51. N-Queens - Detailed Explanation

Free Coding Questions Catalog
Boost your coding skills with our essential coding questions catalog. Take a step towards a better tech career now!

Problem Statement

Place N queens on an N × N chessboard so that no two queens threaten each other. Return all distinct solutions to the placement. Each solution should be represented as a list of strings, where 'Q' denotes a queen and '.' denotes an empty square.

Constraints:

  • 1 <= N <= 9
  • If N < 4 (except N = 1), no solutions exist (queens inevitably attack each other for N=2 or N=3).

Example:

Input:

N = 4

Output:

[[".Q..", "...Q", "Q...", "..Q."], ["..Q.", "Q...", "...Q", ".Q.."]]

Explanation:

For a 4×4 board, there are 2 distinct solutions. Each solution is shown as 4 strings, one for each row of the board. Each row contains exactly one 'Q' and the rest '.'. In the first solution above, the queens are at positions (row, col): (0,1), (1,3), (2,0), (3,2). No two queens share a row, column, or diagonal.

Hints:

  1. Think backtracking – place queens one row at a time and backtrack when a conflict occurs.
  2. Use efficient tracking for attacks: e.g. boolean arrays or bitmasking for columns and diagonals.
  3. Prune early – if a partial placement is invalid, cut off that branch immediately.

Approach 1: Brute Force (Permutation Generation)

Idea:

Generate all possible ways to place one queen in each row (or each column) and filter out the arrangements where queens conflict. One straightforward brute force is to consider every permutation of queen positions in rows. Since each of the N queens must go on a different row and column, we can represent a board by a permutation of column indices [c0, c1, ..., c_{N-1}] where c_i is the column of the queen in row i. There are N! such permutations. For each permutation, we check if it’s a valid solution (no diagonal conflicts).

Algorithm:

  1. Generate all permutations of size N (each permutation represents queen columns for rows 0 to N-1).
  2. For each permutation, check diagonals: no two queens i and j should satisfy abs(i - j) == abs(c_i - c_j) (this is the condition for diagonal attack).
  3. If valid, format the permutation into an actual board with 'Q' and '.' and add to results.

This brute force tries all N! possibilities for queen placement (for N=8, that’s 40,320 possibilities after fixing one queen per column ) and checks each for conflicts, so it’s correct but very slow for large N.

Time Complexity:

  • O(N! * N) in the worst case. There are N! permutations, and checking each permutation’s diagonals takes up to O(N). This grows factorially and becomes infeasible even for moderate N (e.g. 9! = 362,880 permutations for N=9).

Python Implementation:

Python3
Python3

. . . .

Java Implementation:

Java
Java

. . . .

Note: This brute-force approach quickly becomes impractical as N grows. It works for N=4 or N=5, but is far too slow for N ≥ 8 due to the factorial explosion of possibilities.

Approach 2: Backtracking (DFS with Pruning)

Idea:

Instead of generating all arrangements blindly, use backtracking to build solutions incrementally and abandon partial placements that are invalid (prune the search tree). We place queens row by row: place a queen in row 0, then row 1, and so on. At each row, we only try columns that are not under attack by previously placed queens. If we reach a row where no column is safe, we backtrack to the previous row and move the queen there to the next position. This way, we never consider impossible placements further than necessary.

To efficiently check whether a position (row, col) is safe, maintain:

  • a set (or boolean array) of occupied columns,
  • a set of occupied major diagonals (down-right diagonals identified by row - col),
  • a set of occupied minor diagonals (down-left diagonals identified by row + col).

Using these, we can check conflicts in O(1) time for each candidate position, instead of scanning the whole board.

Algorithm:

  1. Initialize three empty sets (or boolean arrays) to track columns and diagonals that already have queens.
  2. Start at row = 0. For each column c from 0 to N-1:
    • If c is not in cols and (row-c) not in main_diag and (row+c) not in anti_diag (i.e., no conflict), place a queen at (row, c).
    • Mark c as occupied in cols, mark diagonals (row-c) and (row+c) as occupied.
    • Recurse to place a queen in the next row (row+1).
    • If a placement leads to a dead end, backtrack: remove the queen and unmark c, row-c, row+c.
  3. Continue until queens are placed in all rows. Each time we reach row N (past the last row), we have found a valid solution; add it to the results.

This approach drastically cuts down the search space by never considering invalid partial configurations. For example, for N=8 it will explore far fewer than 40,320 possibilities because it stops early at any conflict.

Time Complexity:

  • O(N!) in the worst case, since we might still have to explore permutations of placements. However, due to early pruning, the practical search space is much smaller than N!. For instance, many branches are cut off as soon as a conflict is detected, making the algorithm feasible for N up to around 9 or more. In practice, backtracking can solve N=8 (92 solutions) almost instantly, whereas brute force would have to sift through thousands of invalid boards.

Python Implementation:

Python3
Python3

. . . .

Explanation: We use cols, main_diag, and anti_diag sets to track attacks. The diagonal indices use row-col and row+col (which remain unique for each diagonal). At each row, only columns not in these sets are tried. This avoids scanning the entire row for conflicts. We modify the board in place and backtrack (undo) the changes after exploring each possibility.

Java Implementation:

Java
Java

. . . .

This backtracking approach is much more efficient than brute force, but it can still be exponential. It’s sufficient for N up to around 9 (which is within our constraints).

Approach 3: Bitmask Optimization

Idea:

We can further optimize the backtracking approach by using bit masks to represent the columns and diagonals. Bit operations allow us to combine and check conflicts in constant time, and even generate the next valid positions without looping over all columns. The idea is to use an integer’s bits as flags for occupied columns/diagonals: a 1 bit means a column or diagonal is under attack. For an N×N board, we can use an N-bit integer (or larger) for each of the three directions (columns, major diag, minor diag).

At each row, instead of checking each column one by one, we compute a bit mask of all available positions in that row as:

allowed = ~(cols_mask | main_diag_mask | anti_diag_mask) & ((1 << N) - 1)

Here, cols_mask has 1s where columns are occupied, main_diag_mask has 1s where a major diagonal is occupied, and anti_diag_mask for minor diagonals. By OR-ing these masks, we mark all squares that are under attack, then a bitwise NOT gives us 1s for all safe squares. We mask with (1<<N)-1 to ignore bits beyond our board size. Each set bit in allowed now represents a safe column in the current row where we can place a queen without conflict.

Instead of trying columns 0..N-1 in a loop, we can iterate over the set bits of allowed. We pick one set bit (which corresponds to a safe column) and place a queen there, then update the masks for the next row:

  • If we place a queen at column c (represented by bit position = 1 << c), we update:
    new_cols_mask = cols_mask | position
    new_main_diag_mask = (main_diag_mask | position) << 1 (shift left for next row’s diagonals)
    new_anti_diag_mask = (anti_diag_mask | position) >> 1 (shift right for next row)

Shifting the diagonal masks by 1 moves the attack one column to the left or right for the next row, simulating the diagonal coverage. This way, the masks stay aligned with the current row’s columns at each recursive step.

By using bit arithmetic, we skip over invalid positions efficiently and directly compute the next valid move, rather than checking each column one by one. This yields significant speedups, especially in low-level languages. It’s known to be one of the fastest methods for N-Queens, enabling solving larger boards (N=12, N=13, etc.) that would be very slow with naive backtracking.

Algorithm:

  1. Use three integer masks: cols, main_diag, anti_diag, initially all 0 (no attacks).
  2. At row r, compute allowed = ~(cols | main_diag | anti_diag) & ((1<<N) - 1). Bits set in allowed correspond to safe columns.
  3. While allowed is not 0:
    • Let p = allowed & -allowed pick the lowest-set bit in allowed (a column to try).
    • Set that bit (column) as occupied and place a queen: update cols, main_diag, anti_diag as described above.
    • Recurse to r+1 with the updated masks.
    • Backtrack: unset the chosen bit from allowed (do allowed &= allowed - 1 to remove the lowest-set bit) and continue to try the next position.
  4. Each time r == N (placed queens in all rows), record the board configuration. Use bit positions of queens to build the output strings.

This approach still uses recursion to explore different placements, but the operations per position are constant-time bit manipulations. Checking and setting attacks is O(1), and generating all valid positions is also O(1) for each row (since it’s just a few bit ops). The algorithm will examine fewer operations per node in the search tree compared to Approach 2.

Time Complexity:

  • O(N!) in the worst case (the search tree doesn’t change its asymptotic size), but the constant factors are greatly reduced. In practice, the bitmask method is the fastest approach for N-Queens on typical hardware. By eliminating loops and using fast bit operations, it can solve N=14 or N=15 in reasonable time in optimized languages. (For example, the number of solutions grows roughly as (0.143N)^N for large N, so this optimization is crucial for exploring those possibilities.)

Python Implementation:

Python3
Python3

. . . .

Explanation: Here cols_mask, main_mask, and anti_mask are integers whose binary representation show attacked positions for columns and diagonals. For instance, if cols_mask = 0b10010 for N=5, it means columns 1 and 4 are occupied/attacked. The expression allowed = ~(cols_mask | main_mask | anti_mask) & ((1<<N)-1) produces a bitstring of length N with 1s in safe spots. We then iterate through those 1 bits to try each possible queen placement. We use bit tricks (allowed & -allowed) to isolate the lowest-order 1 bit efficiently, place a queen there, and then update the masks for the next row by shifting the diagonal masks. The backtracking continues until all rows are filled.

Although Python can use this technique, the real benefit is seen in languages like C/C++ where bit operations are extremely fast and memory-efficient. This optimization, along with symmetry breaking and other tweaks, holds the current records for the largest solvable N in reasonable time.

Java Implementation:

Java
Java

. . . .

Additional Variations

  • Counting Solutions (N-Queens II): Instead of outputting all boards, a variant of the problem asks for just the number of distinct solutions for a given N. This can be implemented by the same backtracking algorithms above, just incrementing a counter instead of storing the boards. For example, for N = 8 (the classic eight-queens puzzle), the output would be 92 (there are 92 solutions in total). Counting is useful for larger N where listing every solution is impractical.

  • One Solution vs All Solutions: Some problems only require finding one valid arrangement (if it exists) instead of all. In that case, the backtracking can return as soon as it finds the first solution, which can save time. (For N-Queens, a solution always exists for N ≥ 4 .)

  • Symmetry Optimization: For counting solutions, one can optimize by considering board symmetries. For example, half of the solutions for the 8-queens are rotations/reflections of others. By counting only “fundamental” solutions and multiplying by symmetry, one can reduce search. This is a more advanced optimization and usually not needed for N ≤ 9, but it’s useful for larger N to avoid repeating symmetric configurations.

  • N-Queens Completion: A variant puzzle is the N-Queens completion problem: some queens are already placed on the board and you must place the remaining queens so that none conflict. This is a harder constraint satisfaction problem but can be solved with the same backtracking approach by starting from the given configuration (or formulated as an Exact Cover problem as described below).

  • Other Board Sizes or Pieces: The queen’s attacking movements combine those of rooks and bishops. Simpler variants include placing N rooks on an N×N board (trivial – one per row/col, no diagonal concerns) or placing N bishops on a triangular board (also has known patterns). Another related puzzle is the Knight’s Tour, which is a path-finding problem for a knight piece covering all squares; it also uses backtracking but under different movement rules.

Complexity Analysis

The N-Queens problem has a combinatorial explosive search space. All known methods have exponential time complexity in the worst case because essentially you are exploring permutations of placements. Here’s a summary of the approaches and their complexities:

  • Brute Force Permutations (Approach 1): O(N!) time, and also O(N) work per check. This approach generates every possible arrangement of queens in rows/columns (N!) and then checks diagonals. It is the least efficient, doing a lot of redundant work.

  • Backtracking (Approach 2): O(N!) in the worst case, but it prunes away most invalid states early. The actual number of nodes explored in the search tree is much smaller than N! for feasible N. This approach can typically solve up to around N=10 or N=12 in reasonable time because the branching factor decreases as soon as conflicts arise. Space complexity is O(N) for the recursion depth and tracking sets.

  • Bitmask Backtracking (Approach 3): O(N!) in the worst case as well, but it runs significantly faster due to using constant-time operations for conflict checks and using integers to compactly represent state. In terms of auxiliary space, it uses O(N) for recursion depth and a few integers for masks. This is the most optimized brute-force search approach and can handle the highest N among the three.

In practice, Approach 3 outperforms Approach 2, which in turn outperforms Approach 1, even though all are exponential. For example, for N = 9 (with 352 solutions), the brute force might try hundreds of thousands of boards, whereas backtracking will efficiently navigate to those 352 solutions without enumerating all possibilities.

It’s known that for large N, the number of solutions grows roughly as (0.143\,n)^n, an estimate proved by researchers using probabilistic methods. This super-exponential growth means that N-Queens is intractable to solve by brute force for very large N. Indeed, even counting the solutions (not to mention listing them) becomes extremely hard as N grows (exact counts are known only up to N=27 so far ). The N-Queens problem is often cited as an example of an NP-hard search problem – while a solution can be verified quickly, finding one (or all) from scratch requires exploring an exponential number of possibilities in the worst case.

Related Problems

  • Exact Cover and Algorithm X: The N-Queens can be modeled as an Exact Cover problem . Each queen placement constraint (row, column, diag) can be seen as covering a set of requirements exactly once. This formulation allows using Knuth’s Algorithm X (with Dancing Links) to solve N-Queens very efficiently by systematically searching through combinatorial possibilities with clever pruning. Algorithm X is more commonly known for solving Sudoku and polyomino tiling problems, but it can be applied to N-Queens as well. This is an advanced technique beyond typical backtracking, but it’s an elegant alternative approach.

  • Sudoku Solver: Like N-Queens, Sudoku is another puzzle that can be solved via backtracking (or exact cover). Each empty cell placement is a choice to explore, and constraints (no repeat in row/col/3x3 box) guide the pruning. The state-space and constraint propagation are analogous to placing queens with row/col/diag restrictions.

  • Graph Coloring: Placing N queens on a board can be thought of as coloring the N rows with N colors (columns) such that certain pairs cannot have the same color (diagonal conflicts). In general, graph coloring problems are solved by backtracking as well. A related problem is coloring a map with minimal colors such that no adjacent regions share a color – it’s conceptually similar in terms of constraint satisfaction.

  • Hamiltonian Path (Knight’s Tour): The knight’s tour problem (find a path that visits every square exactly once using knight moves) is another classic backtracking challenge. It doesn’t involve “non-attacking” pieces, but it requires exploring moves on a chessboard under constraints (each move must go to an unvisited square). The search and backtracking pattern is similar, though the state representation and constraints differ.

  • Eight Queens Puzzle (Historical): The 8-Queens problem (N=8) is a famous special case, first published in 1848. It has 92 distinct solutions (and 12 unique solutions if you discount rotations/reflections). This puzzle has inspired many early examples in algorithm design and is a specific instance of the N-Queens. Many of the techniques above (backtracking, bitmask, etc.) were historically devised to solve the 8-queens puzzle efficiently, and then extended to generalized N. It remains a staple problem to illustrate backtracking and optimization in computer science education.

TAGS
leetcode
CONTRIBUTOR
Design Gurus Team
-

GET YOUR FREE

Coding Questions Catalog

Design Gurus Newsletter - Latest from our Blog
Boost your coding skills with our essential coding questions catalog.
Take a step towards a better tech career now!
Explore Answers
Is Zscaler a good employer?
Interleaving system design study with coding practice for synergy
560. Subarray Sum Equals K - Detailed Explanation
Learn to solve Leetcode 560. Subarray Sum Equals K with multiple approaches.
Related Courses
Image
Grokking the Coding Interview: Patterns for Coding Questions
Grokking the Coding Interview Patterns in Java, Python, JS, C++, C#, and Go. The most comprehensive course with 476 Lessons.
Image
Grokking Modern AI Fundamentals
Master the fundamentals of AI today to lead the tech revolution of tomorrow.
Image
Grokking Data Structures & Algorithms for Coding Interviews
Unlock Coding Interview Success: Dive Deep into Data Structures and Algorithms.
Image
One-Stop Portal For Tech Interviews.
Copyright © 2025 Design Gurus, LLC. All rights reserved.
;