ritu-thombre99 / Breaking-RSA-using-Shors-algorithm

The code demonstrates how a third party can break the RSA by obtaining the secret key by using public key and interrupt the communication and modifies the messages in transit.

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Breaking-RSA-using-Shor-s-algorithm

  • File breaking_RSA.ipynb has a step-by-step demonstration of key generation, encryption, shor's attack and decyrption for RSA encryption algorithm.
  • File Shor.ipynb demonstrates factorization of 7 bit integer (119=17*7) on a 32 bit quantum processor provided by IBM
  • shor_119.png is the circuit and histogram.png are mesarement results for this circuit

About

The code demonstrates how a third party can break the RSA by obtaining the secret key by using public key and interrupt the communication and modifies the messages in transit.

License:MIT License


Languages

Language:Jupyter Notebook 100.0%