Implementation of Shor's Algorithm and Its Demonstrated Quantum Efficiency

Authors

  • Chenxuan Wang The Experimental High School Attached to Beijing Normal University

DOI:

https://doi.org/10.47611/jsrhs.v13i1.6348

Keywords:

RSA algorithm, Shor's algorithm

Abstract

The unique principles of quantum physics introduce an element of uncertainty into our previously deterministic world. Quantum computing, derived from quantum physics, enables the representation of a qubit in both |0> and |1> states, thus encoding more information and unleashing a realm of new possibilities. This paper conducts an analysis of the classical RSA encryption protocol and its vulnerability to the quantum algorithm—Shor's algorithm. Furthermore, this paper rigorously establishes the mathematical theories required for the analysis. Finally, the algorithm is thoroughly explored, and the potential efficiencies of quantum computing are discussed. As the study of quantum computing deepens, its application is poised to surpass that of traditional computers in various fields, leaving a profound impact.

Downloads

Download data is not yet available.

References or Bibliography

Peter W. Shor. Polynomial time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J.Sci.Statist.Comput. 26 (1997).

Charles H.Bennett, Gilles Brassard. Quantum Cryptography: Public Key Distribution And Coin Tossing. International.

Dik Bouwmeester, Jian-Wei Pan, Claus Mattle, Manfred Eibl, Harald Weinfurter, Anton Zeilinger. Experimental quantum teleportation. Nature 390, 575-579(1997).

Published

02-29-2024

How to Cite

Wang, C. (2024). Implementation of Shor’s Algorithm and Its Demonstrated Quantum Efficiency. Journal of Student Research, 13(1). https://doi.org/10.47611/jsrhs.v13i1.6348

Issue

Section

HS Research Articles