Implications Of Shors Algorithm For Cryptography