Quantum Estimate Disclaimer
Last Updated: October 11, 2024
What Our Quantum Estimates Represent
Our quantum crack time estimates apply Grover's algorithm to model how a theoretical quantum computer might brute-force a password. Grover's algorithm provides a quadratic speedup (square root of search space) over classical brute-force attacks.
Critical Limitations
1. Theoretical Model Only
Our estimates are based on idealized quantum computing models. Real quantum computers face significant practical challenges:
- Error Rates: Current quantum computers have high error rates requiring extensive error correction
- Coherence Time: Quantum states degrade quickly, limiting computation time
- Gate Depth: Complex operations require many quantum gates, increasing error
- Physical Qubits: Thousands of physical qubits may be needed for each logical qubit
2. Speculative Hardware Assumptions
We provide three scenarios (pessimistic, plausible, optimistic) with different Grover iteration rates:
- 10³ iterations/second (pessimistic)
- 10⁵ iterations/second (plausible)
- 10⁷ iterations/second (optimistic)
These are educated guesses. Actual quantum computer performance for password cracking is unknown and may never reach these rates.
3. Password Hashing Not Modeled
Our estimates assume direct password comparison. Real systems use:
- Memory-hard hashing (bcrypt, scrypt, Argon2) which reduces quantum advantage
- Slow hash functions that require significant time per attempt
- Salting which prevents rainbow table attacks
These defenses are not fully accounted for in our quantum model.
4. Current State of Quantum Computing
As of 2024:
- No quantum computer can break real passwords
- Largest quantum computers have ~1000 noisy qubits
- Error-corrected logical qubits are still research-stage
- Password cracking requires millions of coherent operations
What You Should NOT Do
Do not:
- Make security decisions based solely on our quantum estimates
- Assume passwords rated "safe" against quantum attacks are truly secure
- Rely on these estimates for compliance or certification
- Use these numbers in legal, financial, or mission-critical contexts
What You SHOULD Do
Best practices for password security:
- Use long, random passphrases (4-5 words from a word list)
- Use a password manager
- Enable multi-factor authentication (MFA) wherever possible
- Use unique passwords for each account
- Keep systems and software updated
MFA provides far better protection than any password strength alone.
Educational Purpose
Our quantum estimates are provided for:
- Educational understanding of quantum threats
- Comparative analysis (classical vs quantum models)
- Awareness of future security challenges
No Liability
MyPasswordChecker.com and its operators are not liable for:
- Security breaches resulting from passwords deemed "quantum-safe"
- Decisions made based on our quantum estimates
- Inaccuracy of theoretical models
- Changes in quantum computing capabilities
Professional Advice
For critical security decisions, consult with qualified cybersecurity professionals and cryptographers. Do not rely solely on automated tools.
Sources and Methodology
Our quantum model is based on:
- Grover's algorithm (Grover, 1996)
- NIST guidance on post-quantum cryptography
- Published academic research on quantum attacks
- Conservative assumptions about quantum hardware
Updates
We may update our quantum model as research progresses. Check this page for the latest methodology and disclaimers.
Questions?
Contact us: [email protected]