There are many methods to manage risks. However they all result in trying to determine the likelihood and impact of a risk. The presentation is about an approach to determine the likelihood of the quantum “threat” by investigating the requirements to run Shor’s algorithm on a fault-tolerant quantum computer. The results of this approach are used to make a suggestion on how an highly ICT dependent society should act regarding the quantum “threat”.
(Quantum “threat” is defined as the impact of quantum computing on public-key cryptosystems and symmetric key systems.)