Shor's algorithm  |  Grover's algorithm  |  RSA • ECC • AES

Quantum Threat Simulator

Simulate how quantum computers running Shor's and Grover's algorithms would affect the security of RSA, ECC and AES encryption. Visualise the quantum threat timeline.

Simulation Results

Explanation

This simulator estimates the time to break encryption using Shor's algorithm on a quantum computer. Based on research from Google Quantum AI and NIST:

  • RSA-2048: ~20M qubits to break in <1 week
  • ECC-256: ~7.5K qubits to break in <1 hour
Learn More (NIST)

Quantum Threat Simulator

Simulate quantum attacks, estimate break times, and plan your post-quantum migration

The Quantum Threat is Real

Large-scale fault-tolerant quantum computers will break today’s public-key cryptography using Shor’s algorithm (for RSA/ECC) and Grover’s algorithm (for symmetric crypto and hashes).

Q-Day — the day a cryptographically relevant quantum computer (CRQC) exists — is approaching faster than expected. Recent breakthroughs in error correction and qubit scaling suggest Q-Day could arrive by 2030–2035.

Harvest Now, Decrypt Later (HNDL): Adversaries are already collecting encrypted data to decrypt later with quantum computers.

Quantum Attack Models

Algorithm Target Classical Cost Quantum Cost Impact
Shor's RSA, ECC, DH ~2128 (factoring) ~29 qubits, ~1 hour Breaks all asymmetric crypto
Grover's AES, SHA-256 2256 search 2128 search Halves key strength

Quantum Computer Projections (2025–2040)

2025
~1,000 noisy qubits
2030
~10,000 logical qubits
2033
Q-Day: RSA-2048 broken
2035
AES-128 vulnerable
2040
Full symmetric break

NSA/CISA Recommendation: Migrate to post-quantum cryptography by 2030 for data with 10+ year confidentiality.

Break Time Estimator

Use our interactive simulator to estimate how long your current crypto will survive:

Algorithm Key Size Break Time (2033 CRQC) Recommendation
RSA 2048-bit < 1 hour URGENT: Migrate
ECC 256-bit < 1 day URGENT: Migrate
AES 128-bit ~10 years Upgrade to AES-256
SHA-256 ~2128 ops Use SHA-384/512

Migration Readiness Checklist

  1. Inventory: List all cryptographic assets (TLS, VPN, code signing)
  2. Prioritize: Focus on long-lived data (certificates, firmware)
  3. Hybrid Mode: Deploy ECDSA + ML-DSA and X25519 + ML-KEM
  4. Test: Use liboqs, OpenSSL 3.0+
  5. Monitor: Track quantum progress via GRI Quantum Threat Timeline

Quantum Threat Simulator: Live Tool

Launch the Quantum Threat Simulator

Enter your crypto parameters and see real-time risk assessment

Input: RSA-2048, 10-year data
Output: CRITICAL: Will be broken in 2033
Recommendation: Migrate to ML-DSA-65 + ML-KEM-768

Simulator Features:

  • Real-time Q-Day countdown
  • Break time calculator (Shor/Grover)
  • PQC readiness score
  • Custom migration timeline
  • Exportable risk report

PQC Migration Roadmap

Phase Timeline Action
1. Awareness 2025 Train teams, inventory crypto
2. Hybrid 2026–2028 Deploy ECC + ML-DSA/KEM
3. PQC-Only 2029–2033 Phase out classical algorithms
4. Quantum-Safe 2035+ Full post-quantum stack

Standards & Resources

  • IETF: PQUIP Working Group
  • ETSI: Quantum-Safe Cryptography Specifications
  • OpenQuantumSafe: liboqs
  • Cloudflare CIRCL: Go PQC Library

Conclusion

The quantum threat is not science fiction — it’s a when, not if. With Q-Day projected within 8–10 years, organizations must act now to protect data that needs to remain confidential beyond 2033.

Use the Quantum Threat Simulator to:

  • Assess your current risk
  • Plan migration timelines
  • Justify PQC budgets
  • Stay ahead of the quantum curve

Start your quantum risk assessment today — the clock is ticking.

References & Further Reading

  1. NIST IR 8545: Report on Post-Quantum Cryptography Migration
  2. Mosca, M. (2023). "Cybersecurity in an Era with Quantum Computers"
  3. Global Risk Institute: Quantum Threat Timeline Report 2025

Don’t wait for Q-Day. Simulate the threat. Secure the future.

Quantum-ready. One simulation at a time.