All Post-Quantum, PQC Posts
-
AI Security
Why AI Cannot Break Modern Encryption
AI cannot break modern encryption. The reasons are fundamental: Mathematical Hardness, Cryptographic Design, Empirical Track Record, Quantum Contrast, Expert Consensus.
Read More » -
Post-Quantum, PQC, Quantum Security
What It Will Actually Cost to Break RSA-2048: Energy, Hardware, People, and the Bill Nobody’s Talking About
Breaking one RSA-2048 key on a CRQC could cost $2–5 million when you add up energy, amortization, personnel, and facilities All three approaches share silicon's core advantages: compatibility with semiconductor industry infrastructure, small qubit footprint (~50 nm), and long coherence times enabled by isotopic purification of ²⁸Si. But they diverge sharply on how qubits are defined, controlled, and manufactured. Approach 1: Atomically Precise Donor Qubits…
Read More » -
Q-Day
Q-Day Revisited – RSA-2048 Broken by 2030: Detailed Analysis
It’s time to mark a controversial date on the calendar: 2030 is the year RSA-2048 will be broken by a quantum computer. That’s my bold prediction, and I don’t make it lightly. In cybersecurity circles, the countdown to “Q-Day” or Y2Q (the day a cryptographically relevant quantum computer cracks our public-key encryption) has been a topic of intense debate. Lately, the noise has become deafening:…
Read More » -
Post-Quantum, PQC, Quantum Security
Cryptographic Inventory Vendors and Methodologies
Achieving a comprehensive cryptographic inventory often requires combining multiple tools and methodologies. Each solution above has blind spots: one might excel at catching code-level issues but miss network usage, another might see network traffic but miss dormant code, etc. Organizations starting a crypto inventory (especially as part of PQC readiness) should evaluate these tools in terms of their environment: for example, pairing a passive network…
Read More » -
Q-Day
What Is Q-Day (Y2Q)?
Q-Day, sometimes called “Y2Q” or the “Quantum Apocalypse”, refers to the future moment when a quantum computer becomes powerful enough to break modern encryption algorithms. In other words, it’s the day a cryptographically relevant quantum computer (CRQC) can crack the public-key cryptography (like RSA or ECC) that underpins our digital security. The term “Y2Q” stands for “years to quantum,” an explicit nod to the Y2K…
Read More » -
Post-Quantum, PQC, Quantum Security
Quantum Readiness Assessment (QRA)
A Quantum Readiness Assessment (QRA) is an in-depth review of an organization’s preparedness for the advent of quantum computing - especially its ability to withstand or adapt to the "quantum threat" posed by quantum computers that could render current cryptography obsolete. In practical terms, a QRA examines how an organization’s systems, data, and processes would hold up if cryptographically relevant quantum computers were available today.…
Read More » -
Post-Quantum, PQC, Quantum Security
The Enormous Energy Cost of Breaking RSA‑2048 with Quantum Computers
The energy requirements for breaking RSA-2048 with a quantum computer underscore how different the post-quantum threat is from conventional hacking. It’s not just about qubits and math; it’s about megawatts, cooling systems, and power grids. Today, that reality means only the most potent actors would even contemplate such attacks, and even then only for the crown jewels of intelligence. Tomorrow, advances in both quantum engineering…
Read More » -
Post-Quantum, PQC, Quantum Security
Breaking RSA Encryption: Quantum Hype Meets Reality (2022-2025)
To put it plainly, if you encrypted a message with an RSA-2048 public key today, no one on Earth knows how to factor it with currently available technology, even if they threw every quantum computer and supercomputer we have at the task. That may change in the future – perhaps in a decade or even less if quantum tech continues its exponential development. Or perhaps…
Read More »