Presets:
ALGORITHM STEPS

Enter N and press ▶ Run Shor's Algorithm to begin.

PERIOD TABLE / QFT VISUALIZATION

Visualization will appear here after running the algorithm.

RSA IMPACT

FACTORING COMPLEXITY (log scale)

RESOURCE REQUIREMENTS

▶ Why Shor breaks ECC too

Shor's algorithm also solves the discrete logarithm problem — the mathematical foundation of ECC and Diffie-Hellman.

ECC P-256 security (classical): 2128 operations
ECC P-256 security (quantum): ~20 — broken in polynomial time

ECDH, ECDSA, and all ECC-based protocols are equally vulnerable. Smaller key sizes make ECC faster to break than RSA on a quantum computer.

QUANTUM-RESISTANT AFTER SHOR

  • ✓ AES-256 — Grover reduces to 128-bit effective — still strong
  • ✓ SHA-3 — Grover reduces collision resistance — still usable
  • ✓ ML-KEM (Kyber) — Lattice problems — no known quantum speedup
  • ✓ ML-DSA — Lattice problems — no known quantum speedup
  • ✓ SLH-DSA — Hash-based — quantum-safe by design
  • ✓ BB84 QKD — Physics-based — immune to all computational attacks
  • ✗ RSA (any size) — Broken by Shor
  • ✗ ECC (any curve) — Broken by Shor
  • ✗ Diffie-Hellman — Broken by Shor

Run the algorithm above to see a live demo.