• Keine Ergebnisse gefunden

You can use the following hints and shortcuts: a) The message is encoded using an alphabet of 26 characters, where we map the letter “a” to 0, “b” to 1

N/A
N/A
Protected

Academic year: 2021

Aktie "You can use the following hints and shortcuts: a) The message is encoded using an alphabet of 26 characters, where we map the letter “a” to 0, “b” to 1"

Copied!
1
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

Universit¨at Regensburg, Institut f¨ur Theoretische Physik Summer 2020 Prof. Dr. Christoph Lehner, Andreas Hackl

Exercise: Quantum Computing

Problem set 6 (to be discussed in week of June 8, 2020)

Since June 11 is a holiday, the following problem set will only be discussed on Friday, June 12 and is optional. Attendance will not be taken.

Problem 1 Breaking RSA encryption

You are given an RSA public key

Kpub = (277,302446877) (1)

and the encrypted message “kpsgl”. Using the Shor algorithm, find the private key Kpriv and decrypt the message. You can use the following hints and shortcuts:

a) The message is encoded using an alphabet of 26 characters, where we map the letter “a” to 0, “b” to 1,. . ., and “z” to 25. The most significant letter is written to the left. Example:

“test”≡(263ct+ 262ce+ 26cs+ct) = 337135 (2) withct= 19, ce= 4, cs= 18.

b) From the public key you can recover the prime factorsp and q discussed in the lecture. Do this using Shor’s algorithm. You may replace the period finding sub-routine by a classical version. With this you can then reconstruct the private key and decrypt the message.

c) You are encouraged to write a program to perform these steps, however, you may also do them with pen-and-paper assuming that you randomly drew a = 23221710 in Shor’s algorithm and that a1095696= 1 mod 302446877 solves the period for this a.

d) For the greatest common divisor, you may use Euclid’s algorithm and for the modular inverse you may use the extended version which we have both discussed in the demonstrations given in the lecture. You may look at the RSA.ipynb and Shor.ipynb workbooks in the sqc simulator for inspiration but should be able to explain and reproduce all steps.

e) You are guaranteed that the public key was generated using the algorithm discussed in the lecture, therefore you can skip the primality tests. (Explain why.)

Problem 2 Deutsch-Jozsa on real quantum hardware

We have implemented the Deutsch-Jozsa algorithm for f(x) = x and f(x) = 1 using two qubits in sqc in the lecture. Implement the respective circuits on the IBM Q Experience at https://quantum-computing.ibm.com/ and run them on both the simulator and one of the 5-qubit machines. We will demonstrate the usage of this system in the lecture, please see me if you have technical problems getting started.

You may also implement the algorithm in sqc and then use the operator.toQASM() function to obtain the circuit representation for the IBM machines.

1

Referenzen

ÄHNLICHE DOKUMENTE

A comparison with the average dimensions of the maxillary canine reported by De Jonge (1958) shows that only the root was exceptionally long (26 mm vs an average value of 16.1 mm),

Your results show that “RDA values measured in the 1998 study were lower for all seven dentifrices that were also tested in the present study”.. In your discussion you only focus

Equation (3) is solved twice per time step. In the first part of the time step, or predictor phase, the pressure, ~ p; is used to estimate the velocity, u; at the next time step using

Telecenter, or tc as we shall call it here for short, is a collection of U N I X 'C-shell" command interpreter programs assembled by the Survey Project

The purpose of this seminar is to provide a comprehensive introduction to the theory of Soergel bimodules, in particular, using diagrammatic methods.. Indeed, it is not an

Appendix A.3], briefly recall the notions of a strict monoidal category and their functors [EGNO15, Section 2.8] or [Kock04, Section 3.2], of a symmetric monoidal category, and

The aim of my suggested approach (Möhner 2015) was to develop a method, which can even be applied to pub- lished results from cohort studies like the US coal miner mortality

For one, against the backdrop of faith's obedience in Jewish literature, these words assume a decidedly polemi- cal thrust: the covenant fidelity of God's ancient people (Israel)