A Cryptography Engineer's Perspective on Quantum Computing Timelines
7 hours ago
- #Cybersecurity
- #Post-Quantum Cryptography
- #Quantum Computing
- Google and Oratomic papers show faster quantum attacks on 256-bit elliptic curves, reducing required qubits and gates.
- Experts like Heather Adkins, Sophie Schmieg, and Scott Aaronson warn of urgent quantum threats, with timelines as close as 2029.
- Migration to post-quantum cryptography (e.g., ML-DSA, ML-KEM) is critical, prioritizing pure solutions over hybrids to avoid delays.
- Symmetric encryption with 128-bit keys remains secure against Grover's algorithm, but asymmetric cryptography needs immediate upgrades.
- Legacy systems like TEEs and file encryption require warnings or errors for non-PQ methods due to store-now-decrypt-later risks.