The notion of quantum computing has been around since the 1980s. Quantum computers, using computational methods fundamentally different from classical computers, are now emerging from their neonatal state. They exist today. They are demonstrable. And other countries, especially China, are investing very heavily in their development. What motivated the October 24, 2017 congressional hearing on American Leadership in Quantum Technology? Among other concerns, existing private key / public key encryption systems are under threat from the rise of quantum computing. That's our credit cards!
Tech note: A fundamentally different method of encryption is needed to withstand quantum computing's twin attack method -- algorithmic assault on patterns to eliminate paths to wrong answers combined with extremely robust brute force capability.
Extreme Encryption in the current release features a count of over 10 to the power 623 (10623) unique keys combined with pattern reduction that blocks identification of paths that might be eliminated.
10623 is a huge number. Consider that the best estimate of particles -- electrons, protons, etc. -- in the observable universe is 1080.
Quantum computers have a considerable way to go before they can test up to 10623 keys to get at the original of one file or message.
Extreme Encryption, Cyberian™ and Cyberian™ Tiger in their present configuration deal with six bits at a time. If quantum computer hacking were to really take off, it is a straight-forward task to shift our technology to deal with eight or even ten bits at a time. Key counts would rise to 103548 or even 1018478 so that the odds can be even more secure for those that are really serious about privacy.
And if that is not enough, we can combine it with another of our inventions, Pryvit. That combination amounts to scalability plus, privacy plus, probably for the lifespan of this universe and beyond. Nobody can prove that last statement, but don't expect it to be disproved any time soon.