Time
Crypto-safe Zone X
Today's crypto process:
Security based on current technology
First quantum
computer
available
No hardware available executing the Shor-Algorithm
Future crypto process:
Quantum Computing possible,
Quantum Safe procedures available
Integration of the
Shor-Algorithm
on a quantum
computer
Crypto-compromised Zone
Here?
3
Shor-Algorithm
Peter W. Shor
(1994)
or already here?
Where do we stand today?
4
1 2
1. Alarm Orange: First Quantum Computer available (Government, Private Sector or Hackers etc.)
2. Alarm Red: First Quantum Computer integrated with the Shor-Algorithm
3. Integration time frame/ full functioning, commercially and technical viable system for cracking encryption (is generally seen as a very
short time frame)
4. X = point in time, from where the crypto systems should be "Quantum Safe"

Quantum Computing Shor algorithm crypto grafic IoT risk management

  • 1.
    Time Crypto-safe Zone X Today'scrypto process: Security based on current technology First quantum computer available No hardware available executing the Shor-Algorithm Future crypto process: Quantum Computing possible, Quantum Safe procedures available Integration of the Shor-Algorithm on a quantum computer Crypto-compromised Zone Here? 3 Shor-Algorithm Peter W. Shor (1994) or already here? Where do we stand today? 4 1 2 1. Alarm Orange: First Quantum Computer available (Government, Private Sector or Hackers etc.) 2. Alarm Red: First Quantum Computer integrated with the Shor-Algorithm 3. Integration time frame/ full functioning, commercially and technical viable system for cracking encryption (is generally seen as a very short time frame) 4. X = point in time, from where the crypto systems should be "Quantum Safe"