Cybersecurity B-W…Ever since Peter Shor showed how a quantum computer could factorize large numbers with exponential speedup, it has been known that quantum computers could become a threat to most cryptographic algorithms currently in use…

…Affected crypto algorithms include, among others, the well-known encryption schemes RSA and ECIES, the digital signature algorithms DSA and ECDSA, and the Diffie-Hellman key agreement…

…In other words: Virtually every protocol in current use that involves a certificate with a public key of some kind is likely to be broken by a quantum computer in the future…

Editor’s Note: Italicized statements are directly quoted from the source. Content may have been edited for style and clarity. Read the full article at the source by clicking on the text or image.