Bird
0
0

Which cryptographic algorithm is most vulnerable to Shor's algorithm on a quantum computer?

easy🧠 Conceptual Q2 of 15
Cybersecurity - Emerging Security Topics
Which cryptographic algorithm is most vulnerable to Shor's algorithm on a quantum computer?
ARSA
BAES
CSHA-256
DHMAC
Step-by-Step Solution
Solution:
  1. Step 1: Identify Shor's algorithm target

    Shor's algorithm efficiently factors large numbers and computes discrete logarithms.
  2. Step 2: Match algorithm vulnerability

    RSA relies on factoring large numbers, so it is vulnerable to Shor's algorithm.
  3. Final Answer:

    RSA -> Option A
  4. Quick Check:

    Shor's algorithm = RSA vulnerable [OK]
Quick Trick: Shor's algorithm breaks RSA easily [OK]
Common Mistakes:
MISTAKES
  • Confusing symmetric algorithms with factoring-based ones
  • Thinking AES is broken by Shor's
  • Mixing hash functions with encryption
  • Assuming HMAC is vulnerable to factoring

Want More Practice?

15+ quiz questions · All difficulty levels · Free

Free Signup - Practice All Questions
More Cybersecurity Quizzes