Completion requirements
View
Once Shor's algorithm is possible, any cryptographic problem equivalent to an order finding problem is immediately vulnerable to Shor's approach. This video suggests ways of breaking symmetric cryptosystems using quantum period finding (or order finding).
Source: IACR, https://www.youtube.com/watch?v=z7R6BFAU6cA This work is licensed under a Creative Commons Attribution 3.0 License.