You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/blog/2025-07-24-post-quantum-roadmap.en.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,7 +32,7 @@ First, let's take a look at the ciphers involved in Cryptomator:
32
32
33
33
<figureclass="text-center">
34
34
<imgclass="inline-block rounded-sm"src="/img/blog/traditional-cipher-breakdown.svg"alt="Plot showing the growth of 2^n compared to n^2" />
35
-
<figcaption>Cryptographic Breakdown of Cryptomator & Hub</figcaption>
35
+
<figcaption>Cryptographic Breakdown of Cryptomator & Cryptomator Hub</figcaption>
36
36
</figure>
37
37
38
38
As you can see, we mostly rely on AES- and EC-based algorithms. These are traditional algorithms whose security assumptions apply in a world of classical (non-quantum) computers. The general idea is that computations are efficient if you know the right key but practically impossible without. When I say "practically impossible" I mean on traditional computers, as the computations are just "too complex".
0 commit comments