Breaking RSA Using Shor's Algorithm
Cryptographic implications of our construction
On the importance of complexity estimates
It is important to estimate the complexity of attacking widely deployed asymmetric cryptographic schemes using future large-scale quantum computers. Such estimates enable informed decisions to be made on when to mandate migration from existing schemes to post-quantum secure schemes.
For cryptographic schemes that are used to protect confidentiality, such as encryption and key agreement schemes, a sufficiently long period must elapse inbetween the point in time when the scheme ceases to be used, and the point in time when the scheme is projected to become susceptible to practical attacks. This is necessary so as to ensure that the information that has been afforded protection with the scheme is no longer sensitive once the scheme becomes susceptible to practical attacks. This is because one must assume that encrypted information may be recorded and archived for decryption in the future.
If the information you seek to protect is to remain confidential for 25 years, you must hence
stop using asymmetric schemes such as RSA and Diffie-Hellman at least 25 years before quantum
computers capable of breaking these schemes become available to the adversary. For cryptographic
schemes that are used to protect authenticity, or for authentication, such as signature schemes, it
suffices to migrate to post-quantum secure schemes only right before the schemes become susceptible to practical attacks. This is an important distinction.