The code demonstrates how a third party can break the RSA by obtaining the secret key by using public key and interrupt the communication and modifies the messages in transit.
quantum-computing quantum-information quantum-circuit rsa-cryptosystem shors-algorithm rabin-cryptosystem quantum-programming quantum-phase-estimation quantum-fourier-transform shor-attack-on-rsa shor-attack-on-rabin
-
Updated
Apr 25, 2021 - Jupyter Notebook