Skip to content

The code demonstrates how a third party can break the RSA by obtaining the secret key by using public key and interrupt the communication and modifies the messages in transit.

License

Notifications You must be signed in to change notification settings

ritu-thombre99/Breaking-RSA-using-Shors-algorithm

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Breaking-RSA-using-Shor-s-algorithm

  • File breaking_RSA.ipynb has a step-by-step demonstration of key generation, encryption, shor's attack and decyrption for RSA encryption algorithm.
  • File Shor.ipynb demonstrates factorization of 7 bit integer (119=17*7) on a 32 bit quantum processor provided by IBM
  • shor_119.png is the circuit and histogram.png are mesarement results for this circuit

About

The code demonstrates how a third party can break the RSA by obtaining the secret key by using public key and interrupt the communication and modifies the messages in transit.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published