• duncesplayed@lemmy.one
    link
    fedilink
    English
    arrow-up
    3
    ·
    11 months ago

    Yes, it is. ed25519 depends upon discrete log for its security, which Shor’s algorithm can (theoretically, of course, not like it’s ever been done) efficiently solve.

    The post-quantum algorithms are in active research right now. I don’t blame anyone for avoiding those at least until we’ve quantum computers big enough to solve baby toy elliptic curves.