Re: NSA transition to quantum resistant algorithms

2015-08-18 Thread ropers
On 18 August 2015 at 21:30, Артур Истомин 
wrote:

> On Tue, Aug 18, 2015 at 07:09:30PM +0200, Tim Kuijsten wrote:
> > Op 15-08-15 om 21:14 schreef Devin Reade:
> > >Interesting background info, including recommended minimum key sizes
> during the interim:
> > >
> > >
> > >
> >
> > I find it interesting that symmetric ciphers like 256 bit AES are
> probably
> > quantum resistant[0], while all currently used public key systems can be
> > easily broken with quantum computers (because they're based on integer
> > factorization and discrete logarithms). So any traffic recorded today[1]
> > that is using Diffie-Hellman key exchange will be easily broken in the
> not
> > so far future. This has made me appreciate pre-shared key systems again.
>
> In practical all today crypto systems are mix of symmetric and asymmetric
> algos.
>

Yeah, but if you transmit your symmetric keys via asymmetric encryption,
and the latter can be... you know.


> > [0]
>
https://en.wikipedia.org/wiki/Post-quantum_cryptography#Symmetric_Key_Based_C
ryptography
> > [1] "It is the first facility in the world expected to gather and house a
> > yottabyte – or one thousand trillion gigabytes – of data."
> > http://blog.governor.utah.gov/2012/02/2012-energy-summit/



Re: NSA transition to quantum resistant algorithms

2015-08-18 Thread Артур Истомин
On Tue, Aug 18, 2015 at 07:09:30PM +0200, Tim Kuijsten wrote:
> Op 15-08-15 om 21:14 schreef Devin Reade:
> >Interesting background info, including recommended minimum key sizes during 
> >the interim:
> >
> >
> >
> 
> I find it interesting that symmetric ciphers like 256 bit AES are probably
> quantum resistant[0], while all currently used public key systems can be
> easily broken with quantum computers (because they're based on integer
> factorization and discrete logarithms). So any traffic recorded today[1]
> that is using Diffie-Hellman key exchange will be easily broken in the not
> so far future. This has made me appreciate pre-shared key systems again.

In practical all today crypto systems are mix of symmetric and asymmetric algos.
> 
> [0] 
> https://en.wikipedia.org/wiki/Post-quantum_cryptography#Symmetric_Key_Based_Cryptography
> [1] "It is the first facility in the world expected to gather and house a
> yottabyte – or one thousand trillion gigabytes – of data."
> http://blog.governor.utah.gov/2012/02/2012-energy-summit/



Re: NSA transition to quantum resistant algorithms

2015-08-18 Thread Tim Kuijsten

Op 15-08-15 om 21:14 schreef Devin Reade:

Interesting background info, including recommended minimum key sizes during the 
interim:





I find it interesting that symmetric ciphers like 256 bit AES are 
probably quantum resistant[0], while all currently used public key 
systems can be easily broken with quantum computers (because they're 
based on integer factorization and discrete logarithms). So any traffic 
recorded today[1] that is using Diffie-Hellman key exchange will be 
easily broken in the not so far future. This has made me appreciate 
pre-shared key systems again.


[0] 
https://en.wikipedia.org/wiki/Post-quantum_cryptography#Symmetric_Key_Based_Cryptography
[1] "It is the first facility in the world expected to gather and house 
a yottabyte – or one thousand trillion gigabytes – of data." 
http://blog.governor.utah.gov/2012/02/2012-energy-summit/




NSA transition to quantum resistant algorithms

2015-08-15 Thread Devin Reade
Interesting background info, including recommended minimum key sizes during the 
interim: