Post-Quantum Panic: When Will the Cracking Begin, and Can We Detect It?
This talk analyzes the threat posed by quantum computing to current cryptographic standards, specifically focusing on the vulnerability of RSA and ECC to Shor's algorithm and the impact of Grover's algorithm on symmetric encryption. It evaluates the evolving qubit requirements for breaking these algorithms, highlighting how recent optimizations have significantly reduced the estimated resources needed for such attacks. The presentation emphasizes the urgent need for organizations to transition to post-quantum cryptographic standards and adopt crypto-agility to mitigate future risks.
The Quantum Clock is Ticking: Why Your RSA Keys Are Already Dead
TLDR: Quantum computing is no longer a theoretical threat, as recent research shows that the resource requirements for breaking RSA-2048 have dropped from billions of qubits to under 1,400 logical qubits. This shift means that data harvested today with the intent to decrypt later is at immediate risk. Security teams must prioritize crypto-agility and transition to NIST-approved post-quantum algorithms like ML-KEM before the 2030 deadline.
Most security professionals treat quantum computing like a distant storm, something to worry about in the next decade or two. That mindset is a liability. The math behind Shor’s algorithm has been public for thirty years, but the engineering reality has finally caught up. We are no longer talking about needing a billion physical qubits to break RSA-2048. Thanks to massive optimizations in modular exponentiation and error correction, the target has moved to a much more achievable threshold.
The Shrinking Resource Gap
The most dangerous misconception in our field is that quantum attacks require a massive, monolithic machine that will suddenly appear on the scene. In reality, the threat is incremental. Early estimates for breaking RSA-2048 were astronomical, but recent papers, such as those by Gidney and Ekerå, have demonstrated that we can achieve the same result with significantly fewer resources.
When you look at the math, the bottleneck isn't just the number of qubits; it is the gate count and the error rate. By using techniques like windowed arithmetic and optimized error correction, researchers have shown that we can reduce the logical qubit count to roughly 1,400. If you are a pentester or a researcher, you need to understand that this isn't just about the "big" machine. It is about the efficiency of the algorithm. Every time a new paper drops that optimizes gate counts, the "Q-Day" timeline shifts closer to the present.
Why Your Data Is Already Compromised
If you are working on an engagement, stop thinking about active decryption. The real-world risk is "harvest now, decrypt later." If an adversary captures encrypted traffic today, they do not need a quantum computer to read it right now. They just need to store it. Once a sufficiently powerful quantum computer comes online, that data becomes transparent.
For anyone managing infrastructure, this makes OWASP A02:2021-Cryptographic Failures the most critical item on your backlog. If your organization relies on long-lived secrets or data that must remain confidential for more than five years, you are already behind. You cannot patch this with a simple configuration change. You need to audit your entire cryptographic stack.
The Crypto-Agility Mandate
Transitioning to post-quantum cryptography (PQC) is not a "set it and forget it" task. It requires crypto-agility—the ability to swap out cryptographic primitives without re-engineering your entire application. If your code is hardcoded to use RSA or ECC, you are building technical debt that will be impossible to pay off when the transition becomes mandatory.
Start by identifying where you are using AES-128. While AES is generally more resilient to quantum attacks than public-key systems, Grover’s algorithm effectively halves the security strength of symmetric keys. If you are using AES-128, you are effectively providing 64 bits of security against a quantum adversary. That is not enough. Move your symmetric encryption to AES-256 immediately.
For public-key infrastructure, the NIST Post-Quantum Cryptography Standardization process has already yielded winners. We have ML-DSA for digital signatures and ML-KEM for key encapsulation. These are not just academic exercises; they are the new baseline.
What You Should Do Today
If you are running an assessment, look for hardcoded key lengths and outdated protocols. If you see a server still supporting TLS 1.2 with weak cipher suites, flag it. If you see SSH keys using RSA-1024 or even RSA-2048, push for a migration to Ed25519 or, better yet, start testing PQC-ready implementations.
The goal is to stop the bleeding. We have a five-year window before the 2030 deadline set by NIST for the deprecation of legacy algorithms. That sounds like a long time, but if you have ever tried to perform a global key rotation across a distributed enterprise, you know that five years is barely enough time to get the inventory list finished.
Stop waiting for the "big" quantum computer to appear in the news. The research is already here, the optimizations are already public, and the clock is already running. If you aren't auditing your crypto-agility today, you are already losing the race.
Vulnerability Classes
Attack Techniques
OWASP Categories
Up Next From This Conference
Similar Talks

Inside the FBI's Secret Encrypted Phone Company 'Anom'

Unmasking the Snitch Puck: The Creepy IoT Surveillance Tech in the School Bathroom


