Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Quantum Decryption of RSA is Much Closer than Expected
    Cybersecurity

    Quantum Decryption of RSA is Much Closer than Expected

    adminBy adminMarch 3, 2026No Comments4 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Encryption
    Share
    Facebook Twitter LinkedIn Pinterest Email

    There’s a new contender in quantum cryptanalysis. The Jesse-Victor-Gharabaghi (JVG) quantum decryption algorithm is faster and requires fewer quantum resources than Shor’s algorithm.

    Breaking business and the internet has long been the accepted result of combining quantum computers and Shor’s algorithm to solve the factorization problem employed by Rivest-Shamir-Adleman (RSA) and Elliptic Curve Cryptography (ECC). But Shor’s algorithm requires a relatively large quantum computer (comprising an estimated one million qubits); and that is still believed to be at least a decade away.

    This time gap has allowed industry to believe it has time to undertake the massive task of finding and upgrading its current pre-quantum cryptography with the post quantum cryptography (PQC) recommended by NIST. This is already necessary because nation state and financially motivated criminal gangs have been, and are, stealing and storing information that they will decrypt in the future (harvest now, decrypt later). But that decryption might be possible sooner than we thought.

    A new algorithm, the JVG algorithm, completely upends existing time projections. The Advanced Quantum Technologies Institute (AQTI) announced March 2, 2026, “The JVG algorithm requires thousand-fold less quantum computer resources, such as qubits and quantum gates. Research extrapolations suggest it will require less than 5,000 qubits to break encryption methods used in RSA and ECC.” 

    An associated research paper written by professor Jesse Van Griensven, claims, “Projection for RSA-2048 indicates that the JVG algorithm significantly outperforms Shor’s approach, requiring a projected quantum runtime of 11 hours for a factorization under identical scaling assumptions. The results from these evaluations support JVG as a more hardware-compatible and robust noise-tolerant substitute for Shor’s framework.”

    Van Griensven is the J in JVG. V is Victor Oliveira Santos, and G is Bahram Gharabaghi – the three primary authors of JVG. “Jesse Van Griensven has built an incredible algorithm that will change everything we know on cybersecurity,” comments Nir (Benda) Ben-David, founder and CEO at Israel-based Qombat Ltd.

    Advertisement. Scroll to continue reading.

    JVG takes a different approach to Shor. Both are hybrid, using classical computers for some of the work, and quantum where necessary. JVG offloads significantly more of the workload to classical computing than Shor. For example, while Shor performs modular exponentiation by quantum, JVG does it by classical. 

    Both use quantum for the frequency analysis part. But while Shor uses quantum fourier transform (QFT) for the process, JVG uses quantum number theoretic transform (QNTT), which is more noise tolerant and requires fewer qubits. JVG’s approach is to reduce the load on quantum and simultaneously make its use more efficient.

    “Relative to the full Shor factoring pipeline for the same tested instances, the total quantum gate count is reduced by more than 99% in the JVG approach,” claims the paper.

    It is important to note that Shor’s algorithm has been tested and analyzed for many years, while JVG is very new and has not been poked and prodded to the same extent. There is an element of apples and oranges when comparing the two algorithms, so, it is best to consider the current announcement as claims. 

    Claims might not prove fully correct. But you don’t stand in front of a man with a gun simply because he might miss. You take evasive action. In this case, that evasive action requires a new urgency in the migration to PQC.

    The fastest path to safety is crypto‑ agility, the ability to replace cryptographic methods without rebuilding entire systems, combined with early deployment of quantum-resistant standards across networks, devices, and software supply chains.

    Three steps are recommended. Identify where public-key systems are used (and there are many of them); require clear post‑quantum roadmaps from vendors and service providers (especially for products with long replacement cycles); and deploy crypto-agile designs so that new PQC can be implemented as and when necessary.

    Van Griensven adds, “The lesson from JVG is that the timeline is accelerating not only because hardware advances, but also because algorithms improve. That is why post-quantum upgrades must be treated as urgent infrastructure work.”

    Related: NIST’s Quantum Breakthrough: Single Photons Produced on a Chip

    Related: Cyber Insights: Quantum and the Threat to Encryption

    Related: QuSecure Banks $28M Series A for Post-Quantum Cryptography Tech

    Related: Post-Quantum Cryptography Standards Officially Announced by NIST – a History and Explanation

    closer Decryption Expected Quantum RSA
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleMeta introduces click and engage-through attribution updates
    Next Article This new Samsung slidable phone concept expands from the top
    admin
    • Website

    Related Posts

    Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

    March 3, 2026

    Fig Security emerges from stealth with $38 million to resilience-proof enterprise security

    March 3, 2026

    Pro-Russia actors team with Iran-linked hackers in attacks

    March 3, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

    March 3, 2026

    Fig Security emerges from stealth with $38 million to resilience-proof enterprise security

    March 3, 2026

    EFF to Supreme Court: Shut Down Unconstitutional Geofence Searches

    March 3, 2026

    SEO’s 5 Stages of Grief (And How to Adapt to AI SEO)

    March 3, 2026
    Categories
    • Blogging (32)
    • Cybersecurity (582)
    • Privacy & Online Earning (83)
    • SEO & Digital Marketing (364)
    • Tech Tools & Mobile / Apps (717)
    • WiFi / Internet & Networking (103)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

    March 3, 2026

    Fig Security emerges from stealth with $38 million to resilience-proof enterprise security

    March 3, 2026

    EFF to Supreme Court: Shut Down Unconstitutional Geofence Searches

    March 3, 2026
    Most Popular
    • Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations
    • Fig Security emerges from stealth with $38 million to resilience-proof enterprise security
    • EFF to Supreme Court: Shut Down Unconstitutional Geofence Searches
    • SEO’s 5 Stages of Grief (And How to Adapt to AI SEO)
    • I finally have full control of my Bambu Lab printer, but it meant ditching Bambu’s cloud
    • Pro-Russia actors team with Iran-linked hackers in attacks
    • 8 Best Student Checking Accounts of March 2026
    • Builderius WordPress Page Builder Integrates Claude AI
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.