Hello, I'll react to multiple questions and statements from multiple people.
> A figure I heard was that qc can cut search time for symmetric key merely in > half, whereas its can cut time for asymmetric key by orders of magnitude. No. For symmetric key, it does not halve the time. It works like halving key length. It is asymptotic improvement. With classical computer adding one bit doubles time for brute-force. With QC, adding *two* bits doubles time for probabilistic brute-force. See Grover's algorithm as I mentioned above. For asymmetric cryptography, “orders of magnitude” can be true, but it does not express that it is asymptotic improvement – you can resolve some problems in *polynomial* time. But there are some ciphers that are believed to be quantum-resistant, meaning that there is no such known attack. > in Qubes, the signature confirmation happens in dom0 or in the sys-net? Dom0 updates are verified in dom0, template updates are verified in templates. But that's not important if your adversary can factorize release signing key. > Doubling up the key length seems like an interesting prospect, but has the > potential risk to fail in the future by quantum computing Why? Doubling key size is a asymptotic countermeasurement. Moreover, for bruteforce (but not necessarily for other types of attack), Grover's algorithm has been proven to be optimal, i.e., you can't go asymptotically bettter. Unless a QC can perform many many many more operations in the same time and at the same cost, it should suffice. Unless there is some extra breakthrough. Remember, virtually no cryptographic scheme has been proven to be secure (except some like SSSS and Vernam cipher – but those have limited applicability), so, someone might theoretically break AES tomorrow. We just rely on the fact many that people have failed with this, so this is unlikely. But this is a theoretical issue even without QC. > I've wondered for a good while if splitting up an symmetric encrypted file in > multiple of parts, say for example minimum two parts, and send one over the > internet, and carry the other on yourself in person, that if only one part is > stolen (for example someone steal your laptop with sensitive competitive > business trade secrets), then it's still uncrackable? Usually no, unless you use a scheme specially designed for that. You might be interested in secret sharing, which is even more powerful concept. > Wait, hold on, your last line, regarding that "some" asymmetric encryption is > believed to be secure against future quantum computing? Is it possible to > elaborate on that? For example, see https://en.m.wikipedia.org/wiki/NTRU . > Also if this turns out to indeed be quantum crack proof, whould it be > feasible to use these for what we currently use symmetric encryption for? You could, but I see no reason for that. QC makes bruteforce considerably easier, but it is still considerably hard. With a proper key size, symmetric crypto will be still faster and have probably smaller keys for comparable security level. For asymmetric ciphers, bruteforce is usually not much considered, because they are usually better attacks. But Grover's algorithm should be applicable even for asymmetric ciphers. It however does not make much sense (at least not without modifications), because they have much larger keys. > Also, correct me if I'm wrong, but aren't there here two exponential effects, > one ontop of the other? Which may be overlooked by us too. I mean, imagine > the scale-ability of doubling the Qubits every day, it's not linier, it's > exponential. But the Qubits themselves are exponential too. AFAIU, this is a common misconception. Well, you need exponentially growing space for emulating QC on classic computer. But you don't get exponentially faster computer. You get a computer with more memory. Such computer can process larger tasks, e.g., factorize larger numbers. But once you have enough memory, adding more qubits make AFAIU no improvement. Regards, Vít Šesták 'v6ak' -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/4c85ee7e-b7a2-4f25-be68-022132c517fd%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.