Národní úložiště šedé literatury Nalezeno 2 záznamů.  Hledání trvalo 0.00 vteřin. 
Shor's algorithm in Quantum Cryptography
Nwaokocha, Martyns ; Vašík, Petr (oponent) ; Hrdina, Jaroslav (vedoucí práce)
Cryptography is a very important aspect of our daily lives as it gives the theoretical foun-dation of information security. Quantum computation and information is also becoming avery important field of science because of its many application areas including cryptologyand more specifically in public key cryptography.The difficulty of numbers into its prime factors is the basis of some important publickey cryptosystems key of which is the RSA cryptosystem. Shor’s Quantum factoring al-gorithm leverages most especially the quantum interference effect of quantum computingto factor semi-prime numbers in polynomial time on a quantum computer. Though thecapacity of current quantum computers to execute the Shor’s Algorithm is very limited,there are many extensive foundational scientific research on various techniques of opti-mizing the algorithm in terms of factors such as number of qubits, depth of the circuitand number of gates.In this thesis, various variants of the Shor’s factoring algorithm and quantum circuits arediscussed, analysed and compared. Also, some variants of the Shor’s algorithm are simu-lated and actually executed on simulators and quantum computers in the IBM QuantumExperience platform. The simulation results are compared in terms of their complexityand success rate.The organization of the thesis is as follow: Chapter 1 discusses some key historical resultin quantum cryptography, states the problem discussed in this thesis and presents the ob-jectives to be achieved. Chapter 2 summarizes the mathematical background in quantumcomputing and public key cryptography as well as describing the notation used through-out the thesis. This also explains how a realizable order-finding or factoring algorithmcan be used to break the RSA cryptosystem. Chapter 3 presents the building blocks ofShor’s algorithm including the Quantum Fourier Transform, Quantum Phase Estimation,Modular Exponentiation and Shor’s algorithm in detail. Different optimization variantsof the quantum circuits are also presented and compared here. Chapter 4 presents theresults of the simulations of the various versions of the Shor’s algorithm. In Chapter 5, wediscuss the achievement of thesis goals, summarize the results of the research and outlinepossible future research directions.
Shor's algorithm in Quantum Cryptography
Nwaokocha, Martyns ; Vašík, Petr (oponent) ; Hrdina, Jaroslav (vedoucí práce)
Cryptography is a very important aspect of our daily lives as it gives the theoretical foun-dation of information security. Quantum computation and information is also becoming avery important field of science because of its many application areas including cryptologyand more specifically in public key cryptography.The difficulty of numbers into its prime factors is the basis of some important publickey cryptosystems key of which is the RSA cryptosystem. Shor’s Quantum factoring al-gorithm leverages most especially the quantum interference effect of quantum computingto factor semi-prime numbers in polynomial time on a quantum computer. Though thecapacity of current quantum computers to execute the Shor’s Algorithm is very limited,there are many extensive foundational scientific research on various techniques of opti-mizing the algorithm in terms of factors such as number of qubits, depth of the circuitand number of gates.In this thesis, various variants of the Shor’s factoring algorithm and quantum circuits arediscussed, analysed and compared. Also, some variants of the Shor’s algorithm are simu-lated and actually executed on simulators and quantum computers in the IBM QuantumExperience platform. The simulation results are compared in terms of their complexityand success rate.The organization of the thesis is as follow: Chapter 1 discusses some key historical resultin quantum cryptography, states the problem discussed in this thesis and presents the ob-jectives to be achieved. Chapter 2 summarizes the mathematical background in quantumcomputing and public key cryptography as well as describing the notation used through-out the thesis. This also explains how a realizable order-finding or factoring algorithmcan be used to break the RSA cryptosystem. Chapter 3 presents the building blocks ofShor’s algorithm including the Quantum Fourier Transform, Quantum Phase Estimation,Modular Exponentiation and Shor’s algorithm in detail. Different optimization variantsof the quantum circuits are also presented and compared here. Chapter 4 presents theresults of the simulations of the various versions of the Shor’s algorithm. In Chapter 5, wediscuss the achievement of thesis goals, summarize the results of the research and outlinepossible future research directions.

Chcete být upozorněni, pokud se objeví nové záznamy odpovídající tomuto dotazu?
Přihlásit se k odběru RSS.