Risk Analysis of Information Security Breaches and Vulnerabilities in Information Systems: Shor's Algorithm
Authors/Creators
Description
Abstract
Shor’s algorithm represents a landmark advancement in quantum computing, offering an efficient method for integer factorization, a problem that is computationally hard for classical computers. A core component of the algorithm is the Quantum Fourier Transform (QFT), which enables fast Fourier analysis on quantum hardware. This study focuses on the implementation and analysis of Shor’s algorithm on a 5-qubit IBM quantum computer, exploring both the theoretical principles and practical execution on a limited quantum device. By examining this implementation, we highlight the potential impact of quantum computing on classical cryptographic schemes, assess risks to information security, and discuss the algorithm’s efficiency, scalability, and applicability in real-world computational environments.
Files
Квант комп печать 6.1.1.pdf
Files
(1.2 MB)
| Name | Size | Download all |
|---|---|---|
|
md5:6502c34d8a95829a000bcbc0b8400eb8
|
1.2 MB | Preview Download |