References: Can Quantum Computers Break Encryption?
-
Shor's algorithm - Wikipedia - Details the quantum algorithm for integer factoring and discrete logarithms that theoretically threatens RSA and ECC, the central cryptographic threat examined in this chapter.
-
Post-quantum cryptography - Wikipedia - Covers lattice-based, hash-based, and code-based cryptographic schemes resistant to quantum attacks, directly relevant to this chapter's argument that the encryption vulnerability window is already closing.
-
RSA (cryptosystem) - Wikipedia - Explains the mathematical foundations of RSA encryption, the trapdoor function based on integer factoring, and key sizes, providing essential context for understanding the quantum threat analyzed in this chapter.
-
Post-Quantum Cryptography (2009) - Daniel J. Bernstein, Johannes Buchmann, and Erik Dahmen, Editors - Springer - Foundational text on cryptographic algorithms designed to resist quantum attacks, supporting this chapter's discussion of why post-quantum alternatives already exist.
-
Quantum Computing: An Applied Approach (2nd Edition, 2021) - Jack D. Hidary - Springer - Includes detailed resource estimates for running Shor's algorithm at cryptographically relevant scales, supporting this chapter's analysis of the 4-20 million physical qubit requirement.
-
NIST Post-Quantum Cryptography Standardization - National Institute of Standards and Technology - Official page for NIST's post-quantum cryptography standards including CRYSTALS-Kyber and CRYSTALS-Dilithium, the standardized algorithms this chapter identifies as closing the vulnerability window.
-
How to Factor 2048 Bit RSA Integers in 8 Hours Using 20 Million Noisy Qubits - Gidney and Ekera, arXiv (2019) - Provides the authoritative resource estimate for quantum cryptanalysis of RSA-2048, the key figure of 20 million physical qubits cited throughout this chapter.
-
Quantum Threat Timeline Report - Global Risk Institute (2023) - Expert survey on when quantum computers might threaten current cryptographic systems, providing empirical data on consensus timelines relevant to this chapter's threat assessment.
-
Migration to Post-Quantum Cryptography - Cybersecurity and Infrastructure Security Agency (CISA) - U.S. government guidance on transitioning to quantum-resistant cryptography, demonstrating that the policy response to the quantum threat is well underway as this chapter argues.
-
Harvest Now, Decrypt Later: A Survey of Threats and Countermeasures - Mosca et al., arXiv (2022) - Analyzes the "harvest now, decrypt later" attack scenario and migration timelines, directly relevant to this chapter's evaluation of whether this threat justifies quantum computing urgency.