates to help in securing the IoT is quantum computing;
while the idea of convergence of IoT and quantum computing is not a new
topic, it has been discussed in many works of literature and covered by various
researchers, but nothing is close to a practical application so far. Quantum
computing is not ready yet, it is years away from deployment on a commercial
scale. To understand the complexity of this kind of convergence, first you need
to recognize the security issues of IoT, and second comprehend the complicated
nature of quantum computing.

The IoT system’s diverse security issues include [4, 5, 7]:


• Data breaches: IoT applications collect a lot of user data, most of it sensitive or personal, to
operate and function correctly. As such, it needs encryption protection.
• Data authentication: Some devices may have adequate encryption in place but it can still be
open to hackers if the authenticity of the data that is communicated to and from the IoT device
cannot be authenticated.
• Side-channel attacks: Certain attacks focus on the data and information it can gain from a
system’s implementation rather than vulnerabilities in the implementation’s algorithms.
• Irregular updates: Due to rapid advances in the IoT industry, a device that may have been
secure on its release may no longer be secure if its software is not updated regularly. Add to that
the famous SolarWinds supply chain attack of 2020 which infected over 18,000 companies and
government agencies using updates of office applications and network monitoring tools.
• Malware and ransomware: Malware refers to the multitude of malicious programs that
typically infect a device and influence its functioning whereas ransomware has the capability
to lock a user out of their device, usually requesting a “ransom” to gain full use back again, paid
by the cryptocurrency “Bitcoin”.

5.1 A Comparison of Classical and Quantum Computing

Classical computing relies, at its ultimate level, on principles expressed by a


branch of math called Boolean algebra. Data must be processed in an exclusive
binary state at any point in time or bits. While the time that each transistor or
capacitor needs to be either in 0 or 1 before switching states is now measurable
in billionths of a second, there is still a limit as to how quickly these devices can
be made to switch state. As we progress to smaller and faster circuits, we begin

18
Quantum Computing and the IoT

to reach the physical limits of materials and the threshold for classical laws of
physics to apply. Beyond this, the quantum world takes over.

In a quantum computer, several elemental particles such as electrons or


photons can be used with either their charge or polarization acting as a
representation of 0 and/or 1. Each of these particles is known as a quantum bit,
or qubit, the nature and behavior of these particles form the basis of quantum
computing [22].

5.2 Quantum Communications

One of the most exciting avenues that researchers, armed with qubits, are
exploring is communications security. Quantum security leads us to the
concept of quantum cryptography which uses physics to develop a cryptosystem
completely secure against being compromised without the knowledge of the
sender or the receiver of the messages. Essentially, quantum cryptography is
based on the usage of individual particles/waves of light (photon) and their
intrinsic quantum properties to develop an unbreakable cryptosystem (because
it is impossible to measure the quantum state of any system without disturbing
that system).

Quantum cryptography uses photons to transmit a key. Once the key is


transmitted, coding and encoding using the normal secret-key method can take
place. But how does a photon become a key? How do you attach information to a
photon’s spin? This is where binary code comes into play. Each type of a photon’s
spin represents one piece of information – usually a 1 or a 0, for binary code.
This code uses strings of 1s and 0s to create a coherent message. For example,
11100100110 could correspond to h-e-l-l-o. So a binary code can be assigned
to each photon – for example, a photon that has a vertical spin ( | ) can be
assigned a 1.

Quantum cryptography avoids all these issues. Here, the key is encrypted
into a series of photons that get passed between two parties trying to
share secret information. Heisenberg’s uncertainty principle dictates that
an adversary can’t look at these photons without changing or destroying
them [22, 24].

Quantum Computing and IoT

With its capabilities, quantum computing can help address the challenges and
issues that hamper the growth of IoT. Some of these capabilities are [3]:

19
Quantum Computing and the IoT

• Optimized complex computation power: With quantum computing the speed is incredibly
high; IoT benefits from this speed since IoT devices generate a massive amount of data that
requires heavy computation and other complex optimization.
• Faster validation and verification process: Quantum computing addresses this concern
as it can speed up the verification and validation process across all the systems several times
faster while ensuring constant optimization of the systems.
• More secure communications: A more secure communication is possible through quantum
cryptography, as explained before. The complexity serves as a defense against cyberattacks
including data breaches, authentication, and malware, and ransomware.

The Road Ahead

Quantum computing is still in its development stage with tech giants such as
IBM, Google, and Microsoft putting in resources to build powerful quantum
computers. While they have been able to build machines containing more and
more qubits, for example, Google announced in 2019 they achieved “quantum
supremacy”, the challenge is to get these qubits to operate smoothly and with
fewer errors. But with the technology being very promising, continuous research
and development are expected until such time that it reaches widespread
practical applications for both consumers and businesses [23, 26].

IoT is expanding as we depend on our digital devices more every day.


Furthermore, the WFH (work from home) concept resulting from COVID-19
lockdowns accelerated the deployment of many IoT devices and shortened
the learning curves of using such devices. When IoT converges with quantum
computing under “quantum IoT” or QIoT, this will push other technologies
to use quantum computing and add “quantum” or “Q” to their products and
services labels. We will then see more adoption of quantum hardware and
software applications in addition to quantum services like QSaaS, QIaaS, and
QPaaS as parts of quantum cloud and QAI (quantum artificial intelligence) to
mention few examples. [25 , 27]

20
CHAPTER

Quantum Computing and Blockchain:


Myths and Facts

The biggest danger to Blockchain networks from quantum computing is its


ability to break traditional encryption [30].

21
Quantum Computing and Blockchain: Myths and Facts

Google sent shock waves around the internet when it was claimed they
had built a quantum computer able to solve formerly impossible mathematical
calculations – with some fearing the crypto industry could be at risk. Google
stated that its experiment was the first experimental challenge against the
extended Church–Turing thesis – also known as the computability thesis – which
claims that traditional computers can effectively carry out any “reasonable”
model of computation.

6.1 Difficulties with Quantum Computers [31]

• Interference: During the computation phase of a quantum calculation, the slightest


disturbance in a quantum system (say a stray photon or wave of EM radiation) causes the
quantum computation to collapse, a process known as de-coherence. A quantum computer
must be totally isolated from all external interference during the computation phase.
• Error correction: Given the nature of quantum computing, error correction is ultra-critical –
even a single error in a calculation can cause the validity of the entire computation to collapse.
• Output observance: Closely related to the above two, retrieving output data after a quantum
calculation is complete risks corrupting the data.

6.2 What is Quantum Supremacy?

According to the Financial Times, Google claims to have successfully built


the world’s most powerful quantum computer. What that means, according to
Google’s researchers, is that calculations that normally take more than 10,000
years to perform its computer was able to do in about 200 s, and this potentially
means Blockchain, and the encryption that underpins it, could be broken.

Asymmetric cryptography used in crypto relies on key pairs, namely a


private and public key. Public keys can be calculated from their private
counterpart, but not the other way around. This is due to the impossibility
of certain mathematical problems. Quantum computers are more efficient in
accomplishing this by magnitudes, and if the calculation is done the other way
then the whole scheme breaks [30].

It would appear Google is still some way away from building a quantum
computer that could be a threat to Blockchain cryptography or other encryption.

"Google’s supercomputer currently has 53 qubits," said Dragos Ilie, a


quantum computing and encryption researcher at Imperial College London.

22
Quantum Computing and Blockchain: Myths and Facts

"In order to have any effect on bitcoin or most other financial systems
it would take at least about 1500 qubits and the system must allow for the
entanglement of all of them," Ilie said.

Meanwhile, scaling quantum computers is "a huge challenge," according to


Ilie [28].

Blockchain networks, including Bitcoin’s architecture, relies on two


algorithms: the elliptic curve digital signature algorithm (ECDSA) for digital
signatures and SHA-256 as a hash function. A quantum computer could use
Shor’s algorithm [8] to get your private information from your public key, but
the most optimistic scientific estimates say that even if this were possible, it
won’t happen during this decade.

“A 160 bit elliptic curve cryptographic key could be broken on a quantum


computer using around 1000 qubits while factoring the security-wise equivalent
1024 bit RSA modulus would require about 2000 qubits”. By comparison,
Google’s measly 53 qubits are still no match for this kind of cryptography,
according to a research paper on the matter published by Cornell University.

But that isn’t to say that there’s no cause for alarm. While the native
encryption algorithms used by Blockchain’s applications are safe for now, the
fact is that the rate of advancement in quantum technology is increasing, and
that could, in time, pose a threat. "We expect their computational power will
continue to grow at a double exponential rate," say Google researchers.

6.3 Quantum Cryptography?

Quantum cryptography uses physics to develop a cryptosystem completely


secure against being compromised without knowledge of the sender or
the receiver of the messages. The word quantum itself refers to the most
fundamental behavior of the smallest particles of matter and energy.

Quantum cryptography is different from traditional cryptographic systems


in that it relies more on physics, rather than mathematics, as a key aspect of its
security model.

Essentially, quantum cryptography is based on the usage of individual


particles/waves of light (photon) and their intrinsic quantum properties to
develop an unbreakable cryptosystem (because it is impossible to measure the
quantum state of any system without disturbing that system).

23
Quantum Computing and Blockchain: Myths and Facts

Quantum cryptography uses photons to transmit a key. Once the key is


transmitted, coding and encoding using the normal secret-key method can take
place. But how does a photon become a key? How do you attach information to
a photon’s spin?

This is where binary code comes into play. Each type of a photon’s spin
represents one piece of information – usually a 1 or a 0, for binary code. This
code uses strings of 1s and 0s to create a coherent message. For example,
11100100110 could correspond to h-e-l-l-o. So a binary code can be assigned
to each photon – for example, a photon that has a vertical spin ( | ) can be
assigned a 1.

“If you build it correctly, no hacker can hack the system. The question is
what it means to build it correctly,” said physicist Renato Renner from the
Institute of Theoretical Physics in Zurich.

Regular, non-quantum encryption can work in a variety of ways but


generally a message is scrambled and can only be unscrambled using a secret
key. The trick is to make sure that whomever you’re trying to hide your
communication from doesn’t get their hands on your secret key. Cracking the
private key in a modern crypto system would generally require figuring out the
factors of a number that is the product of two insanely huge prime numbers.

The numbers are chosen to be so large that, with the given processing power
of computers, it would take longer than the lifetime of the universe for an
algorithm to factor their product.

Encryption techniques have their vulnerabilities. Certain products – called


weak keys – happen to be easier to factor than others. Also, Moore’s Law
continually ups the processing power of our computers. Even more importantly,
mathematicians are constantly developing new algorithms that allow for easier
factorization.

Quantum cryptography avoids all these issues. Here, the key is encrypted
into a series of photons that get passed between two parties trying to share
secret information. The Heisenberg uncertainty principle dictates that an
adversary can’t look at these photons without changing or destroying them.

“In this case, it doesn’t matter what technology the adversary has, they’ll
never be able to break the laws of physics,” said physicist Richard Hughes
of Los Alamos National Laboratory in New Mexico, who works on quantum
cryptography [32, 33].

24
CHAPTER

Quantum Computing and AI: A Mega-Buzzword

Quantum computers are designed to perform tasks much more accurately


and efficiently than conventional computers, providing developers with a
new tool for specific applications. It is clear in the short-term that quantum
computers will not replace their traditional counterparts; instead, they will
require classical computers to support their specialized abilities, such as system
optimization. [35]

Quantum computing and artificial intelligence are both transformational


technologies and artificial intelligence needs quantum computing to achieve
significant progress. Although artificial intelligence produces functional
applications with classical computers, it is limited by the computational
capabilities of classical computers. Quantum computing can provide a

25
Quantum Computing and AI: A Mega-Buzzword

computation boost to artificial intelligence, enabling it to tackle more complex


problems in many fields in business and science. [37]

7.1 What is Quantum Computing?

Quantum computing is the area of study focused on developing computer


technology based on the principles of quantum theory. The quantum computer,
following the laws of quantum physics, would gain enormous processing power
through the ability to be in multiple states and to perform tasks using all
possible permutations simultaneously.

7.2 Difficulties with Quantum Computers

• Interference: During the computation phase of a quantum calculation, the slightest


disturbance in a quantum system (say a stray photon or wave of EM radiation) causes the
quantum computation to collapse, a process known as de-coherence. A quantum computer
must be totally isolated from all external interference during the computation phase.
• Error correction: Given the nature of quantum computing, error correction is ultra-critical –
even a single error in a calculation can cause the validity of the entire computation to collapse.
• Output observance: Closely related to the above two, retrieving output data after a quantum
calculation is complete risks corrupting the data.

7.3 Applications of Quantum Computing and AI

Keeping in mind that the term “quantum AI” means the use of quantum
computing for computation of machine learning algorithms, which takes
advantage of computational superiority of quantum computing to achieve
results that are not possible to achieve with classical computers, the following
are some of the applications of this super mix of quantum computing and AI
(Figure 7.1) [34, 37]:

7.4 Processing Large Sets of Data

We produce 2.5 exabytes of data every day. That’s equivalent to 250,000


Libraries of Congress or the content of 5 million laptops. Every minute of
every day 3.2 billion global internet users continue to feed the data banks with

26
Quantum Computing and AI: A Mega-Buzzword

Figure 7.1: Applications of quantum computing and AI.

9722 pins on Pinterest, 347,222 tweets, 4.2 million Facebook likes plus ALL the
other data we create by taking pictures and videos, saving documents, opening
accounts and more. [36]

Quantum computers are designed to manage the huge amount of data,


along with uncovering patterns and spotting anomalies extremely quickly.
With each newly launched iteration of quantum computer design and the new
improvements made on the quantum error-correction code, developers are now
able to better manage the potential of quantum bits. They also optimize the
same for solving all kinds of business problems to make better decisions. [35]

7.5 Solve Complex Problem Faster

Quantum computers can complete calculations within seconds, which would


take today’s computers many years to calculate. With quantum computing,

27
Quantum Computing and AI: A Mega-Buzzword

developers can do multiple calculations with multiple inputs simultaneously.


Quantum computers are critical to process the monumental amount of data that
businesses generate on a daily basis, and the fast calculation can be used to
solve very complex problems, which can be expressed as quantum supremacy;
where the calculations that normally take more than 10,000 years to perform, a
quantum computer can do it 200 s. The key is to translate real-world problems
that companies are facing into quantum language. [35, 39]

7.6 Better Business Insights and Models

With the increasing amount of data generated in industries like pharmaceutical,


finance and life science industries, companies are losing their ties with the
classical computing rope. To have a better data framework, these companies
now require complex models that have the potential processing power to
model the most complex situations. And that’s where quantum computers
play a huge role. Creating better models with quantum technology will lead
to better treatments for diseases in the healthcare sector, like the COVID-
19 research cycle from test, tracing and treating of the virus, can decreased
financial implosion in the banking sector and improve the logistics chain in the
manufacturing industry. [35]

7.7 Integration of Multiple Sets of Data

To manage and integrate multiple numbers of sets of data from multiple sources,
quantum computers are best to help, as they make the process quicker, and
also make the analysis easier. The ability to handle so many stakes has made
quantum computing an suitable choice for solving business problems in a
variety of fields. [35]

7.8 The Future

The quantum computing market will reach $2.2 billion, and the number of
installed quantum computers will reach around 180, in 2026, with about 45
machines produced in that year. These include both machines installed at
the quantum computer companies themselves that are accessed by quantum
services as well as customer premises machines. [38]

28
Quantum Computing and AI: A Mega-Buzzword

Cloud access revenues will likely dominate as a revenue source for quantum
computing companies in the format of quantum computing as a service (QCaaS)
offering, which will account for 75% of all quantum computing revenues in 2026.
Although, in the long run, quantum computers may be more widely purchased,
today potential end users are more inclined to do quantum computing over
the cloud rather than make technologically risky and expensive investments
in quantum computing equipment. [38]

On a parallel track, quantum software applications, developers’ tools and


the number of quantum engineers and experts will grow as the infrastructure
develops over the next 5 years, which will make it possible for more
organizations to harvest the power of two transformational technologies,
quantum computing and AI, and encourage many universities to add quantum
computing as an essential part of their curriculum.

29
CHAPTER

Quantum Computing Trends

Quantum computing is the area of study focused on developing computer


technology based on the principles of quantum theory. Tens of billions of public
and private capitals are being invested in quantum technologies. Countries
across the world have realized that quantum technologies can be a major
disruptor of existing businesses, and they collectively invested $24 billion in
in quantum research and applications in 2021 [40].

31
Quantum Computing Trends

Figure 8.1: Future of computing.

8.1 A Comparison of Classical and Quantum Computing

Classical computing relies, at its ultimate level, on principles expressed by


Boolean algebra (Figure 8.1). Data must be processed in an exclusive binary
state at any point in time or what we call bits. While the time that each transistor
or capacitor need be either in 0 or 1 before switching states is now measurable
in billionths of a second, there is still a limit as to how quickly these devices can
be made to switch state.

As we progress to smaller and faster circuits, we begin to reach the physical


limits of materials and the threshold for classical laws of physics to apply.
Beyond this, the quantum world takes over; in a quantum computer, a number of
elemental particles such as electrons or photons can be used with either their
charge or polarization acting as a representation of 0 and/or 1. Each of these
particles is known as a quantum bit, or qubit, the nature and behavior of these
particles form the basis of quantum computing [2]. Classical computers use
transistors as the physical building blocks of logic, while quantum computers
may use trapped ions, superconducting loops, quantum dots or vacancies in a
diamond [40].

8.2 Physical vs. Logical Qubits

When discussing quantum computers with error correction, we talk about


physical and logical qubits. Physical qubits are the physical qubits in a quantum
computer, whereas logical qubits are groups of physical qubits we use as a single
qubit in our computation to fight noise and improve error correction.

32
Another random document with
no related content on Scribd:
CHAPTER II
CINCINNATI AND WASHINGTON

One day after we had been married less than a year my husband
came home looking so studiously unconcerned that I knew at once he
had something to tell me.
“Nellie, what would you think,” he began casually, “if I should be
appointed a Judge of the Superior Court?”
“Oh, don’t try to be funny,” I exclaimed. “That’s perfectly
impossible.”
But it was not impossible, as he soon convinced me. My father had
just refused the same appointment and it was difficult to believe that
it could now be offered to my husband who was only twenty-nine
years old. It was a position made vacant by the retirement from the
Bench of Judge Judson Harmon who was my husband’s senior by
more than a decade.
One of the most prominent and prosperous law firms in Cincinnati
was that of Hoadley, Johnston and Colston, and both Mr. Hoadley
and Mr. Johnston had been invited to go to New York and become
partners of Mr. Edward Lauterbach who was then doing an
enormous business.
They went, and the old firm in Cincinnati being broken up, Mr.
Colston asked Judge Harmon, who was then on the Superior Court,
to take Mr. Hoadley’s place. Mr. Harmon decided to do so, but he
was anxious to resign his judgeship in such a way as to leave a long
enough vacancy to attract a good man. It was an elective office and
the law provided that a vacancy occurring within thirty days before
election could not be filled by an election until the following year.
Judge Harmon resigned so as to make the appointment for a period
of fourteen months. After my father declined it, the choice lay
between Mr. Taft and Mr. Bellamy Storer. Mr. Taft always thought
that but for his opportunity in the Campbell case Judge Hannon
would not have recommended him and Governor Foraker would not
have appointed him. That is why he says he traces all his success
back to that occasion. Mr. Foraker was opposing counsel in the
Campbell case, but he had a lawyer’s appreciation for a lawyer’s
effort.
After the first pleased surprise at the honour which came to us so
unexpectedly I began to think; and my thinking led me to decide that
my husband’s appointment on the Bench was not a matter for such
warm congratulation after all. I saw him in close association with
men not one of whom was less than fifteen years older than he, and
most of whom were much more than that. He seemed to me
suddenly to take on a maturity and sedateness quite out of keeping
with his actual years and I dreaded to see him settled for good in the
judiciary and missing all the youthful enthusiasms and exhilarating
difficulties which a more general contact with the world would have
given him. In other words, I began even then to fear the narrowing
effects of the Bench and to prefer for him a diverse experience which
would give him an all-round professional development.
He did not share this feeling in any way. His appointment on the
Superior Court was to him the welcome beginning of just the career
he wanted. After serving the interim of fourteen months he became a
candidate for the office and was elected for a term of five years. This
was the only elective office Mr. Taft ever held until he became
President.
My own time and interest during that winter was largely spent on
my house. We had been very particular about the plans for it and had
fully intended that it should combine outward impressiveness with
inward roominess and comfort. It was a frame structure, shingled all
over, and with certain bay window effects which pleased me
exceedingly. In fact, with our assistance, the architect had made a
special effort to produce something original and, while I don’t claim
that the result was a conspicuous architectural success, to my mind it
was anything but a failure. And our view of the Ohio River and the
surrounding country was really superb.
But I was not destined to enjoy my satisfaction with my
surroundings very long. The section had been at one time a stone
quarry, and the man who had levelled off the land and filled in the
gulches made by the quarry operations, took as a part of his
compensation two building lots which happened to be just across the
street from ours. He forthwith proceeded to put up a sort of double
house which looked more like a gigantic dry-goods box than anything
else, and I felt that it quite robbed the neighbourhood of the “tone”
which I had confidently hoped our house would give it. The double
house had just one quality and that was size.
I think the owner, whose name was Jerry something, lived in one
side of it, and he had a tenant in the other who hung clothes out of
the front windows. But tastes in architecture differ, as we soon found
out.
We were paying taxes on our house at an assessed value of $4000
and the undervaluation had been troubling my husband’s conscience
for a long time, in spite of my assuring him that tax collectors ought
to know their own business. Some men from the board of
equalization were to call one day to make a new appraisement and I
had very much hoped that my husband would not be at home. But he
was; he was there to welcome them and give them every possible
assistance. Without waiting for an examination of the premises, he
addressed one of them, an Irishman named Ryan.
“See here, Mr. Ryan,” he said, “I understand that Jerry, my
neighbour across the street, has his property assessed at $5000. Now
I don’t think that’s fair. I’m assessed at only $4000 and I’m sure my
house cost a good deal more than his. As a matter of fact it cost over
$6000. Now I’m a Judge of the Superior Court; I get my income out
of taxes and I certainly have no disposition to pay any less than my
share.”
“Well, Judge, your Honour,” said Mr. Ryan, “that is a sentiment
very befitting your Honour. Now I’ll just be after goin’ over and
lookin’ at those houses of Jerry’s, and then I’ll come back and look at
yours.”
I watched them as they went over to the other houses; then I saw
them go up the street a way and down the street a way, looking us
carefully over from every possible view-point. When they came in
they wore a very judicial aspect and I expected to see taxes go up
with one wild leap.
“Well, Judge, your Honour,” began Mr. Ryan, “I think you’re givin’
yourself unnecessary concern. We assess houses for what they’re
worth and not for what they cost. While your house no doubt suits
your taste, it has a peculiar architectural style that wouldn’t please
very many people, and certainly it ain’t to compare with those houses
of Jerry’s. There’s a modern polish about those houses that will rent,
Judge, your Honour.”
My son Robert was born in this house on McMillan Street in
September, 1889. In the following February an interruption occurred
in our peaceful existence which was welcome at least to me.
President Harrison offered the appointment of Solicitor General of
the United States to Mr. Taft and he, with a few regretful glances at
his beloved Bench, accepted it. I think that once again it was Major
Butterworth who suggested my husband’s name to the appointing
power. I was very glad because it gave Mr. Taft an opportunity for
exactly the kind of work I wished him to do; work in which his own
initiative and originality would be exercised and developed. I looked
forward with interest, moreover, to a few years in Washington.
Mr. Taft made his first official arrival in Washington alone. My
baby, Robert, was only six months old and I concluded to remain in
Cincinnati until my husband could make arrangements for our
comfortable reception. His description of his first day in Washington
is, in the light of later events, rather amusing.
He arrived at six o’clock on a cold, gloomy February morning at
the old dirty Pennsylvania station. He wandered out on the street
with a heavy bag in his hand looking for a porter, but there were no
porters. Then he stood for a few moments looking up at the Capitol
and feeling dismally unimportant in the midst of what seemed to him
to be very formidable surroundings. He wondered to himself why on
earth he had come. He was sure he had made a fatal mistake in
exchanging a good position and a pleasant circle at home, where
everybody knew him, for a place in a strange and forbidding city
where he knew practically nobody and where, he felt sure, nobody
wanted to know him. He lugged his bag up to the old Ebbitt House
and, after eating a lonesome breakfast, he went to the Department of
Justice to be sworn in. After that ceremony was over and he had
shaken hands with the Attorney General, he went up to inspect the
Solicitor General’s Office, and there he met the most dismal sight of
the whole dismal day. His “quarters” consisted of a single room,
three flights up, and bearing not the slightest resemblance to his
mental picture of what the Solicitor General’s offices would be like.
The Solicitor General’s stenographer, it seemed, was a telegrapher in
the chief clerk’s office and had to be sent for when his services were
required. Altogether it must have been a very disheartening outlook.
As Mr. Taft sat looking over briefs and other papers, and trying to
get some definite idea about his new work, a messenger brought in a
card.
“Mr. Evarts, New York,” it read.
Evarts was a well-known name, of course, but it was hard for Mr.
Taft to believe that the William M. Evarts, leader of the American Bar
and then Senator from New York, could be calling on the Solicitor
General of less than a day. He knew that Wm. M. Evarts had known
his father.
Mr. Evarts entered.
“Mr. Taft,” he said, as he gave my husband’s hand a cordial grasp,
“I knew your father. I was in the class of ’37 at Yale and he had
graduated before I entered; but he was there as a tutor in my time
and I valued his friendship very highly.”
Then the visitor came straight to the point.
“Mrs. Evarts and I are giving a dinner to-night for my former
partner and his wife, Mr. and Mrs. Joseph Choate. Mr. Choate is in
Washington for a short time to argue a case before the Supreme
Court. Now, unfortunately, one of our guests has sent word that he
can’t come and I thought, perhaps, considering my long-standing
friendship with your father, you might consent to waive ceremony
and fill the place at our table at this short notice.”
My husband accepted the invitation with almost undue alacrity,
and when his guest left started in on his new duties feeling that, after
all, Washington might afford just as friendly an atmosphere as
Cincinnati, once he became accustomed to it.
There is just one incident in connection with the dinner party
which Mr. Taft adds to his account of that day. As he sat down to
dinner the ladies on either side of him leaned hastily forward to see
what was written on his place card. “The Solicitor General”—that was
all. Of course neither of them knew who the new Solicitor General
was and it didn’t occur to him to enlighten them until it was too late
to do it gracefully. So he allowed them to go on addressing him as
“Mr. Solicitor General” while he, having them at an advantage,
addressed them by the names which he had surreptitiously read on
their place-cards. They were Mrs. Henry Cabot Lodge and Mrs. John
Hay.

MRS. TAFT, WITH ROBERT AND HELEN, WHEN MR. TAFT


WAS SOLICITOR GENERAL

When my husband had been in Washington two weeks I joined


him and we took a small house on Dupont Circle where for two years
we lived a life, sometimes amusing, sometimes quite exciting, but, on
the whole, of quiet routine.
Washington society was much simpler then than it is now. Since
that time a great many people of very large means have gone to
Washington to live because of its unusual attractions and its
innumerable advantages as a residential city. They have changed
Washington, by their generous hospitality, into one of the most
brilliant social centres in the world, where large dinner parties, balls,
receptions, musicals and other entertainments are of daily and
nightly occurrence throughout the season. The very character of the
streets has changed. The small, red brick houses, closely grouped
together and neighbouring, even in fashionable quarters, on negro
shacks and cheap tenements, are being everywhere replaced by
marble and granite residences of great beauty and luxury.
In 1890 Society in Washington still consisted, chiefly, of the “best
families” of the old city, the Diplomatic Corps and the highest among
the government officials. A dinner party of twelve was still
considered large, and only a few people had weekly evenings At
Home. There were occasional big receptions, but for nobody was
society the mad rush that it is to-day. We ourselves lived very simply
even for those simple days.
My daughter Helen was born in 1891, so for the last year in
Washington I had two small babies to care for. In order that he might
get a little much needed exercise Mr. Taft bought a horse and,
fortunately, for us, he secured a most adaptable creature. He was
supposed to be a riding horse, but he didn’t mind making himself
generally useful. The Attorney General lent us a carriage which he
was not then using—a surrey, I think it was called—and we hitched
him to that; and the whole Taft family drove out of a Sunday
afternoon to the Old Soldiers’ Home, which was the fashionable drive
in those days, or up the aqueduct road to Cabin John’s bridge. My
sister Maria who visited us used always to speak of our steed as
“G’up,” a name suggested by Bobby’s interpretation of his father’s
invocations to the good-natured and leisurely beast. Poor old “G’up”!
I suppose with his “horse sense” he finally realised that he was
leading such a double life as no respectable horse should lead; he
gave up and died before we left Washington.
The Justices of the Supreme Court and the Attorney General, the
men with whom Mr. Taft came most in contract, were, with their
wives, very kind and attentive to us, including us in many of their
delightful parties. Chief Justice Fuller was then the head of the court
and I have the pleasantest memories of his and Mrs. Fuller’s
hospitality. Justice Grey had married a Miss Matthews, a daughter of
Mr. Justice Matthews. I had known Mrs. Grey in Cincinnati before
her marriage.
During the course of my first weeks in Washington Mr. Taft had
taken special pains to impress on me many times the necessity for
my calling on Mrs. Grey without any delay. Much importance
attached to the formality of first calls and I was the newest of
newcomers who had to call on the wives of all my husband’s official
superiors before they noticed me. Still, it was a full month before I
had time to go to Mrs. Grey’s and I was considerably worried about
it. But when, finally, I did go and had been most kindly received, I
explained at once that the settling of myself and my small baby in a
new house had, until then, kept me too busy for any calls. Mrs. Grey
hastened to assure me that she understood my position perfectly and
had not thought of blaming me.
“Indeed, my dear,” she said, “I knew that you had a small baby in
the house and that you must be kept constantly occupied. As a
matter of fact I should have waived ceremony and come myself to
welcome you to Washington except for one thing which I could not
very well overlook, and that is—that Mr. Taft has not yet called on
Mr. Justice Grey.”
I think I have rarely seen anything more satisfactorily amusing
than the expression on my husband’s face when I told him this.
But, in spite of the friendliness of the Justices and others, we really
went out very little. On one occasion when my sister Maria had been
visiting us for several weeks we went for a Sunday night supper to
the house of a lady whom Maria had known very well in Cincinnati.
She was living that winter in Washington and seemed to be rather
well pleased with her social success. She talked loftily throughout
supper, and during a good part of the evening, about the dinner
parties she had attended and the grand people she had met. Then
just as we were about to start home she turned to my sister and said:
“And have you been much entertained, my dear Maria?”
“Oh, I’ve been enjoying myself tremendously,” was the answer.
“Well, with whom have you dined, dear?” persisted our hostess.
“Why, we’ve dined with the Andersons, with the German
Ambassador, with the Chief Justice, and with the Maurys, and with
the French Ambassador,—and with, oh, a number of other people.”
Our hostess was visibly impressed.
“Why! you really have been very gay, haven’t you, dear!” she
exclaimed.
When we got into our cab to go home Maria turned to my husband
and said:
“I had my eye on you all the time I was talking, Will Taft. I was
perfectly certain that your terrible sense of fact would overcome you
and that you would blurt out that I dined with all those people on the
same evening at the same dinner party!”
President Harrison, in March, 1892, appointed my husband on the
Federal Circuit Bench, so once more I saw him a colleague of men
almost twice his age and, I feared, fixed in a groove for the rest of his
life. However, he was greatly pleased and very proud to hold such a
dignified and responsible position at the age of thirty-four. I think he
enjoyed the work of the following eight years more than any he has
ever undertaken.
We moved back to Cincinnati. Mr. Taft’s circuit included parts of
Ohio, Kentucky, Tennessee, and Michigan—reached in fact, from
Lookout Mountain to Marquette, and he was much away from home.
My own life during those years in Cincinnati was very busy, for, in
addition to my occupation with family and friends, I became
interested in a number of civic movements.
My principal work was the organisation and management of the
Cincinnati Orchestra Association. I found, at last, a practical method
for expressing and making use of my love and knowledge of music.
We had not had a good symphony orchestra in the city since
Theodore Thomas left, but with our music-loving population it was
only necessary that somebody should take the initiative and arouse
definite enthusiasm and keep it going, in order to establish and
maintain such an institution. There were many public-spirited
citizens, some of them true music-loving Germans, and I saw no
reason why I should not get strong popular support for my project. I
was not disappointed. From the first the response was general and
generous and we did not have much difficulty in raising the
necessary funds for financing the orchestra, although in addition to
our box-office receipts, we had to secure $30,000 a year for six
consecutive years. It could not have been done had it not been for
such liberal friends as my brother and sister, Mr. and Mrs. Charles P.
Taft, Mr. Charles Krippendorf, Mr. M. E. Ingalls, Mr. and Mrs. L. A.
Ault, Mrs. Charles Fleishmann, Mr. J. G. Schmidlapp and others.
For the first year we had three different directors, Mr. Seidl, Mr.
Schradick and Mr. Van der Stücken, who came to Cincinnati and led
two concerts each. Then we secured Mr. Van der Stücken as a
permanent leader and he remained with the orchestra ten years.
I think I regretted the Cincinnati Orchestra Association more than
anything else when we left for the Philippines, but I left it in good
and well-trained hands. Mrs. C. R. Holmes, who succeeded me as
President of the Association, had taken a great part in the original
work of organisation and management, as had my sister-in-law, Mrs.
Charles P. Taft, and others. Through their efforts the orchestra has
been enlarged and improved and it is still a source of great pride and
satisfaction to the city of Cincinnati. Mrs. Charles Taft is now the
President and through her interest, activity and generosity it has
been enabled to grow in excellence.
Except for the orchestra, our life was tranquil; quite too settled, I
thought, and filled with the usual homely incidents connected with
housekeeping and the entertaining development of small children.
My youngest child, Charles, was born in 1897, and my family was
thus complete.
I come now to the years which we gave to the Philippine Islands
and I must say that I wonder yet how our lot happened to be so cast.
There had never been any unusual interest in our family as to the
results of the Spanish-American War. Like most patriotic Americans
we had been greatly excited while the war was in progress and had
discussed its every phase and event with a warmth of approval, or
disapproval, as the case might be, but it did not touch us directly,
except as citizens, any more than it touched the vast majority of the
people of the United States. And yet, it came to mean more to us
personally, than any other event in our times. The whole course of
my husband’s career was destined to be changed and influenced by
its results.
Mr. Taft was strongly opposed to taking the Philippines. He was
not an anti-imperialist in the sense that he believed the Constitution
required us to keep the boundaries of the United States within their
continental limits, but he thought the Antipodes rather a far stretch
for the controlling hand, and he thought the taking of the Philippines
would only add to our problems and responsibilities without
increasing, in any way, the effectiveness and usefulness of our
government.
Oddly enough, he had expressed himself to that effect when he
happened, during the Spanish War, to be dining with a number of
judges including Justice Harlan who, although later an anti-
imperialist, was at that time strongly upholding the policy of taking
over Spanish territory in both oceans.
Mr. Taft knew just about as much about the Filipino people as the
average American knew in those days. What he definitely knew was
that they had been for more than three centuries under Spanish
dominion and that they now wanted political independence. He was
heartily in favour of giving it to them.
It was one day in January, 1900, that he came home greatly
excited and placed before me a telegram.
“What do you suppose that means?” said he.
“I would like to see you in Washington on important business
within the next few days. On Thursday if possible,” it read. And it
was signed—William McKinley.
We didn’t know and we couldn’t think what possible business the
President could have with him. I began to conjure up visions of
Supreme Court appointments; though I knew well enough that
Supreme Court appointments were not tendered in that fashion and
besides there was no vacancy.
Mr. Taft lost no time in responding to the President’s summons
and I awaited his return with as much patience as I could muster. In
three days he came home with an expression so grave that I thought
he must be facing impeachment. But when he broke his news to me it
gave me nothing but pleasure.
“The President wants me to go to the Philippine Islands,” he said,
in a tone he might have used in saying: “The President wants me to
go out and jump off the court house dome.” “Want to go?” he added.
“Yes, of course,” I answered without a moment’s hesitation. I
wasn’t sure what it meant, but I knew instantly that I didn’t want to
miss a big and novel experience. I have never shrunk before any
obstacles when I had an opportunity to see a new country and I must
say I have never regretted any adventure.
“The President and Mr. Root want to establish a civil government
in the Philippines,” said Mr. Taft, “and they want me to go out at the
head of a commission to do it.” It was only after I had accepted the
invitation to go ten thousand miles away that I asked for an
explanation.
In answer to the President’s proposal, Mr. Taft said that he didn’t
approve of the acquisition of the Philippines in the first place, and
that in the second place he knew nothing about colonial government
and had had really no experience in executive work of any kind. But
Mr. McKinley did not accept these objections as final. He called in
Mr. Root, who was then Secretary of War, and who would be Mr.
Taft’s chief in the proposed mission to the Philippines, and together
they presented the case so strongly that my husband could not help
but waver in his decision. Neither Mr. McKinley nor Mr. Root had
rejoiced in the taking over of the Philippines for that matter, but that
was beside the question; the Philippines were taken, and it behooved
the United States to govern them until such time as their people had
learned the difficult art of governing themselves.
Mr. Root said:
“The work to be done in the Philippines is as great as the work
Livingston had to do in Louisiana. It is an opportunity for you to do
your country a great service and achieve for yourself a reputation for
the finest kind of constructive work. You have had a very fortunate
career. While you are only slightly over forty you have had eight
years on the Federal Bench, three years on the State Bench and two
years as Solicitor General. These places you have filled well, but they
have been places which involved no sacrifice on your part. Here is a
field which calls for risk and sacrifice. Your country is confronted
with one of the greatest problems in its history, and you, Judge Taft,
are asked to take immediate charge of the solution of that problem
7,000 miles away from home. You are at the parting of the ways. Will
you take the easier course, the way of least resistance, with the
thought that you had an opportunity to serve your country and
declined it because of its possible sacrifice, or will you take the more
courageous course and, risking much, achieve much? This work in
the Philippines will give you an invaluable experience in building up
a government and in the study of laws needed to govern a people,
and such experience cannot but make you a broader, better judge
should you be called upon again to serve your country in that
capacity.”
My husband promised to consult with me and with his brother
Charles and give his answer in a few days. He didn’t know whether or
not I would be willing to go, but that was a question soon settled.
His resignation of his judgeship was the greatest difficulty. The
President told him he did not think it would be at all necessary for
him to resign since the work in the Philippines would take only about
six months—nine months at the longest—and that he could absent
himself from his duties for that length of time, and for such a
purpose, without fear of any kind of unfortunate consequences. Mr.
Taft’s investigation and study of the situation immediately convinced
him that Mr. McKinley was wrong in his expectation that the work
could be done so quickly. Nor did Mr. Root have any such idea. Even
with the meagre information which was then available, my husband
at once saw that it would be years before the Philippine problem
would begin to solve itself. So he resigned from the Bench; the
hardest thing he ever did.
After sending in his acceptance he went immediately to
Washington to discuss with Mr. McKinley and Mr. Root the whole
situation and, especially, the names of four other men who were to be
chosen to serve with him on the Commission. He had met Mr.
Worcester, a member of the first Commission, and had got from him
a great deal of valuable data. If Professor Shurman, the chairman of
the first Commission, had become a member of the second, he
probably would have been at its head, but he did not, and this
position fell to Mr. Taft. He was thereafter known as President of the
Commission, until civil government was organised in the Philippines
and he became governor.
After he had gone to Washington I began at once to make hasty,
and I may say, happy preparations for my adventure into a new
sphere. That it was alluring to me I did not deny to anybody. I had no
premonition as to what it would lead to; I did not see beyond the
present attraction of a new and wholly unexplored field of work
which would involve travel in far away and very interesting
countries. I read with engrossing interest everything I could find on
the subject of the Philippines, but a delightful vagueness with regard
to them, a vagueness which was general in the United States at that
time, and has not, even yet, been entirely dispelled, continued in my
mind. There were few books to be found, and those I did find were
not specially illuminating.
I gave up my house in Cincinnati and stored my belongings,
packing for shipment to the Orient only such things as I thought
would be absolutely necessary. We were to leave almost immediately
and I had very little time in which to do a great many things. Mr. Taft
came back to Cincinnati for a short period and we entered upon a
busy season of good-bye hospitality. Everybody we knew, and we
knew nearly everybody, wanted to give us a farewell dinner or
entertainment of some sort. Mr. Taft, especially, was fêted in a way
which proved to him how much more widely he was valued in his
native town than he had ever realised. In the opinions of people then
we were going, sure enough, to the ends of the earth, and many of
our friends were as mournful about it as if they had private
foreknowledge that it was to be a fatal adventure.
When the banquets and dinners and luncheons and receptions and
teas had all been given; when the speeches had all been made, and
the good-byes had all been said, Mr. Taft hastened off to Washington
once more to meet his colleagues and make final arrangements, and I
was not to see him again until we met in San Francisco a week before
the date set for sailing.
I asked my sister Maria to go with me for the first year, and she
accepted with delight. So, one morning in early April, with our world
waving at us from the platform of the station, we started south to join
the Southern Pacific railroad at New Orleans and to make our way
from there to Los Angeles and so to San Francisco.
CHARLIE TAFT WHEN HE WENT TO
THE PHILIPPINES

I had with me my three children, Robert, Helen and Charlie.


Robert was ten years old, Helen eight, while Charlie, my baby, was
just a little over two. It did not occur to me that it was a task to take
them on such a long journey, or that they would be exposed to any
danger through the experience. They were normal, healthy and very
self-reliant little people and I made preparations for their going
without giving the matter a moment’s unhappy consideration. But I
was to receive a few shocks in this connection later on. One of these
came when I learned that some members of the party had left their
children at home for fear of the Philippine climate. Then one day, at
the old Palace Hotel in San Francisco, I was sitting on guard over
Charlie as he played up and down a wide corridor, and reading a
book at intervals, when along came an odd-looking elderly
gentleman who stopped to regard the boy with a smile of the
kindliest amusement. Charlie was an attractive child. Even I couldn’t
help but see that, and I was used to having people stop to watch him.
He had big, dark eyes, soft, brown curls, very deep dimples, and a
charming smile that was always in evidence. The elderly gentleman
stood watching him for some little time, his face growing gradually
very grave, and I wondered what he was thinking about. He didn’t
keep me wondering long. After a few moments he stepped
deliberately up to me and said:
“Madam, I understand you are going to the Philippine Islands.
Now I want to know if you are going to take that great, big, beautiful
boy out to that pest-ridden hole and expose him to certain
destruction.”
I grabbed my great, big, beautiful boy and rushed off to my room,
and it was a relief eventually to learn that the awful Philippine
climate, at least so far as children were concerned, existed, largely, in
people’s minds.
We found intense interest in our mission in California and San
Francisco. If there were any anti-imperialists there, they successfully
concealed themselves. The East was uncomfortably crowded with
them in those days, but the evident interest and profit that the West
coast would derive from a large Philippine trade may have been
responsible for the favourable attitude of the Californians. However,
we must not impeach their patriotism, and we ought to attribute
some of their enthusiasm in reference to the Philippines, and our
assuming control over them, to the natural enterprise of a people
who had themselves gone so far in a land of development and hope.
Everything that could be done to make smooth the path of the new
Commission was done. At their own request the powers of the
Commissioners were carefully defined so that complications with the
military government then in force in the islands, might be avoided.
They were given equal rank with ministers plenipotentiary in the
matter of naval courtesies and precedence; and Mr. Root drafted a
letter of instructions, which the President signed, outlining their
duties in such precise and correct detail that it was afterward
adopted and ratified in its entirety in the act of Congress by which
the Philippine government was established.
So—I believed we were going to have “smooth sailing” in every
sense, when we started on the long voyage with which began this
interesting experience.
CHAPTER III
TO THE PHILIPPINES

The United States Army Transport Hancock had been assigned to


the Commission for the trip from San Francisco to Manila and it was
at noon on a pleasant day in mid-April—the seventeenth—that she
pulled away from the crowded dock and headed straight for the
Golden Gate and the long path across the Pacific that leads to the
other side of the world. There were forty-five people in our party and,
although most of us had met for the first time in San Francisco, we
soon became well acquainted, as people do on shipboard, and
proceeded at once to prove ourselves to be a most harmonious
company.
The Hancock was the old Arizona, a one-time greyhound of the
Atlantic, which the Government had purchased and remodelled for
service as an army transport. A considerable fleet of such vessels
plied the Pacific at that time, carrying large consignments of troops
to and from the Philippines and, though there are not so many now, I
still read with interest of the comings and goings of ships whose old,
friendly sounding names became so familiar to us in the course of
our residence in the East. The Grant, the Sherman, the Sheridan, the
Thomas, and others, all named for great American generals, awaken
memories of interesting days. The Hancock was later given up by the
Army and turned over to the Navy on account of her heavy
consumption of coal. She is now used as a recruiting ship at the
Brooklyn Navy Yard.
We found her very comfortable. There were few people aboard
besides the members of our party, and, as she was equipped to carry
the officers and men of an entire regiment, we found ourselves
commodiously quartered. Moreover, the commissary of the transport
service had received instructions to give us excellent fare; this, I
believe, through the thoughtful kindness of Mr. McKinley himself.
Mr. McKinley never failed to take a personal interest in the
everyday welfare of all those in his administration who came under
his own observation and we were made to feel this throughout our
experience on the Philippine Commission, while he lived. On every
appropriate occasion we were certain to receive from him some
kindly compliment, a cablegram or other communication, and it
made everybody who came within range of his influence anxious to
serve him well and to make the work which was being done
satisfactory and pleasing to him. I owe to our connection with
President McKinley’s administration some of my happiest
recollections.
The men who made up the second Philippine Commission were
Mr. Taft, General Luke E. Wright of Memphis, Tennessee; Judge
Henry C. Ide of Vermont, Professor Dean C. Worcester of the
University of Michigan, and Professor Bernard Moses of the
University of California. A short introduction of my husband’s
colleagues and the members of their families who went with them to
the Philippines will be necessary at this point, because I was destined
to be constantly associated with them during four of the most
interesting years of my life. Our co-operation, social and
governmental, was based upon a common purpose, and our
attachment to this purpose, as well as the bonds of friendship which
united us, were greatly strengthened by the opposition we had to
meet for some months after we reached Manila, not only from the
Filipinos, but also from the military government which the
Commission was sent out gradually to replace.
The men of the Commission, coming, as they did, from different
parts of the United States, were widely contrasted, no less in
associations than in their varied accents and family traditions.
General Wright was, and is, one of the ablest lawyers in Tennessee,
and enjoyed, at the time of his appointment on the Commission, the
finest practice in Memphis. He is a Democrat; and old enough to
have been a lieutenant in the Civil War on the Confederate side. But
perhaps his finest laurels for bravery and devotion to duty were won
at the time when he exerted himself to save Memphis in the days
when she was in the grip of a terrible epidemic of yellow fever. I don’t
know the exact year, but the epidemic was so out of control that all
who could, left the city, while General Wright remained to organise
such resistance as could be made to the spread of the dread disease.
Mrs. Wright was a daughter of the famous Admiral Semmes of the
Confederate Navy and for some time after the war she travelled with
her father in Mexico and abroad, thereby acquiring at an early age a
very cosmopolitan outlook. Admiral Semmes was a great linguist and
Mrs. Wright inherited his gift. She had learned to speak Spanish in
her girlhood, so when she arrived in Manila she had only to renew
her knowledge of the language. General and Mrs. Wright had with
them their daughter Katrina, who was then about fourteen years old,
but their two sons, one a naval officer, did not join them in the
Philippines until later.
General Wright had, on the whole, the most delightful social
qualities of anybody on the Commission. He had a keen sense of
humour and could recount a great number of interesting personal
experiences with a manner and wit which made him, always, a
delightful companion. He was a devotee of pinochle and he
instructed the entire party in the game until it was played from one
end of the ship to the other. He was slow to anger, very deliberate
and kindly in his judgments, and offered at times a decided contrast
to his wife who was a little more hasty and not infrequently founded
judgments on what he would jocosely criticise as “a woman’s
reason.”
Judge Ide was born and bred a Vermonter and had many of the
rugged characteristics of the Green Mountain State, not the least
among which is a certain indefinable, but peculiarly New England
caution. In addition to a large and active law practice in both New
Hampshire and Vermont, he had banking connections through
which he had gained a better knowledge of business and finance than
is possessed by the average lawyer. Moreover, a long term as Chief
Justice of Samoa had given him diplomatic experience and a
knowledge of the Polynesian races which were to serve him well in
his work in the Philippines. As Chief Justice he exercised diplomatic
and consular as well as judicial functions, and his position brought
him in close relations with the English and German officials of the
joint protectorate of the Samoan islands and in constant social
contact with the naval officers of many countries whose ships very

You might also like