Post quantum encryption question
Chris Rapier
rapier at psc.edu
Sat Oct 26 02:42:51 AEDT 2024
On 10/24/24 10:38 PM, Damien Miller wrote:
> On Thu, 24 Oct 2024, Chris Rapier wrote:
>
>> Have people given thought to the private key encryption methods in light of
>> potential quantum attacks? While the recent paper about breaking 50bit RSA
>> doesn't pose a threat I've been thinking about future harvest now, decrypt
>> later attacks against CC20 and AES. Are there post quantum ciphers that can
>> effectively replace these available or in development? Is the threat still
>> too far off to be a serious concern?
>
> Grover's search algorithm gives a cryptographically-relevant quantum
> computer a quadratic speedup. This effectively halves the strength,
> as expessed in bits, of symmetric ciphers and (I think) hash algorithms.
>
> I.e. AES-256 would be "as strong" as AES-128, and AES-128 would be
> reduced to 64-bit equivalent strength. The latter sounds pretty scary
> but AIUI the attacker would need to perform close to 2^64 quantum
> computations to break AES and that's still a huge expenditure.
>
This was my understanding as well but I am, like you, neither a
cryptographer or a quantum physicist. That said, this came up and people
had been asking me about the implications. So I thought I would ask here
so I don't inadvertently give people bad information. In my world we
mostly use encryption for authentication and some PHI, PII, and CUI but
generally not anything that is of long term value that would make sense
for a harvest/decrypt attack.
Thanks for the insight.
Chris
More information about the openssh-unix-dev
mailing list