All Algorithms
RSA-4096
Quantum UnsafeEncryption algorithm
This algorithm will be broken by a cryptographically relevant quantum computer. Migration is recommended.
Algorithm Details
Category
Encryption
Quantum Safety
Quantum Unsafe
Key Lengths (bits)
4096
FIPS Standard
FIPS 186-5
Known Vulnerabilities
- Shor's algorithm
Notes
Larger key does not protect against quantum attacks. Shor's algorithm scales polynomially with key size.
Discover which algorithms your organization is using.
Run Free Assessment