SlideShare a Scribd company logo
Time
Crypto-safe Zone X
Today's crypto process:
Security based on current technology
First quantum
computer
available
No hardware available executing the Shor-Algorithm
Future crypto process:
Quantum Computing possible,
Quantum Safe procedures available
Integration of the
Shor-Algorithm
on a quantum
computer
Crypto-compromised Zone
Here?
3
Shor-Algorithm
Peter W. Shor
(1994)
or already here?
Where do we stand today?
4
1 2
1. Alarm Orange: First Quantum Computer available (Government, Private Sector or Hackers etc.)
2. Alarm Red: First Quantum Computer integrated with the Shor-Algorithm
3. Integration time frame/ full functioning, commercially and technical viable system for cracking encryption (is generally seen as a very
short time frame)
4. X = point in time, from where the crypto systems should be "Quantum Safe"

More Related Content

PDF
Sicherheit welche gefahren durch drohnen drohen golem.de
PDF
Intensity levels social engineering engagement framework (seef) first cut d...
PDF
Artikel About Drones and Swisscom Innovation Startup Process
PDF
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
PDF
The real- wolfpack story 2
PDF
Press release 01_september_2016_social_engineering_engagement_framework_seef_...
PDF
Business shoes looking inconspicuous but still enough power to climb a wall o...
PDF
Press release social engineering engagement framework seef social engineering...
Sicherheit welche gefahren durch drohnen drohen golem.de
Intensity levels social engineering engagement framework (seef) first cut d...
Artikel About Drones and Swisscom Innovation Startup Process
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
The real- wolfpack story 2
Press release 01_september_2016_social_engineering_engagement_framework_seef_...
Business shoes looking inconspicuous but still enough power to climb a wall o...
Press release social engineering engagement framework seef social engineering...

More from Reputelligence (20)

PDF
Press release social engineering engagement framework seef social engineering...
PPTX
Video integrated teaser awareness campaign seef
PDF
Teaser SEEF hack in Paris presentation
PDF
Sneak peek preview area 41 conference Zürich 10. - 11- June 2016
PPTX
Seef ebook promotion 18 dez-2015 dcb
PDF
Reputelligence lifecycle v3 Volkswagen "defeat device"
PDF
Reputelligence Lifecycle v3 Volkswagen example
PDF
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?
PDF
Reputelligence power point template lifecycle v3
PDF
SEEF Framework Intensity Levels (English)
PDF
Security agility- dynamic policy creation and rollout
PDF
Hack back series data is an asset - registration strategies v0.1
PDF
Hack back series how to spot fake linked in profiles - a way to figure out f...
PDF
Sgs cloud 5 mar-2015 bsl dominique c. brack csach - public version
PDF
Clinton article
PDF
Dumb and dumber or fast and furious
PPTX
New microsoft power point präsentation
PDF
Management wisdom series leader and team
PDF
Annoying practices series stupid math quiz etc v0.2
PDF
Genuis quizzle 6
Press release social engineering engagement framework seef social engineering...
Video integrated teaser awareness campaign seef
Teaser SEEF hack in Paris presentation
Sneak peek preview area 41 conference Zürich 10. - 11- June 2016
Seef ebook promotion 18 dez-2015 dcb
Reputelligence lifecycle v3 Volkswagen "defeat device"
Reputelligence Lifecycle v3 Volkswagen example
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?
Reputelligence power point template lifecycle v3
SEEF Framework Intensity Levels (English)
Security agility- dynamic policy creation and rollout
Hack back series data is an asset - registration strategies v0.1
Hack back series how to spot fake linked in profiles - a way to figure out f...
Sgs cloud 5 mar-2015 bsl dominique c. brack csach - public version
Clinton article
Dumb and dumber or fast and furious
New microsoft power point präsentation
Management wisdom series leader and team
Annoying practices series stupid math quiz etc v0.2
Genuis quizzle 6
Ad

Recently uploaded (20)

PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PDF
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PPTX
Internet___Basics___Styled_ presentation
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PPTX
E -tech empowerment technologies PowerPoint
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PDF
Sims 4 Historia para lo sims 4 para jugar
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PPTX
Mathew Digital SEO Checklist Guidlines 2025
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PPTX
SAP Ariba Sourcing PPT for learning material
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PDF
WebRTC in SignalWire - troubleshooting media negotiation
DOCX
Unit-3 cyber security network security of internet system
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
An introduction to the IFRS (ISSB) Stndards.pdf
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
Module 1 - Cyber Law and Ethics 101.pptx
Internet___Basics___Styled_ presentation
Job_Card_System_Styled_lorem_ipsum_.pptx
E -tech empowerment technologies PowerPoint
Tenda Login Guide: Access Your Router in 5 Easy Steps
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
Sims 4 Historia para lo sims 4 para jugar
PptxGenJS_Demo_Chart_20250317130215833.pptx
522797556-Unit-2-Temperature-measurement-1-1.pptx
Unit-1 introduction to cyber security discuss about how to secure a system
Mathew Digital SEO Checklist Guidlines 2025
introduction about ICD -10 & ICD-11 ppt.pptx
SAP Ariba Sourcing PPT for learning material
Cloud-Scale Log Monitoring _ Datadog.pdf
WebRTC in SignalWire - troubleshooting media negotiation
Unit-3 cyber security network security of internet system
Introuction about ICD -10 and ICD-11 PPT.pptx
Ad

Quantum Computing Shor algorithm crypto grafic IoT risk management

  • 1. Time Crypto-safe Zone X Today's crypto process: Security based on current technology First quantum computer available No hardware available executing the Shor-Algorithm Future crypto process: Quantum Computing possible, Quantum Safe procedures available Integration of the Shor-Algorithm on a quantum computer Crypto-compromised Zone Here? 3 Shor-Algorithm Peter W. Shor (1994) or already here? Where do we stand today? 4 1 2 1. Alarm Orange: First Quantum Computer available (Government, Private Sector or Hackers etc.) 2. Alarm Red: First Quantum Computer integrated with the Shor-Algorithm 3. Integration time frame/ full functioning, commercially and technical viable system for cracking encryption (is generally seen as a very short time frame) 4. X = point in time, from where the crypto systems should be "Quantum Safe"