Preprint
Article

This version is not peer-reviewed.

STEH Trade-Off Theorem: Hard Physical Limits for Space, Time, Energy, and Entropy in Computation

Submitted:

01 September 2025

Posted:

02 September 2025

You are already at the latest version

Abstract
We introduce a unified physical framework for algorithmic tradeoffs based on Space (S), Time (T), Energy (E), and Entropy (H) --- abbreviated as STEH. This framework integrates classical and quantum perspectives, and yields rigorous lower bounds on computational processes by linking memory, runtime, thermodynamic cost, and uncertainty. We derive a set of inequalities governing the achievable resource combinations and illustrate how they sharpen classical results such as Landauer's principle and quantum speed limits. The STEH tradeoff formalism provides a systematic approach to study computation as a constrained physical process, highlighting resource complementarity and impossibility results that shape the limits of algorithms.
Keywords: 
;  ;  ;  ;  ;  ;  ;  

1. Introduction

Computation is a physical process. Three mature pillars constrain its cost: (i) Landauer’s principle lower-bounds dissipated heat for logically irreversible steps; (ii) quantum speed limits (QSL) lower-bound the time to traverse distinguishable quantum states given available energy; and (iii) the Bekenstein bound upper-bounds information capacity for finite-energy systems in bounded regions. We show how to combine these, with no additional heuristic approximations, into two explicit inequalities that jointly forbid the simultaneous minimization of space, time, exported entropy, and energy for nontrivial computations.
A central contribution is the introduction of three well-defined complexity parameters for a function f : { 0 , 1 } n { 0 , 1 } m at target error ε : (1) the reversible working-set  W * ( f , ε ) , (2) the forced erasures under S space  G * ( f , S , ε ) , and (3) the orthogonalization depth  D * ( f , ε ) . We formalize these in Section 2, relate them to classical/quantum complexity notions, and prove the lemmas needed to derive the main result.

Physical regime and simultaneous applicability

Our derivations hold for devices satisfying:
(R1)
Thermal bath: Coupling to an environment at temperature T (near equilibrium) so that Landauer applies to logically irreversible operations [1,5,6,7].
(R2)
Quantum dynamics: The device evolution over runtime τ can be modeled by a (possibly open-system) CPTP map with well-defined average energy above ground E tot ; we use QSLs valid for closed or Markovian/non-Markovian dynamics [8,9,10,11,12].
(R3)
Bounded geometry and weak gravity: Degrees of freedom are essentially confined to a ball of radius R, with total energy well below the gravitational-collapse threshold ( R 2 G E tot / c 4 ), so Bekenstein’s bound controls information capacity [13,14,15].
These conditions are commonly met in laboratory and technological settings; therefore the three primitive bounds are consistent and simultaneously applicable.

2. Definitions of the Complexity Parameters

Let f : { 0 , 1 } n { 0 , 1 } m and target worst-case error ε [ 0 , 1 / 2 ) . Computations are implemented by families of physical processes indexed by input x { 0 , 1 } n acting on a working medium; mathematically, by CPTP maps E t over t [ 0 , τ ] whose induced input-output relation approximates f.
Definition 1
(Reversible working-set W * ( f , ε ) ). Consider all logically reversible implementations of f with error ε , i.e., injective encodings x ( x , a 0 ) ( x , a T ) and a final clean-up that restores ancillae while outputting f ( x ) (Bennett’s method). For each such implementation, let S max be the peak number of information-bearing bits (IBBs) that are simultaneously logically live (i.e., their value is needed by some future reversible step). Then
W * ( f , ε ) = inf reversible implementations of f S max .
Remarks. 
This is the reversible pebbling number of a computation DAG for f [3,20,21]. It is finite for all computable f; constructive reversible simulations ensure existence.
Definition 2
(Forced erasures under space S: G * ( f , S , ε ) ). Fix a space budget S (IBBs). Over all (reversible or irreversible) implementations of f with error ε that never exceed S live IBBs, let G be the total number of logically irreversible bit erasures performed. Then
G * ( f , S , ε ) = inf implementations within space S G .
Definition 3
(Orthogonalization depth D * ( f , ε ) ). Let ρ t ( x ) be the device state (possibly mixed) at time t given input x. For a pair of inputs x , y with f ( x ) f ( y ) , define the Bures angle (quantum Fubini–Study distance for mixed states)
Θ ( ρ , σ ) = arccos F ( ρ , σ ) [ 0 , π / 2 ] ,
where F is the Uhlmann fidelity. Let L ( x , y ) be the minimal geodesic length (in Bures angle) a valid implementation must traverse between ρ 0 ( x ) and some ρ τ ( x ) that produces an ε-accurate output and likewise for y. Then define
D * ( f , ε ) = sup x , y : f ( x ) f ( y ) L ( x , y ) π / 2 .
Remarks. 
Θ = π / 2 corresponds to orthogonality; thus D * counts, in units of “orthogonalization-length,” how many decisively distinguishable transitions are unavoidably required for worst-case inputs. In circuit models, D * lower-bounds depth; in decision trees, D * lower-bounds the number of decisive queries; in quantum models, D * relates to adversary/Hybrid-argument lower bounds [22,23]. Well-definedness follows since L is finite for CPTP paths and the supremum is over a finite domain.

Relationships and computability (high level)

  • W * equals (up to constant factors) the reversible pebbling number of a suitable computation DAG for f; lower bounds are known for FFT, GEMM, sorting, Krylov, etc. [16,17,18,19].
  • G * ( f , S , ε ) [ W * ( f , ε ) S ] + (Lemma 1).
  • D * ( f , ε ) classical decision-tree depth for f; for quantum, D * is lower-bounded by adversary methods [22].

3. Key Lemmas

Lemma 1
(Space-deficit forces erasure). For any f and ε, and space budget S, one has
G * ( f , S , ε ) [ W * ( f , ε ) S ] + .
Proof. 
Consider a reversible implementation achieving W * . If S W * , history can be retained and uncomputed with G = 0 . If S < W * , at some peak step at least W * S logically live bits must be discarded to remain within budget S. Any such discard is a logically irreversible many-to-one map on IBBs, contributing at least one bit erasure. Taking the infimum over all implementations yields the bound. This is the standard reversible pebbling trade-off [3,20,21]. □
Lemma 2
(Landauer dissipation). At temperature T, any logically irreversible bit erasure exports at least k B T ln 2 heat to the environment. Therefore,
Q k B T ln 2 G * ( f , S , ε ) .
Lemma 3
(Quantum speed limit as step-count bound). Let E tot be the average available energy above ground over runtime τ. For any implementation of f with worst-case orthogonalization-depth D * ( f , ε ) ,
τ π 2 D * ( f , ε ) E tot .
Proof. 
For closed systems, concatenate D * minimal orthogonalizations; each requires time at least π / ( 2 E ) by Margolus–Levitin; additivity yields the bound. For open systems, use mixed-state QSLs (e.g., Deffner–Lutz; Taddei et al.; del Campo et al.) on the Bures angle, noting that orthogonalization corresponds to angle π / 2 ; summing D * segments gives the same scaling (constants may vary but only by universal factors) [10,11,12]. □
Lemma 4
(Bekenstein information-capacity). For degrees of freedom essentially confined in radius R with total energy E tot ,
S 2 π E tot R c ln 2 .
Equivalently,
E tot c ln 2 2 π R S .

4. Deriving the Combined STEH Inequalities

We now show the algebraic steps explicitly.

Step 1: Eliminate E tot from the QSL

Start from Lemma 3:
τ π 2 D * ( f , ε ) E tot .
Apply Lemma 4 (lower bound on E tot given S and R):
E tot c ln 2 2 π R S .
Substitute (2) into (1):
τ π 2 D * ( f , ε ) / c ln 2 2 π R S = π 2 D * ( f , ε ) · 2 π R c ln 2 · 1 S = π 2 c ln 2 R D * ( f , ε ) S .

Step 2: Product bound for τ Q

From Lemma 2,
Q k B T ln 2 G * ( f , S , ε ) .
Multiply (3) and (4):
τ Q π 2 c ln 2 R D * S · k B T ln 2 G * = π 2 k B T c R D * ( f , ε ) G * ( f , S , ε ) S .
This completes the explicit derivation of the two combined STEH inequalities. □

5. Examples and Sanity Checks

AND of n bits.

Reversible working set W * n ; orthogonalization depth D * n . For S < n , G * n S (Lemma 1) hence Q k B T ln 2 ( n S ) and τ π 2 c ln 2 R n S .

GEMM ( n × n ).

Known I/O lower bounds imply W * Θ ( n 2 ) live tiles; the arithmetic workload gives D * Θ ( n 3 ) decisive updates [16,17,18,19]. Therefore τ π 2 c ln 2 R n 3 S , matching communication-optimal scaling (up to constants and logs).

FFT (N).

W * Θ ( N ) and D * Θ ( N log N ) by circuit-depth arguments; thus τ π 2 c ln 2 R N log N S .

6. Assumptions, Scope, and Limitations

Simultaneous applicability. Conditions (R1)–(R3) delineate when Landauer, QSL, and Bekenstein can be applied together: (i) near-equilibrium thermalization for irreversible steps; (ii) CPTP dynamics with well-defined average energy; (iii) weak gravity and effective confinement within radius R. These cover standard digital/quantum platforms (CMOS, superconducting/ion, nanomechanical).
Model idealizations. The constants in QSLs vary among formulations (Margolus–Levitin vs. Mandelstam–Tamm vs. mixed-state extensions); our constants are chosen conservatively, and any version yields the same scaling and the same algebraic combination. Bekenstein’s bound has modern reformulations via relative entropy; any such form provides an E tot S trade-off suitable for our derivation [15]. Landauer has repeated experimental support [6,7].
What is not claimed. We do not claim tightness of constants for specific hardware, nor do we assume a specific gate library. The theorem is agnostic to architecture and applies to any implementation achieving the input-output relation.

7. Conclusions

We provided precise definitions for the complexity parameters W * , G * , D * , proved the lemmas linking them to Landauer, QSL, and Bekenstein, and derived combined STEH inequalities (3)–(5) step-by-step. The result formalizes the impossibility of driving all of (space, time, exported entropy, energy) to zero in nontrivial computation, and it recovers communication lower bounds for fundamental tasks. The STEH framework offers a quantitative checklist for evaluating algorithms against absolute physical limits.

Author Contributions

Sole author: conceptualization, formal analysis, methodology, and writing.

Funding

No external funding was received for this work.

Data Availability Statement

No new data were generated or analyzed in this study.

AI Assistance Statement

Language and editorial suggestions were supported by AI tools; the author takes full responsibility for the content.

Acknowledgments

The author thanks the Octonion Group research team for valuable discussions and computational resources. Special recognition goes to the broader computational complexity and quantum computing communities whose foundational work made this synthesis possible.

Conflicts of Interest

The author declares no conflicts of interest.

References

  1. R. Landauer, “Irreversibility and heat generation in the computing process,” IBM J. Res. Dev. 5, 183–191 (1961). [CrossRef]
  2. C. H. Bennett, “Logical reversibility of computation,” IBM J. Res. Dev. 17, 525–532 (1973). [CrossRef]
  3. C. H. Bennett, “Time/space trade-offs for reversible computation,” SIAM J. Comput. 18(4), 766–776 (1989). [CrossRef]
  4. Lecerf, Y. Machines de Turing réversibles. Récursivité et complexité. Comptes Rendus 1963, 257, 2597–2600. [Google Scholar]
  5. C. H. Bennett, “Notes on Landauer’s principle, reversible computation, and Maxwell’s Demon,” Stud. Hist. Phil. Mod. Phys. 34, 501–510 (2003). [CrossRef]
  6. A. Bérut et al., “Experimental verification of Landauer’s principle linking information and thermodynamics,” Nature 483, 187–189 (2012). [CrossRef]
  7. Y. Jun, M. Y. Jun, M. Gavrilov, and J. Bechhoefer, “High-precision test of Landauer’s principle in a feedback trap,” Phys. Rev. Lett. 113, 190601 (2014). [CrossRef]
  8. L. Mandelstam and I. Tamm, “The uncertainty relation between energy and time in nonrelativistic quantum mechanics,” J. Phys. (USSR) 9, 249 (1945).
  9. N. Margolus and L. B. Levitin, “The maximum speed of dynamical evolution,” Physica D 120, 188–195 (1998). [CrossRef]
  10. S. Deffner and E. Lutz, “Quantum speed limit for non-Markovian dynamics,” Phys. Rev. Lett. 111, 010402 (2013). [CrossRef]
  11. M. M. Taddei, B. M. Escher, L. Davidovich, and R. L. de Matos Filho, “Quantum speed limit for physical processes,” Phys. Rev. Lett. 110, 050402 (2013). [CrossRef]
  12. A. del Campo, I. L. Egusquiza, M. B. Plenio, and S. F. Huelga, “Quantum speed limits in open system dynamics,” Phys. Rev. Lett. 110, 050403 (2013). [CrossRef]
  13. J. D. Bekenstein, “Universal upper bound on the entropy-to-energy ratio for bounded systems,” Phys. Rev. D 23, 287–298 (1981). [CrossRef]
  14. R. Bousso, “The holographic principle,” Rev. Mod. Phys. 74, 825–874 (2002). [CrossRef]
  15. H. Casini, “Relative entropy and the Bekenstein bound,” Class. Quantum Grav. 25, 205021 (2008). [CrossRef]
  16. J. W. Hong and H. T. Kung, “I/O complexity: The red-blue pebble game,” in Proc. STOC (1981). [CrossRef]
  17. G. Ballard, J. Demmel, O. Holtz, and O. Schwartz, “Communication-optimal parallel and sequential Cholesky, LU, and QR factorizations,” SIAM J. Sci. Comput. 34(1), A206–A239 (2012). [CrossRef]
  18. D. Irony, S. Toledo, and A. Tiskin, “Communication lower bounds for distributed-memory matrix multiplication,” J. Parallel Distrib. Comput. 64(9), 1017–1026 (2004). [CrossRef]
  19. J. Demmel, L. Grigori, M. Hoemmen, and J. Langou, “Communication-avoiding Krylov subspace methods,” SIAM Rev. 55(1), 30–69 (2013). [CrossRef]
  20. H. Buhrman, P. Tromp, and P. Vitányi, “Time and space bounds for reversible simulation,” J. Comput. Syst. Sci. 63, 204–221 (2001). [CrossRef]
  21. K.-J. Lange, P. McKenzie, and A. Tapp, “Reversible space equals deterministic space,” J. Comput. Syst. Sci. 60(2), 354–367 (2000). [CrossRef]
  22. A. Ambainis, “Quantum lower bounds by quantum arguments,” J. Comput. Syst. Sci. 64(4), 750–767 (2002). [CrossRef]
  23. M. A. Nielsen and I. L. Chuang, Quantum Computation and Quantum Information, 10th Anniversary Ed., Cambridge Univ. Press (2010).
  24. S. Lloyd, “Ultimate physical limits to computation,” Nature 406, 1047–1054 (2000). [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

Disclaimer

Terms of Use

Privacy Policy

Privacy Settings

© 2026 MDPI (Basel, Switzerland) unless otherwise stated