100% Client-side  |  PEM & Hex input  |  Quantum risk assessment  |  PQC recommendations

RSA Key Size Analyzer

Paste any RSA public key to analyse key size, classical security level, quantum vulnerability via Shor's algorithm, estimated crack time and PQC migration recommendations.

Key size
Classical security
equivalent symmetric bits
Post-quantum security
Public exponent
Classical security strength
0 — Broken200 — Maximum
Quantum vulnerability
Estimated classical crack time (GNFS)
Quantum threat timeline
    Modulus (n)

    RSA key security levels

    RSA key sizeClassical securityPost-quantum securityNIST statusVerdict
    512-bit~40-bitBrokenProhibitedBroken (1999)
    768-bit~60-bitBrokenProhibitedBroken (2009)
    1024-bit~80-bitBrokenProhibited since 2013Do not use
    2048-bit~112-bitBroken (quantum)Acceptable until 2030Migrate soon
    3072-bit~128-bitBroken (quantum)RecommendedMigrate to PQC
    4096-bit~140-bitBroken (quantum)Strong classicalGood, but plan PQC
    Kyber-768192-bit192-bitNIST FIPS 203Quantum-safe

    Why RSA is vulnerable to quantum computers

    RSA security relies on the difficulty of factoring large integers — a problem that classical computers cannot solve efficiently for large key sizes. However, Shor's algorithm, running on a sufficiently large quantum computer, can factor RSA moduli in polynomial time — making all RSA key sizes theoretically breakable.

    The critical question is not if quantum computers will break RSA, but when. Current estimates suggest cryptographically relevant quantum computers (CRQCs) capable of breaking RSA-2048 could exist between 2030 and 2040.

    What is the public exponent?

    The RSA public key consists of two numbers: the modulus (n) and the public exponent (e). The standard value is 65537 (0x10001) — a prime chosen for efficiency and security. Unusual exponents like 3 can introduce vulnerabilities in some implementations.

    References

    1. NIST SP 800-57 — Recommendation for Key Management
    2. Lenstra et al., "Ron was wrong, Whit is right" (2012) — RSA key analysis at scale
    3. NIST Post-Quantum Cryptography Standardization