• @duncesplayed
    link
    English
    36 months ago

    Yes, it is. ed25519 depends upon discrete log for its security, which Shor’s algorithm can (theoretically, of course, not like it’s ever been done) efficiently solve.

    The post-quantum algorithms are in active research right now. I don’t blame anyone for avoiding those at least until we’ve quantum computers big enough to solve baby toy elliptic curves.