JVG Algorithm Shrinks Quantum Barrier to Breaking RSA and ECC
Context and Chronology
A research team publicly described a new quantum factoring method that claims dramatic resource reductions compared with prior benchmarks, and the disclosure was promoted by the Advanced Quantum Technologies Institute on 2 March 2026. The paper’s authors include Dr. Jesse Van Griensven, Mr. Victor Oliveira Santos, and Mr. Bahram Gharabaghi; Dr. Van Griensven is the corresponding author on the preprint linked by the announcement at the preprint. The team calls their routine “JVG” and reports three concrete technical shifts that, if validated, reduce the quantum hardware barrier for attacking widely used public-key schemes.
Technically, JVG shifts substantial computation back to classical processors while reserving the quantum device for the frequency-analysis stage, replacing a traditional transform with a more noise-tolerant variant the authors call a quantum number-theoretic transform. The paper presents three event-driven metrics: a projected qubit requirement under 5,000, a reported runtime projection of about 11 hours for an RSA-2048 instance, and a claim of greater than 99% reduction in quantum gate counts versus older approaches. Those figures, if replicated, compress assumed development timelines and change the calculus for defenders who have banked on larger quantum resource thresholds.
Industry reaction was immediate: commercial quantum vendors and cryptography teams must now treat the announcement as a credible stress test rather than mere speculation. The pragmatic corporate response will center on three operational moves: inventory public-key usage across estates, mandate vendor PQC transition roadmaps in procurement documents, and embed crypto-agility into system lifecycles so algorithms can be swapped without major rewrites. Security teams and CISOs should prioritize archives and high-value, long‑lived data stores for migration planning given the increased probability of successful future decryption.
Read Our Expert Analysis
Create an account or login for free to unlock our expert analysis and key takeaways for this development.
By continuing, you agree to receive marketing communications and our weekly newsletter. You can opt-out at any time.
Recommended for you
Zero‑Trust Momentum Redirects Defense and Cloud Spend Toward Quantum‑Resilient Security
A combination of regulatory pressure, growing AI-driven attack automation and a Pentagon pivot to operational cyber budgets (roughly $15.1B in 2026) is pushing zero‑trust from design principle to procurement imperative. Enterprises and defense buyers are prioritizing cryptographic agility, identity-first controls and certified, interoperable solutions that can shorten migration timelines and mitigate 'harvest-now, decrypt‑later' risk.
IBM’s Nighthawk Reorients Quantum Effort Toward Clean‑Energy R&D (US)
IBM has introduced the Nighthawk processor and the companion Loon chip to prioritize circuit depth and localized error isolation, aiming to make quantum systems useful for complex materials and chemistry problems relevant to clean energy. The company targets selective customer access in late 2025 and plans a roadmap toward 1,000 logical qubits by 2028, while pursuing narrow demonstrations of quantum advantage by 2026.
Quantum and AI on a Collision Course: Why Encryption Migration Is Now an Urgent Strategic Priority
Powerful quantum processors and advanced AI are approaching a junction that could render today’s public-key systems obsolete and reshape cyber conflict dynamics. Organizations and governments must accelerate migration to quantum-resistant encryption and build automated defenses before adversaries gain first-mover advantage.

Microsoft and Hyperscalers Push Quantum Into Data Centers; Energy and Security Implications Loom
Major cloud providers are accelerating efforts to colocate quantum accelerators with classical servers in commercial data centers, targeting pilot-grade demonstrations around the turn of the decade. That shift creates opportunities for dramatic per‑task compute and energy savings on narrow problems while simultaneously forcing operators to prioritize post‑quantum cryptography, identity-driven zero‑trust controls, and new power and cooling architectures today.
Ethereum Foundation Mobilizes for Quantum-Resilient Upgrade, Research Lead Says
The Ethereum Foundation has launched a coordinated engineering program to replace quantum-vulnerable cryptography across execution, consensus and data-availability layers, running biweekly core-dev sessions and live multi-client PQ devnets. Growing concerns that AI will accelerate quantum progress — and the practical risk of adversaries hoarding encrypted data for future decryption — make Ethereum’s proactive, engineering-first migration (estimated ~20% complete) an urgent but complex undertaking that trades higher short-term costs for long-term systemic resilience.
BTQ’s Bitcoin Quantum Testnet Lays Bare Public‑Key Exposure and Migration Costs
BTQ Technologies launched a Bitcoin-like testnet on Jan. 12, 2026 that swaps Bitcoin’s elliptic-curve signatures for a NIST-standardized module-lattice scheme to measure operational impacts. The experiment highlights concentrated long-term risk where public keys are already visible onchain and underscores that any real-world migration will be constrained by blockspace, bandwidth and coordination trade-offs.
Google integrates post-quantum signatures into certificate transparency
Google is adding post-quantum cryptographic material, including ML-DSA , to certificate transparency logs and deploying compact Merkle-tree commitments to preserve compact proofs. The change, piloted in Chrome and tested with ~1,000 certificates at Cloudflare , aims to block future quantum-enabled forgery paths while shifting ledger responsibilities toward certificate authorities.
NIST single-photon chip expands practical quantum key distribution
NIST has demonstrated an on-demand single-photon source integrated on a chip and paired advances in detectors, potentially extending secure quantum key links far beyond today's practical limits. This could lower barriers for quantum key distribution adoption and enable new quantum networking use cases within a few years.