Quantum Threat Assessment: MITM Risk vs Cryptographic Defenses

Expanded Summary Table: Quantum MITM Risk vs Cryptographic Defenses

System / CryptosystemKey SizeLogical Qubits Needed (Shor)Estimated Attack Time (Optimistic)Quantum MITM RiskNotes
RSA-2048 without PFS2048 bits4,000–6,000Hours–DaysHigh / indefensibleMITM can capture session now and decrypt later once quantum resources are available.
RSA-2048 with PFS (ECDHE)2048 bits4,000–6,000Hours–DaysLow / mitigatedEphemeral key exchange ensures captured sessions cannot be decrypted retroactively.
ECC-256 with ECDHE (ephemeral key)256 bits1,500–2,000HoursLowForward secrecy protects past sessions; ECC key compromise affects future sessions only.
AES-256 (symmetric)256 bitsN/A (Grover)Decades–CenturiesVery LowQuantum search via Grover reduces effective key strength to ~128 bits.
One-Time Pad (OTP)Message sizeN/AInfiniteUnbreakableTheoretically secure if key is truly random, single-use, and as long as message; impractical for most applications.
Post-Quantum Cryptography (PQC)VariesN/AYears–DecadesLowLattice-, hash-, or code-based algorithms resistant to Shor/Grover attacks; emerging standards.

Acronyms and Abbreviations

Acronym / AbbreviationFull FormBrief Description
RSARivest–Shamir–AdlemanPublic-key cryptography based on integer factorization.
ECCElliptic Curve CryptographyPublic-key cryptography using elliptic curves for smaller keys with equivalent security.
ECDHEElliptic Curve Diffie–Hellman EphemeralEphemeral ECC-based key exchange; provides PFS.
PFSPerfect Forward SecrecyPrevents compromise of long-term keys from exposing past sessions.
AESAdvanced Encryption StandardSymmetric encryption algorithm; AES-256 uses 256-bit keys.
OTPOne-Time PadSymmetric encryption using a random key as long as the message; theoretically unbreakable.
MITMMan-in-the-MiddleInterception and possible modification of communication.
ShorShor’s AlgorithmQuantum algorithm for factoring integers and breaking RSA/ECC in polynomial time.
GroverGrover’s AlgorithmQuantum algorithm that reduces brute-force search time; halves symmetric key strength.
TLSTransport Layer SecurityProtocol securing Internet communications; TLS 1.3 supports PFS and strong symmetric encryption.