Sophie Schmieg writes:
> Grover's algorithm is inherently sequential, and cannot be
> parallelized, making the standard approach of throwing more compute at
> the problem to scale up infeasible.

One can split the search space across many parallel quantum processors
and run a smaller Grover search on each part of the space, as noted in,
e.g., https://arxiv.org/abs/quant-ph/0309123 from Grover and Rudolph.

To some extent it's possible to combine this with multi-target attacks.
See https://cr.yp.to/papers.html#groverrho.

Even without quantum computers, 2^40-target attacks against AES-128 are
already a feasible computation today for large-scale attackers. One can
try to stop these attacks by having every AES-128 application randomize
every input block, but we keep seeing people screw this up. This is the
sort of thing that _probably_ ends up working for TLS, but it's fragile,
and the broader habit of tolerating this sort of fragility is certainly
a big factor in the problems that we _have_ seen in TLS.

I agree that the Grover speedup compared to non-quantum searches comes
from the number of serial iterations carried out on each processor, and
meanwhile this has to fight against the quantum-computation overhead---
which could end up as 2^30 or 2^40; we don't know yet. But this doesn't
makes AES-128 a safe option: on the contrary, tolerating AES-128 will
end up compromising the confidentiality of some user data.

> confirmed the infeasibility of Grover's in at least the
> medium term of several decades to centuries

I see no basis for this claim.

> the reason for ECC + lattice based hybrids are becoming less
> compelling with every day that passes in which lattices do not get
> broken

One of the talks at Crypto 2025 last week said that none of the Kyber
parameters meet their claimed security levels.

---D. J. Bernstein

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to