Data At Risk!
Reduction in Key Space & Time-to-Break Encryption 

     >Massively parallel

     >Non-universal quantum computers

    >Shor’s algorithm in asymmetric cryptography

    >Grover’s algorithm in symmetric cryptography


--> Quantum computing will break today's safe algorithms with many standardly used key lengths.

See details in NIST publication