Deutsch   English   Français   Italiano  
<v1ccsg$3vg5$1@solani.org>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!weretis.net!feeder8.news.weretis.net!reader5.news.weretis.net!news.solani.org!.POSTED!not-for-mail
From: Jan Panteltje <alien@comet.invalid>
Newsgroups: sci.crypt
Subject: Re: State of Post Quantum Cryptography?
Date: Tue, 07 May 2024 05:06:24 GMT
Message-ID: <v1ccsg$3vg5$1@solani.org>
References: <ekCwF67a9p7PHWhXm+p3L7tjSqY0FYJNbA0LLbUz1mc=@writeable.com> <v1ancg$2jieu$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; ISO-8859-15
Content-Transfer-Encoding: 8bit
Injection-Date: Tue, 7 May 2024 05:06:24 -0000 (UTC)
Injection-Info: solani.org;
	logging-data="130565"; mail-complaints-to="abuse@news.solani.org"
User-Agent: NewsFleX-1.5.7.5 (Linux-5.15.32-v7l+)
Cancel-Lock: sha1:v6R8Xfv3zQf03pLMITbgFWb7MiQ=
X-Newsreader-location: NewsFleX-1.5.7.5 (c) 'LIGHTSPEED' off line news reader for the Linux platform
 NewsFleX homepage: http://www.panteltje.nl/panteltje/newsflex/ and ftp download ftp://sunsite.unc.edu/pub/linux/system/news/readers/ 
X-User-ID: eJwFwYEBwCAIA7CXUGg7zlGQ/09YAudiKQgGBhNMxemvH73hZbABcgI1Zbqzs7T1lsnZhHy30vzMxa7KH0UyFRg=

On a sunny day (Mon, 6 May 2024 15:53:18 +0200) it happened Jakob Bohm
<jb-usenet@wisemo.invalid> wrote in <v1ancg$2jieu$1@dont-email.me>:

>On 2024-05-02 10:20, The Running Man wrote:
>> What is you guys take on PQC (Post Quantum Cryptography) algorithms? I know the NIST has held a contest and that there are
>> winners, but do you guys think they're safe to use?
>> 
>> I fear they may be broken in the future thereby destroying the security and privacy of millions of unsuspecting users. Current
>> cryptographic algorithms are known to be safe and will be for at least the coming decades. OTOH these new PQC ciphers hold the
>> promise of eternal confidentiality which current ciphers cannot guarantee.
>
>If any bad actor has a quantum computer with just a few more Qubits
>than the ones demonstrated in public, they can break most current public 
>key algorithms using known attack algorithms written a long time ago for
>such (then hypothetical) computers.  They can also break symmetric
>encryption at the same difficulty as if the key length was half as many
>bits (thus AES 128 would be as weak as IDEA, AES 256 as weak as AES
>128).
>
>> 
>> I myself am very much in doubt whether to use PQC or stick with known ciphers.
>> 
>
> From what I read so far, the most promising PQC signature algorithm is 
>the Merkle scheme in RFC8554 and RFC8391, though a secure implementation 
>will take serious work.
>
>Key exchange will be harder, though the DJB-sponsored proposal for a 
>"Classic McElice" variant may be solid.
>
>Any PQC public key algorithm will need to be combined with double 
>strength symmetric algorithms.
>
>Enjoy
>
>Jakob

Experiment opens door for millions of qubits on one chip:
 https://www.sciencedaily.com/releases/2024/05/240506131552.htm
Summary:
 Researchers have achieved the first controllable interaction between two hole spin qubits in a conventional silicon transistor. 
 The breakthrough opens up the possibility of integrating millions of these qubits on a single chip using mature manufacturing processes

?