3.2.1 Factoring

Course subject(s) Module 3: Securing your data

15 = 5 x 3. This does not sound too difficult, yet it is the basic principle that keeps our data safe. Listen to this lecture on factoring by Lieven.

Main takeaways

  • There is a great asymmetry in multiplying and factoring: multiplying is easy, factoring is complicated.
  • This asymmetry is used in cryptography.
  • Shor’s quantum factoring algorithm: an algorithm which makes factoring possible in reasonable time, something that is not possible on a classical computer.
Creative Commons License
Quantum Internet and quantum computers how will they change the world I by TU Delft OpenCourseWare is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Based on a work at https://ocw.tudelft.nl/courses/quantum-internet-quantum-computers-will-change-world/
Back to top