HOME

TheInfoList



OR:

Shor's algorithm is a quantum algorithm for finding the
prime factor A prime number (or a prime) is a natural number greater than 1 that is not a product of two smaller natural numbers. A natural number greater than 1 that is not prime is called a composite number. For example, 5 is prime because the only ways ...
s of an integer. It was developed in 1994 by the American mathematician Peter Shor. It is one of the few known quantum algorithms with compelling potential applications and strong evidence of superpolynomial speedup compared to best known classical (non-quantum) algorithms. On the other hand, factoring numbers of practical significance requires far more qubits than available in the near future. Another concern is that noise in quantum circuits may undermine results, requiring additional qubits for quantum error correction. Shor proposed multiple similar algorithms for solving the factoring problem, the discrete logarithm problem, and the period-finding problem. "Shor's algorithm" usually refers to the factoring algorithm, but may refer to any of the three algorithms. The discrete logarithm algorithm and the factoring algorithm are instances of the period-finding algorithm, and all three are instances of the hidden subgroup problem. On a quantum computer, to factor an integer N , Shor's algorithm runs in polynomial time, meaning the time taken is polynomial in \log N . It takes
quantum gates In quantum computing and specifically the quantum circuit model of computation, a quantum logic gate (or simply quantum gate) is a basic quantum circuit operating on a small number of qubits. Quantum logic gates are the building blocks of quantu ...
of order O \! \left((\log N)^ (\log \log N) (\log \log \log N) \right) using fast multiplication, or even O \! \left((\log N)^ (\log \log N) \right) utilizing the asymptotically fastest multiplication algorithm currently known due to Harvey and van der Hoeven, thus demonstrating that the
integer factorization In mathematics, integer factorization is the decomposition of a positive integer into a product of integers. Every positive integer greater than 1 is either the product of two or more integer factors greater than 1, in which case it is a comp ...
problem can be efficiently solved on a quantum computer and is consequently in the
complexity class In computational complexity theory, a complexity class is a set (mathematics), set of computational problems "of related resource-based computational complexity, complexity". The two most commonly analyzed resources are time complexity, time and s ...
BQP. This is significantly faster than the most efficient known classical factoring algorithm, the general number field sieve, which works in sub-exponential time: O \! \left(e^ \right) .


Feasibility and impact

If a quantum computer with a sufficient number of qubits could operate without succumbing to quantum noise and other quantum-decoherence phenomena, then Shor's algorithm could be used to break
public-key cryptography Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic alg ...
schemes, such as * The RSA scheme * The finite-field Diffie–Hellman key exchange * The elliptic-curve Diffie–Hellman key exchange RSA can be broken if factoring large integers is computationally feasible. As far as is known, this is not possible using classical (non-quantum) computers; no classical algorithm is known that can factor integers in polynomial time. However, Shor's algorithm shows that factoring integers is efficient on an ideal quantum computer, so it may be feasible to defeat RSA by constructing a large quantum computer. It was also a powerful motivator for the design and construction of quantum computers, and for the study of new quantum-computer algorithms. It has also facilitated research on new cryptosystems that are secure from quantum computers, collectively called
post-quantum cryptography Post-quantum cryptography (PQC), sometimes referred to as quantum-proof, quantum-safe, or quantum-resistant, is the development of cryptographic algorithms (usually public-key algorithms) that are currently thought to be secure against a crypt ...
.


Physical implementation

Given the high error rates of contemporary quantum computers and too few qubits to use quantum error correction, laboratory demonstrations obtain correct results only in a fraction of attempts. In 2001, Shor's algorithm was demonstrated by a group at
IBM International Business Machines Corporation (using the trademark IBM), nicknamed Big Blue, is an American Multinational corporation, multinational technology company headquartered in Armonk, New York, and present in over 175 countries. It is ...
, who factored 15 into 3 \times 5 , using an NMR implementation of a quantum computer with seven qubits. After IBM's implementation, two independent groups implemented Shor's algorithm using photonic qubits, emphasizing that multi-qubit entanglement was observed when running the Shor's algorithm circuits. In 2012, the factorization of 15 was performed with solid-state qubits. Later, in 2012, the factorization of 21 was achieved. In 2016, the factorization of 15 was performed again using trapped-ion qubits with a recycling technique. In 2019, an attempt was made to factor the number 35 using Shor's algorithm on an IBM Q System One, but the algorithm failed because of accumulating errors. However, all these demonstrations have compiled the algorithm by making use of prior knowledge of the answer, and some have even oversimplified the algorithm in a way that makes it equivalent to coin flipping. Furthermore, attempts using quantum computers with other algorithms have been made. However, these algorithms are similar to classical brute-force checking of factors, so unlike Shor's algorithm, they are not expected to ever perform better than classical factoring algorithms. Theoretical analyses of Shor's algorithm assume a quantum computer free of noise and errors. However, near-term practical implementations will have to deal with such undesired phenomena (when more qubits are available, quantum error correction can help). In 2023, Jin-Yi Cai showed that in the presence of noise, Shor's algorithm fails asymptotically almost surely for large semiprimes that are products of two primes in . These primes p have the property that p-1 has a prime factor larger than p^, and have a positive density in the set of all primes. Hence error correction will be needed to be able to factor all numbers with Shor's algorithm.


Algorithm

The problem that we are trying to solve is: ''given an odd
composite number A composite number is a positive integer that can be formed by multiplying two smaller positive integers. Accordingly it is a positive integer that has at least one divisor other than 1 and itself. Every positive integer is composite, prime numb ...
N , find its integer factors''. To achieve this, Shor's algorithm consists of two parts: # A classical reduction of the factoring problem to the problem of order-finding. This reduction is similar to that used for other factoring algorithms, such as the quadratic sieve. # A quantum algorithm to solve the order-finding problem.


Classical reduction

A complete factoring algorithm is possible if we're able to efficiently factor arbitrary N into just two integers p and q greater than 1, since if either p or q are not prime, then the factoring algorithm can in turn be run on those until only primes remain. A basic observation is that, using Euclid's algorithm, we can always compute the GCD between two integers efficiently. In particular, this means we can check efficiently whether N is even, in which case 2 is trivially a factor. Let us thus assume that N is odd for the remainder of this discussion. Afterwards, we can use efficient classical algorithms to check whether N is a prime power. For prime powers, efficient classical factorization algorithms exist, hence the rest of the quantum algorithm may assume that N is not a prime power. If those easy cases do not produce a nontrivial factor of N , the algorithm proceeds to handle the remaining case. We pick a random integer 2 \leq a < N . A possible nontrivial divisor of N can be found by computing \gcd(a, N) , which can be done classically and efficiently using the
Euclidean algorithm In mathematics, the Euclidean algorithm,Some widely used textbooks, such as I. N. Herstein's ''Topics in Algebra'' and Serge Lang's ''Algebra'', use the term "Euclidean algorithm" to refer to Euclidean division or Euclid's algorithm, is a ...
. If this produces a nontrivial factor (meaning \gcd(a, N) \ne 1 ), the algorithm is finished, and the other nontrivial factor is N/\gcd(a, N) . If a nontrivial factor was not identified, then this means that N and the choice of a are
coprime In number theory, two integers and are coprime, relatively prime or mutually prime if the only positive integer that is a divisor of both of them is 1. Consequently, any prime number that divides does not divide , and vice versa. This is equiv ...
, so a is contained in the multiplicative group of integers modulo N, having a
multiplicative inverse In mathematics, a multiplicative inverse or reciprocal for a number ''x'', denoted by 1/''x'' or ''x''−1, is a number which when Multiplication, multiplied by ''x'' yields the multiplicative identity, 1. The multiplicative inverse of a ra ...
modulo N. Thus, a has a
multiplicative order In number theory, given a positive integer ''n'' and an integer ''a'' coprime to ''n'', the multiplicative order of ''a'' modulo ''n'' is the smallest positive integer ''k'' such that a^k\ \equiv\ 1 \pmod n. In other words, the multiplicative orde ...
r modulo N, meaning : a^r \equiv 1 \bmod N, and r is the smallest positive integer satisfying this congruence. The quantum subroutine finds r. It can be seen from the congruence that N divides a^r - 1 , written N \mid a^r - 1 . This can be factored using difference of squares: N \mid (a^ - 1)(a^ + 1). Since we have factored the expression in this way, the algorithm doesn't work for odd r (because a^ must be an integer), meaning that the algorithm would have to restart with a new a . Hereafter we can therefore assume that r is even. It cannot be the case that N \mid a^ - 1 , since this would imply a^ \equiv 1 \bmod N, which would contradictorily imply that r/2 would be the order of a , which was already r . At this point, it may or may not be the case that N \mid a^ + 1 . If N does not divide a^ + 1 , then this means that we are able to find a nontrivial factor of N . We compute d = \gcd(N, a^ - 1). If d = 1 , then N \mid a^ + 1 was true, and a nontrivial factor of N cannot be achieved from a , and the algorithm must restart with a new a . Otherwise, we have found a nontrivial factor of N , with the other being N/d , and the algorithm is finished. For this step, it is also equivalent to compute \gcd(N, a^ + 1) ; it will produce a nontrivial factor if \gcd(N, a^ - 1) is nontrivial, and will not if it's trivial (where N \mid a^ + 1 ). The algorithm restated shortly follows: let N be odd, and not a prime power. We want to output two nontrivial factors of N . # Pick a random number 1 < a < N . # Compute K = \gcd(a, N) , the
greatest common divisor In mathematics, the greatest common divisor (GCD), also known as greatest common factor (GCF), of two or more integers, which are not all zero, is the largest positive integer that divides each of the integers. For two integers , , the greatest co ...
of a and N . # If K \neq 1 , then K is a nontrivial factor of N , with the other factor being N/K, and we are done. # Otherwise, use the quantum subroutine to find the order r of a. # If r is odd, then go back to step 1. # Compute g = \gcd(N, a^ + 1). If g is nontrivial, the other factor is N/g, and we're done. Otherwise, go back to step 1. It has been shown that this will be likely to succeed after a few runs. In practice, a single call to the quantum order-finding subroutine is enough to completely factor N with very high probability of success if one uses a more advanced reduction.


Quantum order-finding subroutine

The goal of the quantum subroutine of Shor's algorithm is, given
coprime integers In number theory, two integers and are coprime, relatively prime or mutually prime if the only positive integer that is a divisor of both of them is 1. Consequently, any prime number that divides does not divide , and vice versa. This is equiva ...
N and 1< a, to find the order r of a modulo N, which is the smallest positive integer such that a^r \equiv 1 \pmod N. To achieve this, Shor's algorithm uses a quantum circuit involving two registers. The second register uses n qubits, where n is the smallest integer such that N\le 2^n , i.e., n = \left \lceil \right \rceil . The size of the first register determines how accurate of an approximation the circuit produces. It can be shown that using 2n qubits gives sufficient accuracy to find r . The exact quantum circuit depends on the parameters a and N, which define the problem. The following description of the algorithm uses
bra–ket notation Bra–ket notation, also called Dirac notation, is a notation for linear algebra and linear operators on complex vector spaces together with their dual space both in the finite-dimensional and infinite-dimensional case. It is specifically de ...
to denote quantum states, and \otimes to denote the
tensor product In mathematics, the tensor product V \otimes W of two vector spaces V and W (over the same field) is a vector space to which is associated a bilinear map V\times W \rightarrow V\otimes W that maps a pair (v,w),\ v\in V, w\in W to an element of ...
, rather than logical AND. The algorithm consists of two main steps: # Use quantum phase estimation with unitary U representing the operation of multiplying by a (modulo N), and input state , 0\rangle^\otimes, 1\rangle (where the second register is , 1\rangle made from n qubits). The eigenvalues of this U encode information about the period, and , 1\rangle can be seen to be writable as a sum of its eigenvectors. Thanks to these properties, the quantum phase estimation stage gives as output a random integer of the form \frac 2^ for random j=0,1,...,r-1. # Use the continued fractions algorithm to extract the period r from the measurement outcomes obtained in the previous stage. This is a procedure to post-process (with a classical computer) the measurement data obtained from measuring the output quantum states, and retrieve the period. The connection with quantum phase estimation was not discussed in the original formulation of Shor's algorithm, but was later proposed by Kitaev.


Quantum phase estimation

In general the quantum phase estimation algorithm, for any unitary U and eigenstate , \psi\rangle such that U, \psi\rangle=e^ , \psi\rangle, sends input states , 0\rangle, \psi\rangle to output states close to , \phi\rangle, \psi\rangle, where \phi is a superposition of integers close to 2^ \theta. In other words, it sends each eigenstate , \psi_j\rangle of U to a state containing information close to the associated eigenvalue. For the purposes of quantum order-finding, we employ this strategy using the unitary defined by the action U, k\rangle = \begin , ak \pmod N\rangle & 0 \le k < N, \\ , k\rangle & N \le k < 2^n. \end The action of U on states , k\rangle with N \leq k < 2^n is not crucial to the functioning of the algorithm, but needs to be included to ensure that the overall transformation is a well-defined quantum gate. Implementing the circuit for quantum phase estimation with U requires being able to efficiently implement the gates U^ . This can be accomplished via modular exponentiation, which is the slowest part of the algorithm. The gate thus defined satisfies U^r = I, which immediately implies that its eigenvalues are the r-th roots of unity \omega_r^k = e^. Furthermore, each eigenvalue \omega_r^j has an eigenvector of the form , \psi_j\rangle=r^\sum_^\omega_r^, a^k\rangle , and these eigenvectors are such that \begin \frac \sum_^ , \psi_j\rangle &= \frac \sum_^ \sum_^ \omega_r^, a^k\rangle \\ &= , 1\rangle + \frac \sum_^ \left(\sum_^ \omega_r^ \right) , a^k\rangle =, 1\rangle, \end where the last identity follows from the
geometric series In mathematics, a geometric series is a series (mathematics), series summing the terms of an infinite geometric sequence, in which the ratio of consecutive terms is constant. For example, 1/2 + 1/4 + 1/8 + 1/16 + ⋯, the series \tfrac12 + \tfrac1 ...
formula, which implies \sum_^ \omega_r^ = 0. Using quantum phase estimation on an input state , 0\rangle^, \psi_j\rangle would then return the integer 2^ j/r with high probability. More precisely, the quantum phase estimation circuit sends , 0\rangle^, \psi_j\rangle to , \phi_j\rangle, \psi_j\rangle such that the resulting probability distribution p_k \equiv, \langle k, \phi_j\rangle, ^2 is peaked around k=2^ j/r, with p_ \ge 4/\pi^2 \approx 0.4053. This probability can be made arbitrarily close to 1 using extra qubits. Applying the above reasoning to the input , 0\rangle^, 1\rangle, quantum phase estimation thus results in the evolution , 0\rangle^, 1\rangle = \frac \sum_^ , 0\rangle^ , \psi_j\rangle \to \frac \sum_^ , \phi_j\rangle, \psi_j\rangle. Measuring the first register, we now have a balanced probability 1/r to find each , \phi_j\rangle, each one giving an integer approximation to 2^ j/r, which can be divided by 2^ to get a decimal approximation for j/r.


Continued-fraction algorithm to retrieve the period

Then, we apply the continued-fraction algorithm to find integers b and c, where b/c gives the best fraction approximation for the approximation measured from the circuit, for b, c < N and
coprime In number theory, two integers and are coprime, relatively prime or mutually prime if the only positive integer that is a divisor of both of them is 1. Consequently, any prime number that divides does not divide , and vice versa. This is equiv ...
b and c. The number of qubits in the first register, 2n, which determines the accuracy of the approximation, guarantees that \frac = \frac, given the best approximation from the superposition of , \phi_j\rangle was measured (which can be made arbitrarily likely by using extra bits and truncating the output). However, while b and c are coprime, it may be the case that j and r are not coprime. Because of that, b and c may have lost some factors that were in j and r. This can be remedied by rerunning the quantum order-finding subroutine an arbitrary number of times, to produce a list of fraction approximations \frac, \frac, \ldots, \frac, where s is the number of times the subroutine was run. Each c_k will have different factors taken out of it because the circuit will (likely) have measured multiple different possible values of j. To recover the actual r value, we can take the least common multiple of each c_k: \operatorname(c_1, c_2, \ldots, c_s). The least common multiple will be the order r of the original integer a with high probability. In practice, a single run of the quantum order-finding subroutine is in general enough if more advanced post-processing is used.


Choosing the size of the first register

Phase estimation requires choosing the size of the first register to determine the accuracy of the algorithm, and for the quantum subroutine of Shor's algorithm, 2n qubits is sufficient to guarantee that the optimal bitstring measured from phase estimation (meaning the , k\rangle where k / 2^ is the most accurate approximation of the phase from phase estimation) will allow the actual value of r to be recovered. Each , \phi_j\rangle before measurement in Shor's algorithm represents a superposition of integers approximating 2^ j/r. Let , k\rangle represent the most optimal integer in , \phi_j\rangle. The following theorem guarantees that the continued fractions algorithm will recover j/r from k/2^: As k is the optimal bitstring from phase estimation, k/2^ is accurate to j/r by 2n bits. Thus,\left\vert\frac - \frac\right\vert \leq \frac \leq \frac \leq \fracwhich implies that the continued fractions algorithm will recover j and r (or with their greatest common divisor taken out).


The bottleneck

The runtime bottleneck of Shor's algorithm is quantum modular exponentiation, which is by far slower than the quantum Fourier transform and classical pre-/post-processing. There are several approaches to constructing and optimizing circuits for modular exponentiation. The simplest and (currently) most practical approach is to mimic conventional arithmetic circuits with reversible gates, starting with ripple-carry adders. Knowing the base and the modulus of exponentiation facilitates further optimizations. Reversible circuits typically use on the order of n^3 gates for n qubits. Alternative techniques asymptotically improve gate counts by using quantum Fourier transforms, but are not competitive with fewer than 600 qubits owing to high constants.


Period finding and discrete logarithms

Shor's algorithms for the discrete log and the order finding problems are instances of an algorithm solving the period finding problem. All three are instances of the hidden subgroup problem.


Shor's algorithm for discrete logarithms

Given a group G with order p and generator g \in G , suppose we know that x = g^ \in G , for some r \in \mathbb_p , and we wish to compute r , which is the discrete logarithm: r = (x) . Consider the abelian group \mathbb_ \times \mathbb_ , where each factor corresponds to modular addition of values. Now, consider the function : f \colon \mathbb_ \times \mathbb_ \to G \;;\; f(a,b) = g^ x^ . This gives us an abelian hidden subgroup problem, where f corresponds to a
group homomorphism In mathematics, given two groups, (''G'',∗) and (''H'', ·), a group homomorphism from (''G'',∗) to (''H'', ·) is a function ''h'' : ''G'' → ''H'' such that for all ''u'' and ''v'' in ''G'' it holds that : h(u*v) = h(u) \cdot h(v) whe ...
. The kernel corresponds to the multiples of (r,1) . So, if we can find the kernel, we can find r . A quantum algorithm for solving this problem exists. This algorithm is, like the factor-finding algorithm, due to Peter Shor and both are implemented by creating a superposition through using Hadamard gates, followed by implementing f as a quantum transform, followed finally by a quantum Fourier transform. Due to this, the quantum algorithm for computing the discrete logarithm is also occasionally referred to as "Shor's Algorithm." The order-finding problem can also be viewed as a hidden subgroup problem. To see this, consider the group of integers under addition, and for a given a\in\mathbb such that: a^=1, the function : f \colon \mathbb\to \mathbb \;;\; f(x) = a^,\; f(x+r) = f(x) . For any finite abelian group G, a quantum algorithm exists for solving the hidden subgroup for G in polynomial time.


See also

* GEECM, a factorization algorithm said to be "often much faster than Shor's" * Grover's algorithm


References


Further reading

* *
"Explanation for the man in the street"
by Scott Aaronson,
approved
by Peter Shor. (Shor wrote "Great article, Scott! That’s the best job of explaining quantum computing to the man on the street that I’ve seen."). An alternate metaphor for the QFT was presented i
one of the comments
Scott Aaronson suggests the following 12 references as further reading (out of "the 10105000 quantum algorithm tutorials that are already on the web."): * . Revised version of the original paper by Peter Shor ("28 pages, LaTeX. This is an expanded version of a paper that appeared in the Proceedings of the 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, Nov. 20--22, 1994. Minor revisions made January, 1996").

Matthew Hayward'
Quantum Algorithms Page
2005-02-17, imsa.edu, LaTeX2HTML version of the origina
LaTeX document
also available a
PDF
o
postscript
document.
Quantum Computation and Shor's Factoring Algorithm
Ronald de Wolf, CWI and University of Amsterdam, January 12, 1999, 9 page postscript document.
Shor's Factoring Algorithm
Notes from Lecture 9 of Berkeley CS 294–2, dated 4 Oct 2004, 7 page postscript document.
Chapter 6 Quantum Computation
, 91 page postscript document, Caltech, Preskill, PH229.

b
Samuel L. Braunstein


by Neal Young, Last modified: Tue May 21 11:47:38 1996.
III. Breaking RSA Encryption with a Quantum Computer: Shor's Factoring Algorithm
Lecture notes on Quantum computation, Cornell University, Physics 481–681, CS 483; Spring, 2006 by N. David Mermin. Last revised 2006-03-28, 30 page PDF document. * * This paper is a written version of a one-hour lecture given on Peter Shor's quantum factoring algorithm. 22 pages.
Chapter 20 Quantum Computation
from ''Computational Complexity: A Modern Approach'', Draft of a book: Dated January 2007, Sanjeev Arora and Boaz Barak, Princeton University. Published as Chapter 10 Quantum Computation of Sanjeev Arora, Boaz Barak, "Computational Complexity: A Modern Approach", Cambridge University Press, 2009,
A Step Toward Quantum Computing: Entangling 10 Billion Particles
, from "Discover Magazine", Dated January 19, 2011.
Josef Gruska - ''Quantum Computing Challenges''
also i
Mathematics unlimited: 2001 and beyond
Editors Björn Engquist, Wilfried Schmid, Springer, 2001,


External links

* Version 1.0.0 o
libquantum
contains a C language implementation of Shor's algorithm with their simulated quantum computer library, but the width variable in shor.c should be set to 1 to improve the runtime complexity. * PBS Infinite Series created two videos explaining the math behind Shor's algorithm,
How to Break Cryptography
and
Hacking at Quantum Speed with Shor's Algorithm
.
Complete implementation of Shor's algorithm with Classiq
{{DEFAULTSORT:Shor's Algorithm Quantum algorithms Integer factorization algorithms Post-quantum cryptography Eponymous algorithms