All Algorithms
X448
Quantum UnsafeKey Exchange algorithm
This algorithm will be broken by a cryptographically relevant quantum computer. Migration is recommended.
Algorithm Details
Category
Key Exchange
Quantum Safety
Quantum Unsafe
Key Lengths (bits)
448
Known Vulnerabilities
- Shor's algorithm (ECDLP)
Notes
Higher-security Montgomery curve key exchange. Quantum-vulnerable via ECDLP.
Discover which algorithms your organization is using.
Run Free Assessment