Lecture
Shor's algorithm is a quantum factorization algorithm (decomposition of a number into simple factors), which allows decomposing a number during using logical qubits.
The Shore Algorithm was developed by Peter Shore in 1994. Seven years later, in 2001, its performance was demonstrated by a team of IBM specialists. The number 15 was decomposed into factors 3 and 5 using a quantum computer with 7 qubits.
Peter Shore - the author of the algorithm
The significance of the algorithm lies in the fact that with its help (using a quantum computer with several hundred logical qubits) it becomes possible to break into public-key cryptographic systems. For example, RSA uses the public key , which is the product of two large primes. One way to crack the RSA cipher is to find multipliers. . When large enough it is almost impossible to do using well-known classical algorithms. The best known classical factorization algorithms take time to order. . Shor's algorithm, using the capabilities of quantum computers, is capable of factoring a number not just in polynomial time, but in a time that is not much faster than the multiplication time of whole numbers (that is, almost as fast as encryption itself). Thus, the implementation of a scalable quantum computer would put an end to most modern cryptographic protection. (This is not only about the RSA scheme, which is directly based on the complexity of factorization, but also about other similar schemes that a quantum computer can crack in the same way).
Shor's algorithm is probabilistic. The first source of randomness is built into the classical probabilistic reduction of factorization to the determination of the period of a certain function. The second source arises from the necessity of observing quantum memory, which also gives random results [1] .
The basis of the Shor Algorithm: the ability of information units of quantum computers - qubits - to take several values simultaneously and be in a state of "entanglement". Therefore, it allows computations in terms of saving qubits. The principle of operation of Shor’s algorithm can be divided into 2 parts: the first is the classical reduction of the factorization to the determination of the period of a certain function, the second is the quantum determination of the period of this function. Let be:
The bit size of this memory about 2 times the size .
More precisely
- random parameter, such that and , - the greatest common divisor.
Note that , , - fixed. The Shore algorithm uses the standard method of reducing the decomposition problem to the period search problem. functions for a randomly chosen number [2] .
Minimum such that - this is order modulo .
Order is the period of the function where
If you can efficiently calculate as a function then you can find your own divider for the time limited by the polynomial from with probability for any fixed .
Suppose for a given period satisfies
Then
The likelihood of this condition where - the number of different odd prime divisors , Consequently, in this case. Therefore good value with probability there is for attempts. The longest calculation in one attempt is the calculation [3] [4] .
To implement the quantum part of the algorithm, the computational scheme is quantum register and . Initially, each of them consists of a set of qubits in the zero boolean state. .
Register used to place arguments functions
Register (auxiliary) is used to allocate function values. with a period to be calculated.
Quantum computing consists of 4 steps [5] :
The result is with probability
The rest of the run runs a classic computer:
To some extent, determining the period of a function using the Fourier transform is similar to measuring the lattice constants of a crystal by X-ray or neutron diffraction. To determine the period no need to calculate all values . In this sense, the task is similar to the task of Deutsch, in which it is important to know not all the values of a function, but only some of its properties [6] .
Let be - function with an unknown period .
To determine the period two registers with dimensions are required and qubits, which in their original state must be in
At the first stage, one-sided superposition of all basic vectors of the first register is performed using the operator of the following type:
Hadamard pseudo-transform is used here. . Applying to the current state is obtained:
Measurement of the second register with the result where leads condition to
After measuring the state the first register consists only of the basis vectors of the form such that for all . Therefore, it has a discrete homogeneous spectrum. Can't get a period right or a multiple of it, measuring the first register, because here - random value. Here we apply the discrete Fourier transform of the form
If a multiple then , if a multiple and otherwise. Even not a power of then spectrum shows individual peaks with a period , because
For the first register is used qubit when because it guarantees at least elements in the given amount, and thus the width of the peaks will be of the order of
If we now calculate the first register, we get the value close to where . It can be written as It comes down to finding an approximation where for a particular binary point number Continued fractions are used to solve this problem.
Since the form of a rational number is not unique in its kind, and defined as , if a Probability that and simple more than so only Attempts need to be as close as possible to success. [7] [5] .
Comments
To leave a comment
Quantum informatics
Terms: Quantum informatics