Quantum computers can use Shor’s algorithm to break the main public key cryptosystems. Those based on the difficulty of factoring and the discrete logarithm, but there are still public key cryptosystems which are so far resistent to both quantum and classical attacks (like those based on certain shortest vector in a lattice problems.) Quantum computers can’t break any code in existence.
more reading:
Lattice-based cryptography
Public Cryptography is discussed at SSH
Symmetric cyphers are discussed at SSH
Elliptic curve cryptography at wikipedia.
The Case for Elliptic Curve Cryptography at the NSA.
MCEliece Cryptosystem
A list of different kinds of attacks on Cryptographic systems. Article by SSH
Brian Wang is a Futurist Thought Leader and a popular Science blogger with 1 million readers per month. His blog Nextbigfuture.com is ranked #1 Science News Blog. It covers many disruptive technology and trends including Space, Robotics, Artificial Intelligence, Medicine, Anti-aging Biotechnology, and Nanotechnology.
Known for identifying cutting edge technologies, he is currently a Co-Founder of a startup and fundraiser for high potential early-stage companies. He is the Head of Research for Allocations for deep technology investments and an Angel Investor at Space Angels.
A frequent speaker at corporations, he has been a TEDx speaker, a Singularity University speaker and guest at numerous interviews for radio and podcasts. He is open to public speaking and advising engagements.