Electromagnetic theory, semiconductor physics, thermodynamics of computing, quantum mechanics, quantum algorithms, post-quantum cryptography, and quantum hardware — the physical foundations that define the limits and capabilities of every system you build or secure.
Every wireless communication system — from Wi-Fi to 5G to satellite links — operates according to Maxwell's equations, the four fundamental laws governing electric and magnetic fields (Griffiths & Schroeter, 2018). For software engineers, understanding EM theory explains bandwidth limits, signal interference, and side-channel vulnerabilities.
Shannon's theorem (C = B log₂(1 + S/N)) is a direct consequence of electromagnetic signal physics. The physical bandwidth of a channel bounds the maximum achievable data rate. This is why 5G uses higher-frequency millimeter waves — more bandwidth — at the cost of shorter range due to increased path loss.
Free-space path loss follows the inverse-square law: FSPL = (4πdf/c)², where d is distance, f is frequency, and c is the speed of light. Higher frequencies experience greater path loss, which is why 5G millimeter-wave signals require dense cell deployments.
Relevance to cybersecurity:
Every transistor — the building block of CPUs, GPUs, FPGAs, and memory chips — is a quantum mechanical device. Semiconductor physics explains how hardware works at the atomic level and reveals exploitable vulnerabilities (Seabaugh & Zhang, 2010).
| Concept | Explanation | Security Implication |
|---|---|---|
| Band Theory | Electrons occupy energy bands separated by band gaps (~1 eV for Si). Conductors, insulators, and semiconductors differ by gap size. | Basis for all transistor operation |
| Doping & p-n Junctions | Donor/acceptor atoms create n-type/p-type regions. The p-n junction is the basis of diodes and transistors. | Hardware Trojans at transistor level |
| MOSFET Operation | Gate voltage modulates channel conductivity. Gate oxides approaching atomic layers → quantum tunneling leakage. | Moore's Law physical limits |
| Johnson-Nyquist Noise | S_V = 4k_BT·R — thermal noise sets the noise floor for ADCs and RF receivers. | Affects side-channel signal quality |
Power analysis attacks (SPA/DPA): The dynamic power consumption of a CMOS circuit (P = α C V² f) correlates with data being processed. Simple and differential power analysis can extract cryptographic keys from smart cards, HSMs, and embedded devices (Kocher et al., 1999).
Rowhammer attacks: Repeated electrical access to one row of DRAM cells induces bit flips in adjacent rows through capacitive coupling — an exploitable vulnerability arising directly from semiconductor physics.
Photonics — the science of generating, controlling, and detecting light — is increasingly central to computing and networking (Strikis et al., 2025).
| Technology | How It Works | Application |
|---|---|---|
| Optical Fiber | Total internal reflection confines light in glass fiber. ~0.2 dB/km attenuation at 1550 nm. | Global internet backbone, WDM multiplexing |
| Photonic ICs (PICs) | Waveguides, modulators, detectors integrated on silicon chips. | PsiQuantum's photonic quantum computers |
| Optical Interconnects | VCSELs and photodetectors replace copper at ever-shorter distances. | Data center rack-to-rack and chip-to-chip |
| LiDAR | Time-of-flight measurement of laser pulses for 3D mapping. | Autonomous vehicles, GlideCart navigation |
Fiber tapping: Physical layer interception requires bending the fiber to extract evanescent field coupling. Optical time-domain reflectometry (OTDR) can detect unauthorized splices.
Quantum Key Distribution (QKD) uses the quantum properties of photons (polarization states) to distribute cryptographic keys with information-theoretic security (Bennett & Brassard, 1984).
The relationship between information processing and thermodynamics has deep implications for energy efficiency, hardware design, and fundamental computing limits (Landauer, 1961; Bérut et al., 2012).
Rolf Landauer proved that erasing one bit of information must dissipate at least k_BT·ln2 of energy as heat. Modern processors dissipate ~10⁹ times more energy per operation than this fundamental limit — indicating enormous room for efficiency improvement, but also a hard physical floor.
| Implication | Detail |
|---|---|
| Reversible Computing | If operations are thermodynamically reversible (no information erasure), power consumption approaches zero. Motivates adiabatic computing research. |
| Data Center Cooling | Large data centers consume 10–50 MW. Chip thermal management (liquid cooling, phase-change) is grounded in thermodynamics. |
| Quantum Computer Cooling | Superconducting quantum processors operate at ~15 millikelvin — colder than outer space — requiring dilution refrigerators. |
| Entropy & Key Generation | The second law guarantees truly random processes exist, providing the physical basis for hardware random number generators (HRNGs) in cryptographic key generation. |
Von Neumann-Landauer entropy: The minimum thermodynamic entropy decrease associated with a quantum measurement is S = k_B·ln2 per qubit, connecting quantum mechanics and thermodynamics.
Wave-particle duality is one of the most counterintuitive and foundational principles of quantum mechanics. Every quantum entity — electrons, photons, atoms — exhibits both wave-like and particle-like behavior depending on the experimental context (Griffiths & Schroeter, 2018; de Broglie, 1925).
Historical milestones:
Born rule: The quantum state is described by a wave function ψ(x, t). The probability of finding the particle at position x is |ψ(x,t)|² — quantum mechanics is inherently probabilistic (Sakurai & Napolitano, 2017).
Complementarity principle (Bohr): Wave and particle behaviors are complementary. When you measure which slit an electron passed through, the interference pattern disappears.
Superposition is one of the two foundational pillars of quantum computing power (the other being entanglement). In classical computing, a bit is either 0 or 1. In quantum mechanics, a system can exist in a linear combination of multiple states simultaneously (Nielsen & Chuang, 2010).
| Feature | Classical Bit | Qubit |
|---|---|---|
| State | Either 0 or 1 | α|0⟩ + β|1⟩ (both simultaneously) |
| n units | Holds exactly 1 value | Superposition of 2ⁿ values |
| 50 units | One 50-bit number | 2⁵⁰ ≈ 10¹⁵ states simultaneously |
| Measurement | Read without disturbance | Collapses to |0⟩ or |1⟩ (irreversible) |
Interference: Because amplitudes are complex numbers, they can interfere constructively (adding up) or destructively (canceling). Quantum algorithms amplify correct answers and cancel wrong ones through controlled interference.
The Hadamard gate (H) creates superposition: applying H to |0...0⟩ creates an equal superposition of all 2ⁿ computational basis states. This is the gateway to quantum parallelism (Preskill, 1998).
Entanglement is the phenomenon where quantum states of two or more particles become correlated such that the state of each particle cannot be described independently — even when separated by arbitrarily large distances. Einstein called it "spooky action at a distance" (Bell, 1964; Ekert, 1991).
If qubit A is measured as |0⟩, qubit B instantaneously collapses to |0⟩; if A gives |1⟩, B gives |1⟩ — regardless of distance.
Bell's theorem (1964): John Bell proved that if quantum correlations were due to local hidden variables, they would satisfy certain mathematical inequalities (Bell inequalities). Experiments by Aspect (1982), Hensen et al. (2015, loophole-free), and others have repeatedly violated Bell inequalities, confirming that entanglement is genuinely non-local (Bell, 1964).
How entanglement is created:
| Application | Description |
|---|---|
| Quantum Teleportation | Transmit an unknown quantum state via entanglement + classical channel (no FTL information) |
| Quantum Dense Coding | Send 2 classical bits using 1 qubit via pre-shared entanglement |
| Quantum Computing | Multi-qubit entanglement enables quantum parallelism (Shor's exponential speedup) |
| E91 Protocol | Entanglement-based QKD — Bell inequality violation certifies key security (Ekert, 1991) |
With 300 entangled qubits, the system inhabits a Hilbert space with 2³⁰⁰ dimensions — vastly exceeding the number of atoms in the observable universe (Nielsen & Chuang, 2010).
Quantum tunneling is the phenomenon by which a particle penetrates and passes through a potential energy barrier that it would classically be forbidden to cross. It arises from the wave nature of particles (Seabaugh & Zhang, 2010).
Key observations: Tunneling probability decreases exponentially with barrier width L, increases for lighter particles, and decreases with the barrier height above the particle's energy.
| Application | Mechanism | Impact |
|---|---|---|
| Flash Memory | Fowler-Nordheim tunneling through thin gate oxide traps charge on floating gate | How flash drives write/erase data |
| Tunnel Diodes | Heavily doped p-n junctions exploit tunneling for ultra-fast switching | High-frequency oscillators |
| STM Microscope | Tunneling current varies exponentially with tip-surface distance | Atomic-resolution imaging |
| MOSFET Leakage | Gate oxides below ~2 nm → direct tunneling becomes dominant leakage | Limits transistor scaling |
| Josephson Junctions | Cooper pairs tunnel through thin insulator between superconductors | Basis of IBM/Google quantum processors |
| D-Wave Annealing | Quantum tunneling escapes local minima in optimization landscapes | Optimization faster than classical annealing |
Paul Dirac introduced bra-ket notation in 1939 as a compact mathematical language for quantum mechanics. It is now universally used in quantum computing (Nielsen & Chuang, 2010; Sakurai & Napolitano, 2017).
| Notation | Name | Meaning |
|---|---|---|
| |ψ⟩ | Ket | State vector in Hilbert space. |0⟩ = [1,0]ᵀ, |1⟩ = [0,1]ᵀ |
| ⟨ψ| | Bra | Conjugate transpose of ket. ⟨0| = [1,0], ⟨1| = [0,1] |
| ⟨φ|ψ⟩ | Inner product | Complex number. ⟨0|0⟩ = 1 (normalized), ⟨0|1⟩ = 0 (orthogonal) |
| |ψ⟩⟨φ| | Outer product | Matrix/operator. |ψ⟩⟨ψ| is a projector onto |ψ⟩ |
| ⟨ψ|Ô|ψ⟩ | Expectation value | Average measurement outcome for observable Ô in state |ψ⟩ |
Physical qubit implementations:
Multi-qubit states: Two qubits span a 4-dimensional Hilbert space: |ψ⟩ = a₀₀|00⟩ + a₀₁|01⟩ + a₁₀|10⟩ + a₁₁|11⟩. In general, n qubits require 2ⁿ complex numbers — the source of quantum computational power.
Density matrices: A mixed state (statistical ensemble due to decoherence) is described by ρ = Σᵢ pᵢ |ψᵢ⟩⟨ψᵢ| where pᵢ are classical probabilities with Σpᵢ = 1.
The Bloch sphere is a geometric representation of the state space of a single qubit. It maps every pure qubit state to a unique point on the surface of a unit sphere, providing intuitive visualization of quantum operations (Nielsen & Chuang, 2010).
| Point | Angles | State |
|---|---|---|
| North pole (+Z) | θ = 0 | |0⟩ |
| South pole (−Z) | θ = π | |1⟩ |
| +X axis | θ = π/2, φ = 0 | (|0⟩+|1⟩)/√2 = |+⟩ |
| −X axis | θ = π/2, φ = π | (|0⟩−|1⟩)/√2 = |−⟩ |
| +Y axis | θ = π/2, φ = π/2 | (|0⟩+i|1⟩)/√2 |
| −Y axis | θ = π/2, φ = 3π/2 | (|0⟩−i|1⟩)/√2 |
Mixed states (caused by decoherence) are points inside the sphere (Bloch vector length < 1). The center represents the maximally mixed state ρ = I/2.
Limitation: The Bloch sphere represents single-qubit states only. Entangled multi-qubit states require higher-dimensional Hilbert spaces that cannot be visualized on a single sphere (Preskill, 1998).
Quantum gates are reversible transformations on qubit states, represented by unitary matrices (U†U = I). All quantum gates preserve total probability and are reversible — a fundamental difference from classical gates like AND/OR (Nielsen & Chuang, 2010).
Single-Qubit Gates:
Multi-Qubit Gates:
Universality: A gate set is universal if any n-qubit unitary can be approximated to arbitrary precision. Universal sets include: {H, CNOT, T}, {Toffoli, H}, and {CNOT, all single-qubit unitaries} (Di Vincenzo, 1995).
Quantum algorithms exploit superposition, interference, and entanglement to solve specific problems exponentially or polynomially faster than the best known classical algorithms (Shor, 1994; Grover, 1996; Farhi et al., 2014).
Shor's Algorithm (1994) — Integer Factorization
Security impact: A fault-tolerant quantum computer running Shor's would break RSA, Diffie-Hellman, and ECC. Estimates: ~20 million physical qubits needed to break RSA-2048 in 8 hours. This motivates the urgent PQC transition (NIST, 2024a).
Grover's Algorithm (1996) — Unstructured Search
Security impact: Grover's effectively halves symmetric key security. AES-128 → only 64-bit quantum security. AES-256 → 128-bit quantum security (considered quantum-safe) (Grover, 1996).
QAOA — Quantum Approximate Optimization (Farhi et al., 2014)
| Step | Description |
|---|---|
| 1. Encode | Map optimization problem to cost Hamiltonian H_C (ground state = optimal solution) |
| 2. Apply layers | p alternating layers of cost unitary e^(−iγH_C) and mixing unitary e^(−iβH_B) |
| 3. Measure & optimize | Measure ⟨H_C⟩, classically optimize γ and β via gradient descent |
| 4. Extract | Repeat until convergence; measure to extract approximate solution |
GlideCart relevance: QAOA is directly applicable to Vehicle Routing Problem (VRP) and Traveling Salesman Problem (TSP) — optimal delivery paths for an autonomous cart. Encodable as QUBO. IBM Quantum demonstrated convergence in ~25 iterations (Farhi et al., 2014).
VQE — Variational Quantum Eigensolver (Peruzzo et al., 2014)
A hybrid quantum-classical algorithm that finds ground state energy of quantum systems. Choose ansatz U(θ), prepare |ψ(θ)⟩ on quantum hardware, measure E(θ) = ⟨ψ(θ)|H|ψ(θ)⟩, and classically optimize θ. By the variational principle, E(θ) ≥ E₀, so minimization converges toward the ground state. Applications: drug discovery, materials science, battery design (Peruzzo et al., 2014).
Quantum information is extraordinarily fragile. Unlike classical bits, qubits suffer from bit-flip errors (X), phase-flip errors (Z), and decoherence. The no-cloning theorem prevents redundant copying, so quantum error correction must encode logical qubits into larger entangled states (Steane, 1996; Calderbank & Shor, 1996).
Repetition Code (Bit-Flip Protection)
Steane [[7,1,3]] Code (1996)
| Property | Detail |
|---|---|
| Encoding | 1 logical qubit in 7 physical qubits |
| Error correction | Corrects any single-qubit error (both bit-flip and phase-flip) |
| Distance | 3 — corrects up to 1 error, detects up to 2 |
| Based on | Classical [7,4,3] Hamming code (CSS construction) |
| Implementation | 9 CNOT + 4 Hadamard gates; demonstrated on trapped-ion and superconducting platforms (Steane, 1996) |
Surface Codes — The Leading Approach
Surface codes are favored by Google, IBM, and Microsoft for large-scale fault-tolerant quantum computing. Physical qubits are arranged on a 2D grid; a distance-d surface code encodes 1 logical qubit in ~d² physical qubits and corrects up to ⌊(d−1)/2⌋ errors (Acharya et al., 2024).
Google Willow (2024) breakthrough: Distance-7 code on 101 qubits achieved 0.143% ± 0.003% logical error per cycle. Logical error rate suppressed by factor Λ = 2.14 ± 0.02 when code distance increased by 2. First convincing demonstration of below-threshold operation (Acharya et al., 2024).
| Code Type | Threshold | Notes |
|---|---|---|
| Surface code | ~0.5–1% per gate | Most hardware-compatible |
| Concatenated codes | ~10⁻³–10⁻⁴ | Theoretical; harder experimentally |
| Color codes | ~0.1–0.2% | Advantages for transversal gates |
Quantum cryptography uses the laws of physics — rather than computational hardness assumptions — to achieve provably secure communication (Bennett & Brassard, 1984).
BB84 Protocol (Bennett & Brassard, 1984)
QKD landscape:
| Protocol | Year | Type | Key Feature |
|---|---|---|---|
| BB84 | 1984 | Prepare-and-measure | Polarization states (Bennett & Brassard, 1984) |
| B92 | 1992 | Prepare-and-measure | Only 2 non-orthogonal states |
| E91 (Ekert) | 1991 | Entanglement-based | Bell inequality violation certifies security (Ekert, 1991) |
| SARG04 | 2004 | Prepare-and-measure | Improved vs. photon-number-splitting attacks |
| CV-QKD | 2000s | Continuous variable | Gaussian states, standard detectors |
NIST Post-Quantum Cryptography Standards (August 2024)
| Standard | Algorithm | Type | Mathematical Basis |
|---|---|---|---|
| FIPS 203 | ML-KEM (Kyber) | Key encapsulation | Module lattice (Learning With Errors) |
| FIPS 204 | ML-DSA (Dilithium) | Digital signature | Module lattice |
| FIPS 205 | SLH-DSA (SPHINCS+) | Digital signature | Stateless hash-based |
Lattice problems (Learning With Errors, Shortest Vector Problem) are believed hard for both classical and quantum computers — no known quantum speedup. NIST IR 8547 mandates federal migration to PQC by 2025–2026, with full migration by 2035 (NIST, 2024d).
"Harvest Now, Decrypt Later" (HNDL): Adversaries store encrypted data today to decrypt once quantum computers arrive. This makes immediate PQC migration critical — even though large-scale quantum computers are years away.
Decoherence is the process by which a quantum system loses its coherent quantum properties through unintended interactions with its environment. It is the primary obstacle to building useful quantum computers (Abanin et al., 2019).
| Parameter | Symbol | Definition | Typical Values |
|---|---|---|---|
| Relaxation time | T₁ | Time for excited → ground state decay | Superconducting: 10–500 μs; Ions: ~100 s |
| Dephasing time | T₂ | Time for phase coherence decay | T₂ ≤ 2T₁ |
| Gate time | t_gate | Time to perform one quantum gate | SC: ~10–100 ns; Ions: ~1–100 μs |
| Coherence ratio | T₂/t_gate | Gates possible before decoherence | Need >10,000 for fault tolerance |
Standard Noise Models
| Model | Formula | Physical Meaning |
|---|---|---|
| Depolarizing | ε(ρ) = (1−p)ρ + p·I/2 | With probability p, qubit replaced by completely mixed state |
| Amplitude damping | |1⟩ decays to |0⟩ | Models T₁ relaxation (spontaneous emission) |
| Dephasing | Off-diagonals of ρ decay | Models T₂ dephasing without energy loss |
| Pauli channel | Random {I, X, Y, Z} errors | Standard model for surface code threshold calculations |
Magic state distillation: Universal fault-tolerant quantum computation requires high-quality T gates (non-Clifford). These cannot be implemented transversally in most codes, requiring distillation of high-fidelity T states from many noisy ones. QuEra and Harvard demonstrated the first logical-level magic state distillation in 2025 — a key milestone (Bluvstein et al., 2024).
Four major physical platforms compete for quantum advantage, each with distinct trade-offs (Duan & Monroe, 2010; Acharya et al., 2024; Strikis et al., 2025; Bluvstein et al., 2024).
Platform Comparison
| Property | Trapped Ion (IonQ) | Superconducting (IBM/Google) | Photonic (PsiQuantum) | Neutral Atom (QuEra) |
|---|---|---|---|---|
| Coherence | Excellent (s–min) | Good (μs–ms) | Excellent | Excellent (s) |
| Gate Speed | Slow (μs) | Fast (ns) | Moderate | Moderate (μs) |
| Fidelity | Highest (99.99%) | High (99.5–99.9%) | Moderate | High (99.5%+) |
| Scalability | Modular | CMOS-compatible | CMOS-compatible | Tweezer arrays |
| Temperature | Room + trap | 15 mK (cryo) | Room temp | Near room temp |
| Connectivity | All-to-all | Limited grid | Flexible | Reconfigurable |
Key Milestones (2024–2025):
Research contacts and full APA 7 references are available to authorized investors and research partners.
Request Investor Access