Both proposals warn of the threat posed to information security by advances in the field of quantum computing. Future large-scale quantum computers could use Shor’s algorithm to compromise the security of widely deployed public key-based algorithms. These algorithms are used by the Java platform for activities such as digitally signing Java archive (JAR) files and establishing secure network connections. A quantum computer using Shor’s algorithm could perform the attack within hours. Cryptographers responded to this threat by inventing quantum-resistant algorithms that Shor’s algorithm could not defeat. Even if large-scale quantum computers do not yet exist, the transition to quantum-resistant algorithms is urgent.
Both proposals each target Java Standard Edition, but neither targets a specific version at this time. Both proposals were written on August 26 and updated on November 6.