Practical Challenges in Executing Shor's Algorithm on Existing Quantum Platforms
By: Paul Bagourd , Julian Jang-Jaccard , Vincent Lenders and more
Potential Business Impact:
Quantum computers can't break secret codes yet.
Quantum computers pose a fundamental threat to widely deployed public-key cryptosystems, such as RSA and ECC, by enabling efficient integer factorization using Shor's algorithm. Theoretical resource estimates suggest that 2048-bit RSA keys could be broken using Shor's algorithm with fewer than a million noisy qubits. Although such machines do not yet exist, the availability of smaller, cloud-accessible quantum processors and open-source implementations of Shor's algorithm raises the question of what key sizes can realistically be factored with today's platforms. In this work, we experimentally investigate Shor's algorithm on several cloud-based quantum computers using publicly available implementations. Our results reveal a substantial gap between the capabilities of current quantum hardware and the requirements for factoring cryptographically relevant integers. In particular, we observe that circuit constructions still need to be highly specific for each modulus, and that machine fidelities are unstable, with high and fluctuating error rates.
Similar Papers
Implementation of Shor Algorithm: Factoring a 4096-Bit Integer Under Specific Constraints
Cryptography and Security
Breaks large secret codes much faster.
Enhancing the Practical Reliability of Shor's Quantum Algorithm via Generalized Period Decomposition: Theory and Large-Scale Empirical Validation
Quantum Physics
Makes quantum computers break codes faster and more reliably.
Quantum Prime Factorization: A Novel Approach Based on Fermat Method
Cryptography and Security
Breaks secret codes much faster using quantum computers.