Computer encryption: Can Shor’s algorithm be used to crack data encryption keys?

Project title: Computer encryption: Can Shor’s algorithm be used to crack data encryption keys?
Overview:

We will write a script to simulate Shor’s algorithm and test its performance against classic methods.