All Algorithms

RSA-4096

Quantum Unsafe

Encryption algorithm

This algorithm will be broken by a cryptographically relevant quantum computer. Migration is recommended.

Algorithm Details

Category

Encryption

Quantum Safety

Quantum Unsafe

Key Lengths (bits)

4096

FIPS Standard

FIPS 186-5

Known Vulnerabilities

  • Shor's algorithm

Migration Recommendation

Recommended post-quantum replacement:

Migrate to ML-KEM-1024

Notes

Larger key does not protect against quantum attacks. Shor's algorithm scales polynomially with key size.

Discover which algorithms your organization is using.

Run Free Assessment
NetflixOracleFigmaCoinbaseDellServiceNowAppleDeloitteNikeAWSJPMorgan ChaseT-MobileAtlassianBoschStripeL'OrealDatadogMicrosoftPalantirHPRobinhoodEYSonyCanvaVisaAutoCADDiscordBellAdobeCharles SchwabE*TRADENVIDIAGoogleJohnson & JohnsonFidelityClaudeMastercardIntuitBoeingAT&TShopifyPwCOpenAIKPMGIBMDatabricksSalesforceGitHubAmerican ExpressWorkday