The No-Cloning Theorem —
You Can't Copy a Qubit
It is impossible to perfectly copy an unknown quantum state — not because hardware is imperfect, but because mathematics forbids it. Now that you've built circuits and manipulated qubits, you'll feel exactly why every strategy fails. And once you do, you'll see why this impossibility is the foundation of quantum cryptography.
The Impossible Copy
You want to copy qubit $|\psi\rangle = \alpha|0\rangle + \beta|1\rangle$ to a blank qubit in $|0\rangle$. You apply CNOT with $|\psi\rangle$ as control and $|0\rangle$ as target. Does this produce two independent copies — both in state $|\psi\rangle$?
In classical computing, copying information is trivial. A file can be duplicated in milliseconds. A bit can be copied with one transistor. Classical information obeys no law against duplication.
Quantum information is different. There is a theorem — proved by Wootters and Zurek, and independently by Dieks, in 1982 — that states: it is impossible to create a perfect copy of an arbitrary unknown quantum state. Not approximately impossible. Not impossible with today's hardware. Provably, mathematically impossible, for any physical device that obeys quantum mechanics.
This is the No-Cloning Theorem. It is one of the most important results in quantum information — and you now have every tool you need to understand exactly why it is true.
Why You Feel This Already
Before the formal proof, consider what you already know from earlier lessons. Each piece of your knowledge points in the same direction.
From L22 (the Bell pair): When you apply CNOT with a superposed control to $|0\rangle$, you get an entangled state — not two independent copies. The Bell state $(|00\rangle + |11\rangle)/\sqrt{2}$ cannot be written as $|\psi\rangle \otimes |\psi\rangle$ for any single-qubit state $|\psi\rangle$.
Both together are the no-cloning theorem. Measurement destroys the state. Entanglement creates correlation, not duplication. There is no third path that threads between "destroy it" and "correlate it" to produce two genuine independent copies.
The informal reasoning is this: a quantum state $\alpha|0\rangle + \beta|1\rangle$ encodes more information than a classical bit — it contains complex amplitudes $\alpha$ and $\beta$ that a single measurement cannot reveal. To copy the state, you would need to first learn $\alpha$ and $\beta$. But learning them requires measuring the qubit many times — and each measurement collapses the original. By the time you know enough to recreate the state, the original has been destroyed many times over.
Three Strategies That Fail — and Exactly Why
Here are the three most natural attempts at copying a qubit $|\psi\rangle = \alpha|0\rangle + \beta|1\rangle$ to a blank qubit $|0\rangle$ — and where each one breaks.
Why it fails: Measurement collapses the original. If $|\psi\rangle = \frac{1}{\sqrt{2}}(|0\rangle + |1\rangle)$ and you measure and get 0, the original is now $|0\rangle$ — not $(|0\rangle + |1\rangle)/\sqrt{2}$. You copied the classical outcome, not the quantum state. The superposition is gone permanently.
$\text{CNOT}\bigl[(\alpha|0\rangle + \beta|1\rangle)|0\rangle\bigr] = \alpha|00\rangle + \beta|11\rangle$
Why it fails: Two perfect copies would give $|\psi\rangle \otimes |\psi\rangle = \alpha^2|00\rangle + \alpha\beta|01\rangle + \beta\alpha|10\rangle + \beta^2|11\rangle$. The CNOT output is missing $|01\rangle$ and $|10\rangle$ entirely. The result $\alpha|00\rangle + \beta|11\rangle$ is the Bell state (when $\alpha = \beta = 1/\sqrt{2}$) — it is the L22 entanglement circuit. Entanglement, not duplication.
$U|\psi\rangle|0\rangle = \frac{1}{\sqrt{2}}(U|00\rangle + U|10\rangle) = \frac{1}{\sqrt{2}}(|00\rangle + |11\rangle)$
But two perfect copies require: $|\psi\rangle|\psi\rangle = \frac{1}{2}(|00\rangle + |01\rangle + |10\rangle + |11\rangle)$.
These are different states. Linearity forces the entangled result. No unitary $U$ can satisfy both "works for basis states" and "works for all superpositions."
The Proof — Short, Elegant, Final
The formal no-cloning proof is one of the shortest in quantum information theory. It requires only the linearity of quantum mechanics and the definition of what "copying" means. No advanced mathematics. No complex analysis. Just logic applied to what you already know.
This proof generalises immediately to any superposition $\alpha|0\rangle + \beta|1\rangle$ with $\alpha \neq 0$ and $\beta \neq 0$. No quantum gate, no quantum circuit, no physical device consistent with quantum mechanics can clone an unknown qubit.
Clone Attempt Lab
Pick a state to clone and a method to try. The lab shows exactly what each approach produces — and why it is not a perfect copy. Try every combination. The key experiment: apply every method to $|{+}\rangle$ and see no-cloning made concrete.
The key pattern across all experiments: basis states ($|0\rangle$, $|1\rangle$) can be copied trivially by several methods — but that is because they are already classical. Superpositions ($|{+}\rangle$, $|{-}\rangle$, $\alpha|0\rangle+\beta|1\rangle$) fail with every strategy. No-cloning is specifically a statement about unknown quantum states — classical information is copyable; quantum superposition is not.
Why This Is Good News — The Cryptography Connection
No-cloning sounds like a restriction. It is. But restrictions in physics have often turned out to be foundations of technology. The speed of light cannot be exceeded — and that gives us the causal structure of the universe. Energy cannot be created from nothing — and that gives us thermodynamics. Quantum states cannot be cloned — and that gives us provably secure cryptography.
Why no-cloning defeats eavesdroppers
In classical cryptography, an eavesdropper can intercept a message, copy every bit, and forward the original — completely silently, leaving no trace. This is why classical security relies on computational hardness: problems that are believed to be difficult, but not provably impossible to break.
Option 1 — Measure and forward: Eve measures the qubits to learn their values, then sends replacement qubits to the receiver. But measurement collapses the original superpositions. The replacements are in the wrong basis half the time. The receiver (Bob) and Alice compare a sample of their data — the error rate is elevated above the expected level for a noise-free channel. They detect the eavesdropper.
Option 2 — Clone and forward: Eve tries to keep a copy and forward the original. No-cloning forbids this — any copy attempt disturbs the original, again producing detectable errors.
There is no Option 3. The no-cloning theorem closes all gaps. The security is not computational ("hard to break") — it is physical ("breaking it violates quantum mechanics"). Provably secure, not probably secure.
No-cloning and quantum error correction
Classical error correction works by making redundant copies of a bit and using majority voting to detect and fix errors. No-cloning prevents the direct quantum analogue. Quantum error correction therefore uses a different approach: it spreads a single qubit's information across multiple entangled qubits in a way that allows errors to be detected and corrected without ever measuring the encoded state directly. This is more subtle, more powerful, and it is made necessary by no-cloning.
What You Now Know About No-Cloning
- No quantum circuit can perfectly copy an unknown quantum stateThis is a mathematical theorem, not a hardware limitation. Every approach — measuring first, using CNOT, designing a custom unitary — fails on superpositions. The theorem was proved in 1982 by Wootters & Zurek and independently by Dieks. It cannot be circumvented by more clever engineering.
- The proof uses only linearity — and takes three stepsAssume $U|\psi\rangle|0\rangle = |\psi\rangle|\psi\rangle$ for all $|\psi\rangle$. Apply $U$ to $|0\rangle$ and $|1\rangle$ correctly. Now apply linearity to $(|0\rangle+|1\rangle)/\sqrt{2}$: you get $(|00\rangle+|11\rangle)/\sqrt{2}$ (Bell state), not $(|0\rangle+|1\rangle)^{\otimes2}/2$ (two copies). These differ. Contradiction. $\blacksquare$
- CNOT creates entanglement, not duplicationCNOT maps $(\alpha|0\rangle+\beta|1\rangle)|0\rangle \to \alpha|00\rangle+\beta|11\rangle$. A perfect copy would be $|\psi\rangle\otimes|\psi\rangle = \alpha^2|00\rangle+\alpha\beta|01\rangle+\alpha\beta|10\rangle+\beta^2|11\rangle$. The $|01\rangle$ and $|10\rangle$ cross-terms are missing. This is why the L22 Bell pair circuit creates entanglement — it is mathematically impossible for it to create a copy.
- No-cloning is the foundation of quantum cryptographyAn eavesdropper on a quantum channel cannot copy quantum states without disturbing them. Measurement collapses superpositions; any replacement qubits show elevated error rates detectable by the legitimate parties. BB84 quantum key distribution is provably secure — not "computationally hard to break" but "physically impossible to break without detection" — because of no-cloning.
- The "impossibility" is a feature, not a bugNo-cloning shapes the entire landscape of quantum information: it forces quantum error correction to use entanglement instead of redundancy, makes quantum teleportation possible (teleport without clone), and gives quantum cryptography unconditional security. Understanding why something is impossible is often more powerful than knowing what is possible.
You have built circuits, measured results, and proved
that quantum states cannot be copied.
Now: bring it all together.
Section 4 synthesis — everything connected in one lesson.
- Wootters, W. K. & Zurek, W. H. (1982). "A single quantum cannot be cloned." Nature, 299, 802–803 — the original one-page proof. Proves the theorem using only linearity and inner product structure.
- Dieks, D. (1982). "Communication by EPR devices." Physics Letters A, 92, 271–272 — independent simultaneous proof, published the same month.
- Nielsen, M. A. & Chuang, I. L. — Quantum Computation and Quantum Information, Cambridge, 2000. §12.1 "The no-cloning theorem" — standard graduate treatment with multiple proof variants and generalisations.
- Bennett, C. H. & Brassard, G. (1984). "Quantum cryptography: Public key distribution and coin tossing." Proc. IEEE ICASSP — the BB84 protocol. No-cloning is explicitly the security foundation.