Part 2 Making Qubits Work for You
In this part, we will use superposition and entanglement to perform useful tasks. One task is to exchange sensitive information in order to expose any eavesdroppers. Another task is to dismantle qubits and have their exact replicas appear elsewhere. The latter task is used in the low-level design of quantum computers and the implementation of network systems.
This part has the following chapters:
- Chapter 5, A Fanciful Tale about Cryptography
- Chapter 6, Quantum Networking and Teleportation