In the presence of a sufficiently powerful quantum computer, the private key can be derived from the public key.For symmetric, the secret key brute force search can be reduced by half.Encrypted data …