Data At Risk!
Reduction in Key Space & Time-to-Break Encryption
Advances in attack vectors (e.g. side-channel attacks)
Advances in computing power
>Massively parallel
>Non-universal quantum computers
Quantum algorithms
>Shor’s algorithm in asymmetric cryptography
>Grover’s algorithm in symmetric cryptography
Poor implementations (e.g. leak information)
Use of insecure protocols (e.g. WEP, SSL)
Use of broken/insecure algorithms
Quantum insecure key lengths:
e.g. AES-128 bit key, RSA-1024, 2048, 4096... bit keys, 3TDEA-168 bit key
--> Quantum computing will break today's safe algorithms with many standardly used key lengths.