Skip to content

References: Can Quantum Computers Break Encryption?

  1. Shor's algorithm - Wikipedia - Details the quantum algorithm for integer factoring and discrete logarithms that theoretically threatens RSA and ECC, the central cryptographic threat examined in this chapter.

  2. Post-quantum cryptography - Wikipedia - Covers lattice-based, hash-based, and code-based cryptographic schemes resistant to quantum attacks, directly relevant to this chapter's argument that the encryption vulnerability window is already closing.

  3. RSA (cryptosystem) - Wikipedia - Explains the mathematical foundations of RSA encryption, the trapdoor function based on integer factoring, and key sizes, providing essential context for understanding the quantum threat analyzed in this chapter.

  4. Post-Quantum Cryptography (2009) - Daniel J. Bernstein, Johannes Buchmann, and Erik Dahmen, Editors - Springer - Foundational text on cryptographic algorithms designed to resist quantum attacks, supporting this chapter's discussion of why post-quantum alternatives already exist.

  5. Quantum Computing: An Applied Approach (2nd Edition, 2021) - Jack D. Hidary - Springer - Includes detailed resource estimates for running Shor's algorithm at cryptographically relevant scales, supporting this chapter's analysis of the 4-20 million physical qubit requirement.

  6. NIST Post-Quantum Cryptography Standardization - National Institute of Standards and Technology - Official page for NIST's post-quantum cryptography standards including CRYSTALS-Kyber and CRYSTALS-Dilithium, the standardized algorithms this chapter identifies as closing the vulnerability window.

  7. How to Factor 2048 Bit RSA Integers in 8 Hours Using 20 Million Noisy Qubits - Gidney and Ekera, arXiv (2019) - Provides the authoritative resource estimate for quantum cryptanalysis of RSA-2048, the key figure of 20 million physical qubits cited throughout this chapter.

  8. Quantum Threat Timeline Report - Global Risk Institute (2023) - Expert survey on when quantum computers might threaten current cryptographic systems, providing empirical data on consensus timelines relevant to this chapter's threat assessment.

  9. Migration to Post-Quantum Cryptography - Cybersecurity and Infrastructure Security Agency (CISA) - U.S. government guidance on transitioning to quantum-resistant cryptography, demonstrating that the policy response to the quantum threat is well underway as this chapter argues.

  10. Harvest Now, Decrypt Later: A Survey of Threats and Countermeasures - Mosca et al., arXiv (2022) - Analyzes the "harvest now, decrypt later" attack scenario and migration timelines, directly relevant to this chapter's evaluation of whether this threat justifies quantum computing urgency.