Re: post-quantum computing in GnuPG

2014-04-02 Thread Christopher J. Walters
On 4/2/2014 2:50 AM, Robert J. Hansen wrote: Or someone builds a working quantum computer with many bits and demonstrate a working decryption of RSA-2048 in a few seconds. :-) Not likely in the near term... Maybe in 5000 years or so, but by then I suspect computing as we know it will be ancie

Re: post-quantum computing in GnuPG

2014-04-01 Thread Robert J. Hansen
> Or someone builds a working quantum computer with many bits and > demonstrate a working decryption of RSA-2048 in a few seconds. :-) Well, you'd need 4096 qubits in the ensemble, representing a state space of something like 10^1233 (not a typo). At that point I'm going to just give up and offer

Re: post-quantum computing in GnuPG

2014-04-01 Thread Johan Wevers
On 02-04-2014 1:43, Robert J. Hansen wrote: > I know, I know -- "I didn't mean 'how do *I* implement it,' I meant 'are > *you* going to implement it.'" And the answer there is probably not, > not unless someone like you gets the ball rolling in the above fashion. Or someone builds a working quan

Re: post-quantum computing in GnuPG

2014-04-01 Thread Robert J. Hansen
> Hi, is there any plan to include post-quantum cryptography ciphers such > as McEliece and NTRU in GnuPG? I am not a GnuPG developer: they will have the official word. Unofficially, no. GnuPG tracks the RFCs published by the IETF Working Group. If you want to see this, make a case for it to th

post-quantum computing in GnuPG

2014-04-01 Thread ------ ------
Hi, is there any plan to include post-quantum cryptography ciphers such as McEliece and NTRU in GnuPG? I know that NTRU is patented until 2020, but I found some C implementations. It says that modifying the code it is possibile to have it patent-free in 2017. http://goo.gl/cQGavW This is there o

Re: Quantum computing

2014-01-05 Thread Johan Wevers
On 4-1-2014 13:31, micha137 wrote: > A spoofing organization is no fertile ground for true innovation. The > real scientists, not the NSA are going to make progress in quantum > computing. And it is not going to be as cheap as some tens of megabucks. > Progress to get it pract

Re: Quantum computing

2014-01-04 Thread Lev Serebryakov
Hello, micha137. You wrote 4 января 2014 г., 16:31:44: m> They cheat, they bribe, they lie, they blackmail, they take polygraph m> tests on each other but they don't invent. As far as I know, NSA is biggest employer of mathematicians in the world. I don't know about physics and q

Quantum computing

2014-01-04 Thread micha137
They cheat, they bribe, they lie, they blackmail, they take polygraph tests on each other but they don't invent. A spoofing organization is no fertile ground for true innovation. The real scientists, not the NSA are going to make progress in quantum computing. And it is not going to be as

Re: Quantum computing

2007-04-25 Thread Sven Radde
RSA keys), possible advances in cryptology are nothing that would require key lifetimes. Once you do not feel comfortable enough with your current keylength anymore, you can simply revoke the key manually. Actually, predicting possible advances in fields like quantum computing is very hard, so it wou

Re: Quantum computing

2007-04-21 Thread Robert J. Hansen
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 > ``never'' is in this case based on one case of provable secure scheme > (that was notably difficult in implementation)? I wouldn't be so quick to place blame on the difficulty of implementing the one-time pad. Implementing the OTP is really pre

Re: Quantum computing

2007-04-21 Thread Anders Breindahl
On 200704201113, Robert J. Hansen wrote: > > Yeah, again. I completely agree on the practical aspect of it, but > > would nevertheless like to see proofs of complexity that weren't > > dependent on the current models of computations. > > I don't mean to sound flip, but as soon as you invent a hype

Re: Quantum computing

2007-04-20 Thread Janusz A. Urbanowicz
On Fri, Apr 20, 2007 at 01:57:46PM +0200, Anders Breindahl wrote: > Saying that ``there is no such thing'' seems harsh and as if you ignore > reality. The European Union put its hopes up for implementing a > ``quantum cryptography'' network of communications. That sort of makes > the term real in

Re: Quantum computing

2007-04-20 Thread Robert J. Hansen
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 > Yeah, again. I completely agree on the practical aspect of it, but > would > nevertheless like to see proofs of complexity that weren't > dependent on > the current models of computations. I don't mean to sound flip, but as soon as you invent

Re: Quantum computing

2007-04-20 Thread Anders Breindahl
[ Please interrupt if this is getting too off-topic. ] On 200704200441, Robert J. Hansen wrote: > Anders Breindahl wrote: > > Well. Yeah. But the thing that was and is fascinating about cryptography > > is that it -- assuming some model of computing -- is ``provable too > > hard'' to bypass. I'm w

Re: Quantum computing

2007-04-20 Thread Robert J. Hansen
Anders Breindahl wrote: > Well. Yeah. But the thing that was and is fascinating about cryptography > is that it -- assuming some model of computing -- is ``provable too > hard'' to bypass. I'm worried that the future holds in store revolutions > in computability that will shake those assumptions on

Re: Quantum computing

2007-04-20 Thread Werner Koch
It is stunning that a lab curiosity continues to be mentioned over and over again, not to mention to see venture capitalists dump money after it. BTW, none of this has anything to do with "Quantum Computing", which may indeed yield breakthroughs someday in

Re: Quantum computing

2007-04-20 Thread Anders Breindahl
on positive proofs, by which I mean those that define what _is_ doable or assumable, rather than the negative proofs that define what is undoable. Both are convenient. However, the proofs that consolidate the security of programs like gnupg, assume some model of computation... And in the face of

Re: Quantum computing

2007-04-19 Thread Robert J. Hansen
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 > Which I also remarked in the original post. However, when (if?) > commercial interests grab a hold of quantum computing, huge leaps in > cost of production perhaps could be achieved, making memory-rich > quantum > computers abund

Re: Quantum computing

2007-04-19 Thread Anders Breindahl
a 64-bit cipher... hard, but possible. The executive summary being that increases in key sizes makes traditional symmetric cryptography keep up with advances in quantum computing, such as Grover's algorithm for searching the keyspace. > > Then... It would seem that quantum computers poses

Re: Quantum computing (Robert J. Hansen)

2007-04-19 Thread Robert J. Hansen
will depend a lot on implementation details. What s2k algorithm is being used? What algorithm is used to encrypt the secret key? What... etc., etc. 3. I've already explained why quantum computing is not something we need to worry about. Be far, _far_ more concerned with the

Re: Quantum computing (Robert J. Hansen)

2007-04-19 Thread vedaal
>Message: 4 >Date: Wed, 18 Apr 2007 19:56:48 -0500 >From: "Robert J. Hansen" <[EMAIL PROTECTED]> >Subject: Re: Quantum computing >Brute-forcing a 128-bit cipher using a traditional >computer is a ridiculous proposition, but using Grover's, it >be

Re: Quantum computing

2007-04-18 Thread Robert J. Hansen
e best way to defend against exhaustive key search in a quantum world is to either (a) trust that quantum computing is going to remain "in just a couple of years" for the next few decades (which may very well be true), or (b) multiply your key sizes by a factor of 2. The principal

Re: Quantum computing

2007-04-18 Thread David Shaw
On Wed, Apr 18, 2007 at 09:10:17AM +0200, Anders Breindahl wrote: > On 200704172359, Robert J. Hansen wrote: > > 1. We are unlikely to ever be able to brute-force a 256-bit > > keyspace. Ever. Not until computers are made of something other > > than matter, occupy something other than space,

Re: Quantum computing

2007-04-18 Thread Robert J. Hansen
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 > Note that breaking Diffie-Hellman and other discrete logarithm based > algorithms is thought to be nearly equivalent to factoring, but has > not been proven to be so. Going off the top of my head, the DLP is known to be greater than or equal to

Re: Quantum computing

2007-04-18 Thread Ryan Malayter
On 4/18/07, Anders Breindahl <[EMAIL PROTECTED]> wrote: > > However, I assume you know what you talk about, when you say that we > aren't likely to factor 256-bit-numbers ever. So please restate that -- > even in the face of quantum computers -- we won't ever factor 256 bit > numbers. > > By the wa

Re: Quantum computing

2007-04-18 Thread Robert J. Hansen
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 > On 200704172359, Robert J. Hansen wrote: >> 1. We are unlikely to ever be able to brute-force a 256-bit >> keyspace. Ever. Not until computers are made of something other >> than matter, occupy something other than space, run on something >> oth

Re: Quantum computing

2007-04-18 Thread Ryan Malayter
On 4/18/07, Ryan Malayter <[EMAIL PROTECTED]> wrote: > Factoring, on the other hand, applies only to public-key RSA > encryption. There "bits" mean something totally different; a bit of > RSA key length is "worth less" than a bit of symmetric key length. > Numbers have already been factored in the

Quantum computing

2007-04-18 Thread Anders Breindahl
On 200704172359, Robert J. Hansen wrote: > 1. We are unlikely to ever be able to brute-force a 256-bit > keyspace. Ever. Not until computers are made of something other > than matter, occupy something other than space, run on something > other than energy, according to rules other than phy