REPALDI, KHALIFATURAHMAN AL HAZRI and Heryanto, Ahmad (2024) IMPLEMENTASI ALGORITMA ENKRIPSI PADA KOMPUTER KUANTUM. Undergraduate thesis, Sriwijaya University.
Text
RAMA_56201_09011281924080.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (4MB) | Request a copy |
|
Text
RAMA_56201_09011281924080_TURNITIN.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (16MB) | Request a copy |
|
Text
RAMA_56201_09011281924080_0022018703_01_front_ref.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (1MB) | Request a copy |
|
Text
RAMA_56201_09011281924080_0022018703_02.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (1MB) | Request a copy |
|
Text
RAMA_56201_09011281924080_0022018703_03.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (2MB) | Request a copy |
|
Text
RAMA_56201_09011281924080_0022018703_04.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (907kB) | Request a copy |
|
Text
RAMA_56201_09011281924080_0022018703_05.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (209kB) | Request a copy |
|
Text
RAMA_56201_09011281924080_0022018703_06_ref.pdf - Bibliography Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (136kB) | Request a copy |
|
Text
RAMA_56201_09011281924080_0022018703_07_lamp.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (323kB) | Request a copy |
Abstract
With the computing speed possessed by quantum computers, the security of encryption on classical computers is threatened, especially the security of the RSA encryption algorithm, because it is predicted that its security will be threatened by the Shor factorization algorithm, which can be run on quantum computers. This research aims to validate whether the current specifications of quantum computers mean that the Shor algorithm can really threaten RSA and whether RSA can be implemented on quantum computers safely. The results of the research that has been carried out show that, by using eight qubits on an IBM quantum computer, Shor is still unable to overcome the RSA algorithm with a key size of 2048 bits. Apart from that, when the Shor algorithm factors in the number 15, the average time required by the Shor algorithm in five trials is 0.00132 seconds. On a classical computer with ordinary factoring, the time needed to factor in five trials is 0.000244 seconds. Then, it turns out that RSA can be implemented on quantum computers using the BB84 protocol. From the results of experiments that have been carried out to encrypt and decrypt string-type data, the RSA algorithm, which has been modified with the BB84 protocol, requires an average time of 0.000462 seconds for three experiments.
Item Type: | Thesis (Undergraduate) |
---|---|
Uncontrolled Keywords: | Komputer Kuantum, Algoritma Rivest Shamir Adleman (RSA), IBM Quantum, Protokol BB84, Algoritma Shor |
Subjects: | T Technology > T Technology (General) > T1-995 Technology (General) |
Divisions: | 09-Faculty of Computer Science > 56201-Computer Systems (S1) |
Depositing User: | Khalifaturahman Al Hazri Repaldi |
Date Deposited: | 02 Jul 2024 02:12 |
Last Modified: | 02 Jul 2024 02:12 |
URI: | http://repository.unsri.ac.id/id/eprint/148763 |
Actions (login required)
View Item |