Shor’s Algorithm Vulnerability Mitigation