Shor, QLDPC Codes, and the Compression of RSA-2048 Resource Estimates (Part II)
dougfinke2026-03-14T10:31:11-07:00Q-Day Part II: Infrastructure Exposure in a Post-Shor Scenario If Shor's algorithm can be executed at scale, RSA and ECC-based systems are vulnerable. But migrating cryptographic systems cannot happen overnight. In this article GQI qualifies the risk to real-world systems in the event of a Shor algorithm demonstration on RSA-2048. Part I of this series examined how the "Pinnacle Architecture" analysis (arXiv:2602.11457) compresses the physical qubit requirement for factoring RSA keys to approximately 100,000 qubits, an order of magnitude reduction from 2025 benchmarks. While significant engineering trade-offs remain, the direction of travel suggests the hardware threshold for a cryptographically relevant quantum [...]