Workshops Defence Cryptanalysis and Codebreaking Acceleration
Defence Full Day Workshop

Cryptanalysis and Codebreaking Acceleration

Quantum computers running Shor's algorithm will factor RSA-2048 in hours, not millennia. This full-day workshop gives defence cryptanalysts and intelligence leaders a rigorous understanding of quantum cryptanalytic capabilities, realistic timelines based on published resource estimates, and the strategic implications for both offensive SIGINT and defensive migration.

Full day (6 hours)
In person or online
Max 30 delegates

Proud to recommend our expert members

Qrypto Cyber
Eclypses
Arqit
QuantBond
Krown
Applied Quantum
Quantum Bitcoin
Venari Security
QuStream
BHO Legal
Census
QSP
IONQ - ID Quantique
Patero
Entopya
Belden
Atlant3D
Zenith Studio
Qudef
Aries Partners
GQI
Upperside Conferences
Austrade
Arrise Innovations
CyberRST
Triarii Research
QSysteme
WizzWang
DeepTech DAO
Xyberteq
Viavi
Entrust
Qsentinel
Nokia
Gopher Security
Quside
QIZ
Global Quantum Intelligence
Qrypto Cyber
Eclypses
Arqit
QuantBond
Krown
Applied Quantum
Quantum Bitcoin
Venari Security
QuStream
BHO Legal
Census
QSP
IONQ - ID Quantique
Patero
Entopya
Belden
Atlant3D
Zenith Studio
Qudef
Aries Partners
GQI
Upperside Conferences
Austrade
Arrise Innovations
CyberRST
Triarii Research
QSysteme
WizzWang
DeepTech DAO
Xyberteq
Viavi
Entrust
Qsentinel
Nokia
Gopher Security
Quside
QIZ
Global Quantum Intelligence

Workshop Description

A cryptographically relevant quantum computer (CRQC) will break RSA and elliptic curve cryptography using Shor's algorithm. The question is not whether, but when. Current estimates from Gidney and Ekera (2021) project approximately 20 million noisy qubits for RSA-2048 factoring in 8 hours. More recent work by Litinski (2023) reduces this further with improved magic state distillation techniques. For defence organisations, the implications span offensive intelligence collection and defensive infrastructure protection.

This workshop provides a mathematically grounded examination of quantum cryptanalytic algorithms, their resource requirements on real hardware architectures, and the gap between current NISQ devices and fault-tolerant machines needed for codebreaking. Participants work through quantum resource estimation tools to understand T-gate counts, logical qubit requirements, and error correction overhead. The session also examines lattice reduction attacks against PQC candidates (ML-KEM, ML-DSA) and practical side-channel vulnerabilities that exist independently of quantum threats.

What participants cover

  • Shor's algorithm mechanics: factoring, discrete logarithm, and elliptic curve variants
  • Grover's algorithm: symmetric key search speedup and effective security level reduction
  • Quantum resource estimates for RSA-2048, RSA-4096, and AES-256 from peer-reviewed literature
  • Lattice cryptanalysis: BKZ 2.0, sieving, and dual/primal attacks against FIPS 203/204 parameters
  • HNDL threat modelling for intelligence data with multi-decade classification periods
  • Hybrid cryptography deployment strategies under CNSA 2.0 migration timelines

Preliminary Agenda

Full day workshop structure with scheduled breaks. Content is configurable to your organisation's technical level and operational environment.

# Session Topics
1 Quantum Cryptanalysis Fundamentals How quantum algorithms threaten classical encryption
  • Shor's algorithm: polynomial-time factoring and discrete logarithm computation
  • Grover's algorithm: quadratic speedup for symmetric key search and hash collision
  • Resource estimates: logical qubits, T-gate depth, and error correction overhead for RSA-2048 and AES-256
2 Cryptanalytic Attack Surface in Defence Systems Where quantum codebreaking changes the calculus
  • RSA and ECDSA vulnerability: timeline estimates from IBM, Google, and academic projections
  • AES-128 versus AES-256 under Grover's: effective security level halving and CNSA 2.0 response
  • Hash function resilience: SHA-2/SHA-3 collision resistance under quantum birthday attacks
  • Protocol-level exposure: TLS 1.2/1.3, IPsec IKEv2, and S/MIME in defence messaging systems
Break, after 60 min
3 Lattice and Code-Based Cryptanalysis Attacks against post-quantum candidates
  • Lattice reduction: BKZ 2.0, sieving algorithms, and the Core-SVP hardness model
  • Dual attack and primal attack strategies against ML-KEM (FIPS 203) parameter sets
  • Code-based cryptanalysis: information set decoding against Classic McEliece and BIKE
  • Side-channel and fault injection: practical attacks that bypass mathematical hardness
4 Interactive Demonstration Quantum resource estimation for cryptanalytic attacks
  • Facilitator-led walkthrough of quantum resource estimation tools (Microsoft Azure Quantum, IBM Qiskit)
  • Estimating T-gate counts and logical qubit requirements for Shor's algorithm against RSA-2048 and RSA-4096
  • Comparing published resource estimates: Gidney-Ekera 2021, Litinski 2023, Kim et al. 2024
  • Interpreting results: what "cryptographically relevant quantum computer" actually means for defence timelines
Break, after 90 min
5 Defensive Implications and Migration Priorities From threat assessment to action
  • HNDL (harvest now, decrypt later): classifying intelligence data by shelf life versus quantum timeline
  • Hybrid cryptography deployment: ML-KEM + X25519 for TLS, ML-DSA + ECDSA for code signing
  • CNSA 2.0 timeline alignment: 2030 symmetric deadlines, 2035 asymmetric deadlines for national security systems
6 Case Studies: Cryptanalytic Intelligence Historical and projected operational impact
  • Lessons from Enigma to modern SIGINT: how cryptanalytic breakthroughs reshape intelligence operations
  • Projected impact of quantum codebreaking on adversary COMSEC and stored encrypted intercepts
7 Q&A and Threat Assessment Planning

Designed and Delivered By

Workshops are designed and delivered by QSECDEF in collaboration with sector specialists. All facilitators have direct experience in both quantum technologies and defence systems.

QD

Quantum Security Defence

Workshop design and delivery

QSECDEF brings world-leading expertise in post-quantum cryptography, quantum computing strategy, and defence-grade security assessment. Our advisory membership spans 600+ organisations and 1,200+ professionals working at the intersection of quantum technologies and critical infrastructure security.

DE

Defence Sector Partners

Domain expertise and operational validation

Defence workshops are co-delivered with sector specialists who bring direct operational experience in defence organisations. This ensures workshop content is grounded in regulatory, operational, and technical realities specific to the sector.

Commission This Workshop

Sessions are configured around your organisation's technical level, operational environment, and regulatory jurisdiction. Get in touch to discuss requirements and schedule a date.

Contact Us

Quantum technologies are evolving quickly and new developments emerge regularly. This page was last updated on 15/03/2026. For the most current information about course content and suitability for your organisation, we recommend contacting us directly.