On March 3, 2026, a team of researchers published details of the Jesse-Victor-Gharabaghi algorithm in SecurityWeek. The announcement didn't make front-page news, but it should have. The new quantum decryption method requires far fewer qubits than Shor's algorithm—the standard approach that's haunted cryptographers since 1994—and runs significantly faster. The timeline for breaking RSA encryption, the foundation of internet security, just got a lot shorter.
The Math That Protects Everything
RSA encryption secures your email, medical records, banking transactions, and classified government communications. Its security rests on a simple premise: multiplying two large prime numbers is easy, but factoring the result back into those primes is absurdly difficult. A classical computer would need thousands of years to crack a 2048-bit RSA key through brute force.
Elliptic Curve Cryptography offers similar protection with smaller key sizes, making it more efficient for mobile devices and IoT systems. AES encryption, which secures data at rest and in transit through protocols like TLS, would take anywhere from billions of years to the lifetime of the universe to break, depending on key length.
These aren't theoretical protections. They're battle-tested standards that have withstood decades of attacks from the world's most sophisticated adversaries. Until quantum computers entered the picture.
Why Qubits Change Everything
Classical computer bits exist as either zero or one. Qubits can be both simultaneously through superposition, and can be entangled so that the state of one depends on another regardless of distance. This isn't just a speed upgrade—it's a different kind of computing entirely.
Shor's algorithm, developed three decades ago, demonstrated that a sufficiently powerful quantum computer could factor large numbers exponentially faster than any classical approach. The catch: it traditionally requires an estimated one million qubits to break RSA encryption. Current quantum computers have hundreds of qubits at best, and those qubits are notoriously unstable.
The JVG algorithm changes this calculation. By requiring fewer quantum resources and running faster, it suggests the breaking point could arrive years sooner than the early 2030s timeline many experts had projected. Chinese researchers have already claimed success breaking RSA using D-Wave quantum machines, publishing their results in the Chinese Journal of Computers. The details remain contested, but the direction of travel is clear.
NIST's Eight-Year Race
The National Institute of Standards and Technology didn't wait for quantum computers to mature. In 2016, they launched a global competition to develop encryption that could withstand quantum attacks. Over eight years, they evaluated 82 algorithms from 25 countries.
On August 13, 2024, NIST released three finalized post-quantum cryptography standards. ML-KEM (Module-Lattice-Based Key-Encapsulation Mechanism) handles key exchange. ML-DSA (Module-Lattice-Based Digital Signature Algorithm) and SLH-DSA (Stateless Hash-Based Digital Signature Algorithm) manage digital signatures. Unlike RSA and ECC, these algorithms don't rely on factoring or discrete logarithm problems that quantum computers can solve efficiently. Instead, they use mathematical structures called lattices—geometric patterns in high-dimensional space where finding the shortest path remains difficult even for quantum computers.
NIST mathematician Dustin Moody urged immediate implementation: "We encourage system administrators to start integrating them into their systems immediately, because full integration will take time." That's an understatement. Organizations face the monumental task of identifying every system using pre-quantum cryptography and upgrading it—a process that will take years even under the best circumstances.
The Harvest Now, Decrypt Later Problem
The quantum threat isn't just future tense. Adversaries are already collecting encrypted data with the expectation of decrypting it once quantum computers become available. Medical records, financial transactions, government communications, trade secrets—anything encrypted today could be readable tomorrow.
This creates a perverse incentive structure. Data that needs to remain confidential for decades requires protection now, even though the threat won't materialize for years. A classified diplomatic cable from 2026 might not matter in 2046, but research on next-generation weapons systems certainly will.
AES encryption offers better quantum resistance than RSA or ECC. A quantum computer using Grover's algorithm could crack AES roughly twice as fast as a classical computer, but that still leaves AES-256 with security equivalent to AES-128 against quantum attacks—strong enough for most purposes. The real vulnerability lies in key exchange and digital signatures, where RSA and ECC dominate and where quantum computers have the most dramatic advantage.
Migrating Before the Storm
NIST continues developing backup standards and announced plans to advance about 15 additional algorithms to the next testing round. This redundancy matters. Post-quantum cryptography is new, and new cryptographic systems sometimes break in unexpected ways. Having multiple mathematical approaches provides insurance.
But standardization is only the first step. Every TLS certificate, every encrypted email system, every VPN, every digital signature needs updating. Hardware that can't support the new algorithms needs replacement. Software that hardcoded old encryption methods needs rewriting. The scope touches everything from Fortune 500 companies to small businesses to individual developers.
Deputy Secretary Don Graves framed it as an economic imperative: "The advancement of quantum computing plays an essential role in reaffirming America's status as a global technological powerhouse and driving the future of our economic security." That's diplomatic language for a blunt reality—whoever controls quantum-resistant encryption controls the infrastructure of digital commerce and communication.
Cryptography's Permanent Arms Race
The JVG algorithm is a reminder that cryptographic timelines compress without warning. What seemed like a distant threat becomes urgent when someone finds a shortcut. The quantum computers that will eventually break RSA don't need to be perfect or stable for extended periods—they just need to be good enough, for long enough, to factor one key.
NIST Director Laurie E. Locascio called the new standards "the capstone of NIST's efforts to safeguard our confidential electronic information." But capstones aren't endpoints. Cryptography has always been an arms race between code makers and code breakers. Quantum computing just accelerated the cycle.
The organizations that start migrating now will finish before quantum computers can break RSA. The ones that wait will be racing against a clock that's ticking faster than expected.