Rewritten Article
For years, the cybersecurity community has tied the “quantum threat” to public-key encryption—specifically RSA and Elliptic Curve Cryptography (ECC)—to Shor’s algorithm. The prevailing belief has been that breaking these systems would require large-scale quantum computers with roughly a million qubits, placing the real danger at least a decade away.
A newly announced approach challenges that assumption.
A New Algorithm Enters the Field
The Jesse–Victor–Gharabaghi (JVG) quantum decryption algorithm claims to factor large integers—the mathematical foundation of RSA—far more efficiently than Shor’s method. According to an announcement from the Advanced Quantum Technologies Institute (AQTI), the JVG algorithm may require fewer than 5,000 qubits to break RSA and ECC, a thousand-fold reduction in quantum resource requirements compared to standard projections for Shor’s algorithm.
The associated research paper, authored by Professor Jesse Van Griensven (the “J” in JVG), along with Victor Oliveira Santos and Bahram Gharabaghi, projects that factoring RSA-2048 could take approximately 11 hours under comparable scaling assumptions. The authors argue that JVG is more hardware-compatible and better able to tolerate quantum noise than Shor’s framework.
If these claims hold, the implications are significant: practical quantum attacks on current encryption standards could arrive much sooner than anticipated.
Why JVG Is Different
Both Shor’s algorithm and JVG are hybrid approaches that combine classical and quantum computing. However, JVG shifts much more of the computational burden to classical systems.
For example:
- Shor’s algorithm performs modular exponentiation using quantum circuits.
- JVG moves modular exponentiation to classical computation.
Both algorithms rely on quantum processing for frequency analysis. However:
- Shor uses the Quantum Fourier Transform (QFT).
- JVG replaces QFT with a Quantum Number Theoretic Transform (QNTT), which is claimed to be more noise-tolerant and significantly less demanding in qubits and gate counts.
The JVG paper asserts that total quantum gate usage is reduced by more than 99% compared to the full Shor factoring pipeline for the same test cases. By minimizing the quantum workload and optimizing how quantum components are used, JVG attempts to make large-scale factorization feasible on much smaller quantum machines.
Caution and Context
Shor’s algorithm has undergone decades of peer review, scrutiny, and refinement. JVG, by contrast, is new and has not yet faced the same depth of academic and practical examination. Comparisons between the two remain, for now, claims rather than confirmed benchmarks.
Still, the cybersecurity community cannot afford complacency. Even if the projections prove optimistic, the mere possibility that quantum decryption timelines are accelerating should be treated as a serious warning.
The Urgency of Post-Quantum Migration
The industry has already been racing to deploy post-quantum cryptography (PQC), partly due to the “harvest now, decrypt later” strategy used by nation-states and criminal groups. Sensitive encrypted data stolen today could be decrypted years from now when quantum capabilities mature.
If JVG or similar algorithmic advances reduce the hardware barrier, that future may arrive sooner than expected.
The most effective defensive strategy includes:
- Comprehensive Cryptographic Inventory
Identify all systems relying on public-key cryptography, especially long-lived infrastructure. - Vendor Roadmap Accountability
Require clear, actionable post-quantum transition plans from vendors and service providers, particularly for products with extended replacement cycles. - Crypto-Agility by Design
Build systems capable of swapping cryptographic algorithms without requiring architectural redesign. This flexibility allows rapid adoption of NIST-recommended PQC standards as needed.
The key lesson from the JVG announcement is that quantum risk does not depend solely on hardware breakthroughs. Algorithmic innovation can dramatically shift the timeline. Post-quantum upgrades should therefore be treated not as optional modernization projects, but as urgent infrastructure priorities.
This development is a wake-up call for organizations that are still treating post-quantum migration as a long-term project. Even if the JVG claims require further validation, the direction of travel is clear: algorithmic breakthroughs can compress timelines just as dramatically as hardware advances. Crypto-agility and proactive PQC adoption should now be considered strategic necessities, not future enhancements.