Explore how quantum computers threaten classical cryptography
Step 1: Choose Your Diffie-Hellman Parameters
Select a key size to see how it performs against both classical and quantum attacks:
🔧 Advanced: Custom Prime Override
Requirements: Must be a safe prime where p = 2q + 1 and both p and q are prime. Example safe primes: 23, 47, 167, 263, 359, 383, 479, 503, 599, 719, 839... Note: Key size selections above become templates only - actual size determined by your prime.
Generator and private keys will be automatically selected to match your prime.
Step 2: Diffie-Hellman Key Exchange Simulation
Step 3: Quantum Attack Analysis
Now let's see how Shor's algorithm would attack your chosen parameters: