{"id":32023,"date":"2019-11-26T13:30:00","date_gmt":"2019-11-26T13:30:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/has-the-quantum-crypto-break-already-happened\/"},"modified":"2019-11-26T13:30:00","modified_gmt":"2019-11-26T13:30:00","slug":"has-the-quantum-crypto-break-already-happened","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/has-the-quantum-crypto-break-already-happened\/","title":{"rendered":"Has the quantum crypto break already happened?"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2019\/11\/cso_nw_blocks_of_data_multicolored_cubes_encryption_mining_rollout_by_matejmo_gettyimages-913069604_2400x1600-100816411-large.3x2.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<div class=\"teaser\">\n<p>I believe that quantum computers are probably being used now to break today\u2019s encryption secrets. I\u2019m not normally a conspiracy theorist, so let me tell you why I think this is true.<\/p>\n<p>Ever since Peter Shor released a quantum algorithm in 1994 that proved quantum computers with enough quantum bits (qubits) could easily break most popular public key cryptography (e.g., RSA, Diffie-Hellman, Elliptic Curve), we\u2019ve all been waiting for the day when that occurs. It\u2019s generally known as the \u201cquantum crypto break.\u201d<\/p>\n<p>Quantum computing experts didn\u2019t know when it might occur, but they felt that it was around 10 years away. Today, more people think that the quantum crypto break is less than 10 years away, and perhaps only a few years away. Indeed, the most knowledgeable government agencies that deal with setting national cryptography standards believe that now is the time to start preparing for the quantum crypto break. They haven\u2019t shared that the quantum crypto break has happened or when it will occur, only that it\u2019s close enough that we need to start moving to quantum-resistant cryptography.<\/p>\n<p>When I started writing my book, <em><a href=\"https:\/\/www.amazon.com\/Cryptography-Apocalypse-Preparing-Quantum-Computing\/dp\/1119618193\" rel=\"noopener nofollow noreferrer\" target=\"_blank\">Cryptography Apocalypse<\/a><\/em>, regarding quantum computers and how to prepare for the coming quantum crypto break, I believed it was<\/p>\n<\/div>\n<div class=\"premium\">\n<p>I believe that quantum computers are probably being used now to break today\u2019s encryption secrets. I\u2019m not normally a conspiracy theorist, so let me tell you why I think this is true.<\/p>\n<p>Ever since Peter Shor released a quantum algorithm in 1994 that proved quantum computers with enough quantum bits (qubits) could easily break most popular public key cryptography (e.g., RSA, Diffie-Hellman, Elliptic Curve), we\u2019ve all been waiting for the day when that occurs. It\u2019s generally known as the \u201cquantum crypto break.\u201d<\/p>\n<p>Quantum computing experts didn\u2019t know when it might occur, but they felt that it was around 10 years away. Today, more people think that the quantum crypto break is less than 10 years away, and perhaps only a few years away. Indeed, the most knowledgeable government agencies that deal with setting national cryptography standards believe that now is the time to start preparing for the quantum crypto break. They haven\u2019t shared that the quantum crypto break has happened or when it will occur, only that it\u2019s close enough that we need to start moving to quantum-resistant cryptography.<\/p>\n<p>When I started writing my book, <em><a href=\"https:\/\/www.amazon.com\/Cryptography-Apocalypse-Preparing-Quantum-Computing\/dp\/1119618193\" rel=\"noopener nofollow noreferrer\" target=\"_blank\">Cryptography Apocalypse<\/a><\/em>, regarding quantum computers and how to prepare for the coming quantum crypto break, I believed it was only a few years away. By the time I finished writing it six months later, I started to think that the quantum crypto break has likely happened.<\/p>\n<h2>What needs to happen for the quantum crypto break to occur<\/h2>\n<p>For the quantum crypto break to occur, four things need to happen. At least three have happened and only the timing of the last one is being questioned.<\/p>\n<h3 class=\"body\">1. Quantum mechanics must be real<\/h3>\n<p>Quantum mechanics has been known about for over 100 years, but it is full of seemingly strange and contrarian laws (such as \u201cspooky\u201d entanglement, superposition, and the observer effect). Despite growing and overwhelming evidence, the brightest minds could not fully believe it. Albert Einstein spent many years trying to disprove it and died believing it wasn\u2019t true. In 1972 and again in 1981, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Bell%27s_theorem\" rel=\"noopener nofollow noreferrer\" target=\"_blank\">conclusive experiments<\/a> confirmed the soundness of quantum physics. Almost no one questions the realness of quantum physics today.<\/p>\n<h3 class=\"body\">2. We must be able to make quantum computers<\/h3>\n<p>When Shor released his quantum crypto cracking algorithm in 1994, not a single quantum computer existed. Even though quantum mechanics was real, there was a chance we would be unable to harness the quantum properties of subatomic particles.<\/p>\n<p>The first quantum computer was made in 1998. It was only one qubit and quickly increased to two, but it showed that computers that used quantum properties were possible. Over 20 years later, over 100 different quantum computers exist, and thousands of devices work using quantum properties. Hundreds of companies and thousands of scientists are working on improving quantum computers. Nations, including the United States and China, spend billions of dollars each year to make better quantum computers.<\/p>\n<h3 class=\"body\">3. Quantum computers must be able to break traditional public key crypto<\/h3>\n<p>Even though Shor\u2019s algorithm showed that quantum computers could theoretically break most traditional public key crypto, it\u2019s another to show that they can in practice. That changed as soon as we had the first quantum computers.<\/p>\n<p>One of the first things researchers did with quantum computers to test Shor\u2019s algorithm. It was successful but used very small prime numbers (three and five) to factor another small number, 15. It proved that Shor\u2019s algorithm worked in the way he said it would on quantum computers.<\/p>\n<h3 class=\"body\">4. We need enough error-free qubits<\/h3>\n<p>The last remaining potential block having enough error-free qubits to factor large prime number products, which are the central protection in most of today\u2019s traditional public key crypto. A quantum computer must have double (plus two to three) qubits more than the number of bits being factored. So, a 2,048-bit asymmetric would take 4,099 qubits to factor, and a 4,096-bit asymmetric key would take 8,195 qubits to factor.<\/p>\n<p>The most powerful publicly known Quantum computers have 70 to 80 qubits, and not so error-free. It is rumored that some of the quantum computers need thousands to hundreds of thousands of other supporting qubits (called ancillary qubits) for every directly computing qubit. That means that that some quantum computers might need millions of qubits to accomplish the quantum crypto break.<\/p>\n<p>We\u2019ve been at 70 to 80 semi-stable qubits going on two years after years of making steady progress. If 70 or 80 qubits is the limit, then the quantum crypto break hasn\u2019t happened. Is it possible that a secret quantum computer team has obtained more stable qubits and has successfully accomplished the quantum crypto break and we just don\u2019t know about it?<\/p>\n<h2>3 reasons the quantum crypto break might have happened<\/h2>\n<p><strong>Newer algorithms reduce the number of qubits needed.<\/strong> Shor\u2019s algorithm is a ceiling on the number of qubits needed to break large prime number equations. It was the first. Since it was released, several other algorithms have improved on both the speed of the possible quantum crypto break (which was very fast already) and lowered the number of qubits needed. Cryptographic attacks get better and better over time. It\u2019s even possible that someone has created an algorithm that can do it with only 70 to 80 semi-stable qubits, only it takes longer&#8211;days instead of minutes.<\/p>\n<p><strong>Making more qubits should be getting easier.<\/strong> The first qubit was the hardest to make. Going from the original quantum mechanic theories in the early to 1900s to the first working quantum computer took almost 100 years. Since then, we\u2019ve gone from one or two qubits in 1998 to 70 to 80 qubits. I don\u2019t understand how if we have dozens of semi-stable qubits that we can\u2019t have a million of them. If there is anything that the US (and China) does well since the days of Henry Ford, it is to take one of something and turn it into a billion of something quickly.<\/p>\n<p>I don\u2019t make this claim lightly or naively. I understand the huge challenges of making any stable qubits at all and how making a million error-prone qubits would only make the same problems seen at smaller levels much worse. Quantum computing scientists around the world are attacking the problem in dozens of ways, ranging from increasing qubit stability, reducing quantum gate times, and decreasing the time a qubit needs to remain stable to finish its task.<\/p>\n<p>I think we know how to make stable qubits. Microsoft has made at least a 1-qubit, very stable quantum computer based on <a href=\"https:\/\/en.wikipedia.org\/wiki\/Majorana_fermion\" rel=\"noopener nofollow noreferrer\" target=\"_blank\">Majorana fermions<\/a>. All it takes to make more stable qubits is money and resources, and the government is certainly good at that. Microsoft alone has at least eight quantum research centers around the world. I\u2019m supposed to assume that we can\u2019t figure out a way to make more?<\/p>\n<p><strong>Experts are mysteriously silent on quantum computing progress.<\/strong> For many years quantum computing vendors openly discussed how many qubits they had and how many they were soon to have. <a href=\"https:\/\/quantumcomputingreport.com\/scorecards\/qubit-count\/\" rel=\"noopener nofollow noreferrer\" target=\"_blank\">A website<\/a> is even dedicated to showing those numbers. I used to go there weekly to see what new numbers were posted. Suddenly, in the middle of 2018, the numbers stopped being regularly increased. Each week that goes by without a new qubit record seems suspiciously strange.<\/p>\n<p>I\u2019ve been talking to and interviewing quantum computing scientists for years, including some working on secret government projects. They used to regularly update me on their progress. They wouldn\u2019t give me any details beyond generalities. I would routinely ask them, \u201cHave we achieved the quantum crypto break?\u201d They would not comment fully or publicly, more than one indicated that they had not. Then in June 2018, all those same people suddenly went silent.<\/p>\n<p>So, as of June 2018, not only did my long-time sources go quiet, but so did the public website showing progress on qubit counts. After making steady progress for years, am I supposed to believe all the different quantum computing teams have hit some technological block toward achieving more stable qubits?<\/p>\n<p>This feels far more like the calm before the storm. There is a good chance that multiple teams have made significant progress, but they are being forced to a vow of secrecy.<\/p>\n<p>I love our government, but the National Security Agency (NSA) and the National Institute of Standards and Technology (NIST), which is in charge of national crypto standards and the move to quantum-resistant ciphers, have a long history of accomplishing significant crypto achievements and keeping us in the dark. Heck, they didn\u2019t reveal that they had obtained asymmetric cryptography a few years before the Diffie-Hellman public declaration in 1976 until a few years ago.<\/p>\n<p>The NSA has the dual objectives of making new crypto achievements, including breaking trusted cryptography, and also protecting us against other nation\u2019s cryptographic achievements. But 90% of its resources are focused on breaking secrets and only 10% on protecting us. Again, when given the chance to better protect us by telling us that they have obtained a cryptographic achievement and keeping it secret so they could use it against their targets, they keep things secret for as long as possible.<\/p>\n<p>It\u2019s hard to have two major, counter objectives and do both perfectly. I believe that if the NSA (or China) had obtained the quantum crypto break, there is no way they would tell anyone else. It would be counter to their primary objective of reading their target\u2019s secrets. You could even say that it would be negligent for them to reach the quantum crypto break and publicly reveal it before they have to.<\/p>\n<p>Once we finally learn the true quantum crypto break timeline, many years from now, we will learn that some government achieved it far earlier than the rest of the world knew. History is replete with this sort of examples.<\/p>\n<p>No, I don\u2019t know for sure if we\u2019ve already achieved the quantum crypto break. It\u2019s probably only three years or less away, but it wouldn\u2019t at all surprise me if it\u2019s already been done. We\u2019ve got quantum mechanics. We\u2019ve got quantum computers. We\u2019ve got qubits. The hardest part has already been done. Getting more stable qubits just doesn\u2019t seem nearly as difficult.<\/p>\n<\/div>\n<p> READ MORE <a href=\"https:\/\/www.idginsiderpro.com\/article\/3454845\/has-the-quantum-crypto-break-already-happened.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Better quantum algorithms and a strange silence since last year from quantum computing researchers suggest that we are closer to breaking traditional encryption than most people believe. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":32024,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[46,307,3550],"class_list":["post-32023","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-encryption","tag-security","tag-technology-industry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Has the quantum crypto break already happened? 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/has-the-quantum-crypto-break-already-happened\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Has the quantum crypto break already happened? 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/has-the-quantum-crypto-break-already-happened\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-26T13:30:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/11\/has-the-quantum-crypto-break-already-happened.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/has-the-quantum-crypto-break-already-happened\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/has-the-quantum-crypto-break-already-happened\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Has the quantum crypto break already happened?\",\"datePublished\":\"2019-11-26T13:30:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/has-the-quantum-crypto-break-already-happened\\\/\"},\"wordCount\":1912,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/has-the-quantum-crypto-break-already-happened\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/has-the-quantum-crypto-break-already-happened.jpg\",\"keywords\":[\"Encryption\",\"Security\",\"Technology Industry\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/has-the-quantum-crypto-break-already-happened\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/has-the-quantum-crypto-break-already-happened\\\/\",\"name\":\"Has the quantum crypto break already happened? 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/has-the-quantum-crypto-break-already-happened\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/has-the-quantum-crypto-break-already-happened\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/has-the-quantum-crypto-break-already-happened.jpg\",\"datePublished\":\"2019-11-26T13:30:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/has-the-quantum-crypto-break-already-happened\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/has-the-quantum-crypto-break-already-happened\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/has-the-quantum-crypto-break-already-happened\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/has-the-quantum-crypto-break-already-happened.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/has-the-quantum-crypto-break-already-happened.jpg\",\"width\":1200,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/has-the-quantum-crypto-break-already-happened\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Encryption\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/encryption\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Has the quantum crypto break already happened?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Has the quantum crypto break already happened? 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/has-the-quantum-crypto-break-already-happened\/","og_locale":"en_US","og_type":"article","og_title":"Has the quantum crypto break already happened? 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/has-the-quantum-crypto-break-already-happened\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-11-26T13:30:00+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/11\/has-the-quantum-crypto-break-already-happened.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/has-the-quantum-crypto-break-already-happened\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/has-the-quantum-crypto-break-already-happened\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Has the quantum crypto break already happened?","datePublished":"2019-11-26T13:30:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/has-the-quantum-crypto-break-already-happened\/"},"wordCount":1912,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/has-the-quantum-crypto-break-already-happened\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/11\/has-the-quantum-crypto-break-already-happened.jpg","keywords":["Encryption","Security","Technology Industry"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/has-the-quantum-crypto-break-already-happened\/","url":"https:\/\/www.threatshub.org\/blog\/has-the-quantum-crypto-break-already-happened\/","name":"Has the quantum crypto break already happened? 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/has-the-quantum-crypto-break-already-happened\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/has-the-quantum-crypto-break-already-happened\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/11\/has-the-quantum-crypto-break-already-happened.jpg","datePublished":"2019-11-26T13:30:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/has-the-quantum-crypto-break-already-happened\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/has-the-quantum-crypto-break-already-happened\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/has-the-quantum-crypto-break-already-happened\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/11\/has-the-quantum-crypto-break-already-happened.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/11\/has-the-quantum-crypto-break-already-happened.jpg","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/has-the-quantum-crypto-break-already-happened\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Encryption","item":"https:\/\/www.threatshub.org\/blog\/tag\/encryption\/"},{"@type":"ListItem","position":3,"name":"Has the quantum crypto break already happened?"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32023","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=32023"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32023\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/32024"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=32023"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=32023"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=32023"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}