Computer encryption: Can Shor’s algorithm be used to crack data encryption keys?
Project title:
Computer encryption: Can Shor’s algorithm be used to crack data encryption keys?
Overview:
We will write a script to simulate Shor’s algorithm and test its performance against classic methods.