All Algorithms
ECDH-P256
Quantum UnsafeKey Exchange algorithm
This algorithm will be broken by a cryptographically relevant quantum computer. Migration is recommended.
Algorithm Details
Category
Key Exchange
Quantum Safety
Quantum Unsafe
Key Lengths (bits)
256
FIPS Standard
SP 800-56A
Known Vulnerabilities
- Shor's algorithm (ECDLP)
Notes
Widely used for TLS key agreement. Quantum-vulnerable via the elliptic curve discrete logarithm problem.
Discover which algorithms your organization is using.
Run Free Assessment