Where every claim in SecProve
comes from.
A dense reading catalog. Every claim is footnoted. Sort by source, filter by pillar, type, or recency. Built for analysts who want to see what we are standing on.
Federal guidance on preparing for quantum threats. Cryptographic inventory requirements, risk assessment methodology, and migration prioritization. Practical governance questions.
Expert survey on when quantum computers will break RSA-2048. Tracks annual probability estimates from leading researchers.
Test your knowledge · D3Migration guidance and timelines. Deprecation schedule for current algorithms. Hybrid approaches. The roadmap document for PQC transition questions.
NSA's guidance on quantum threats to cryptography. Explains which algorithms are vulnerable and timelines for transition.
Test your knowledge · D3Mosca's theorem: if the time to migrate (x) + shelf life of data (y) > time to quantum computer (z), then start migration now. The canonical framework for "harvest now, decrypt later" risk assessment.
Test your knowledge · D3Quadratic speedup for unstructured search. Halves the effective key length of symmetric algorithms (AES-128 → 64-bit equivalent). Questions on what Grover's algorithm does and doesn't break.
Test your knowledge · D3The paper that started it all. Shor's algorithm breaks RSA, DSA, ECDSA, and Diffie-Hellman. Essential for questions on which classical cryptographic assumptions quantum computing breaks.
Test your knowledge · D3Ready to test what you've learned?
Our questions are built directly from these resources. Take a quiz and see how your knowledge stacks up.