Implementation of Shor's Algorithm and Its Demonstrated Quantum Efficiency
DOI:
https://doi.org/10.47611/jsrhs.v13i1.6348Keywords:
RSA algorithm, Shor's algorithmAbstract
The unique principles of quantum physics introduce an element of uncertainty into our previously deterministic world. Quantum computing, derived from quantum physics, enables the representation of a qubit in both |0> and |1> states, thus encoding more information and unleashing a realm of new possibilities. This paper conducts an analysis of the classical RSA encryption protocol and its vulnerability to the quantum algorithm—Shor's algorithm. Furthermore, this paper rigorously establishes the mathematical theories required for the analysis. Finally, the algorithm is thoroughly explored, and the potential efficiencies of quantum computing are discussed. As the study of quantum computing deepens, its application is poised to surpass that of traditional computers in various fields, leaving a profound impact.
Downloads
References or Bibliography
Peter W. Shor. Polynomial time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J.Sci.Statist.Comput. 26 (1997).
Charles H.Bennett, Gilles Brassard. Quantum Cryptography: Public Key Distribution And Coin Tossing. International.
Dik Bouwmeester, Jian-Wei Pan, Claus Mattle, Manfred Eibl, Harald Weinfurter, Anton Zeilinger. Experimental quantum teleportation. Nature 390, 575-579(1997).
Published
How to Cite
Issue
Section
Copyright (c) 2024 Chenxuan Wang
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Copyright holder(s) granted JSR a perpetual, non-exclusive license to distriute & display this article.