Module 3: Securing your data
15 = 5 x 3. This does not sound too difficult, yet it is the basic principle that keeps our data safe. Listen to this lecture on factoring by Lieven.
- There is a great asymmetry in multiplying and factoring: multiplying is easy, factoring is complicated.
- This asymmetry is used in cryptography.
- Shor’s quantum factoring algorithm: an algorithm which makes factoring possible in reasonable time, something that is not possible on a classical computer.
Quantum Internet and quantum computers how will they change the world I by TU Delft OpenCourseWare is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Based on a work at https://ocw.tudelft.nl/courses/quantum-internet-quantum-computers-will-change-world/