Deutsch   English   Français   Italiano  
<v1kf1r$1726o$1@dont-email.me>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: Jakob Bohm <jb-usenet@wisemo.invalid>
Newsgroups: sci.crypt
Subject: Re: State of Post Quantum Cryptography?
Date: Fri, 10 May 2024 08:32:26 +0200
Organization: WiseMo A/S
Lines: 88
Message-ID: <v1kf1r$1726o$1@dont-email.me>
References: <ekCwF67a9p7PHWhXm+p3L7tjSqY0FYJNbA0LLbUz1mc=@writeable.com>
 <v1ancg$2jieu$1@dont-email.me> <v1jf6i$srv9$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Fri, 10 May 2024 08:32:27 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="65bd4a72cea69ad221432d6d9a7ca5ca";
	logging-data="1280216"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX1/fBpgwWDHoz77nTEAt7SJALJVml4nX3ig="
Cancel-Lock: sha1:vIf6T3P5lKIzTJCJiO45bETm3AA=
In-Reply-To: <v1jf6i$srv9$1@dont-email.me>
X-Mailer: Epyrus/2.1.2
Content-Language: en-US
Bytes: 4614

On 2024-05-09 23:28, Peter Fairbrother wrote:
> On 06/05/2024 14:53, Jakob Bohm wrote:
>> On 2024-05-02 10:20, The Running Man wrote:
>>> What is you guys take on PQC (Post Quantum Cryptography) algorithms? 
>>> I know the NIST has held a contest and that there are winners, but do 
>>> you guys think they're safe to use?
>>>
>>> I fear they may be broken in the future thereby destroying the 
>>> security and privacy of millions of unsuspecting users. 
> 
> Yep, that's a risk. PQC algorithms are of necessity less mature than 
> current cryptographic algorithms. If I may quote Schneier's law it its 
> original form:
> 
> "Anyone, from the most clueless amateur to the best cryptographer, can 
> create an algorithm that he himself can’t break. It’s not even hard. 
> What is hard is creating an algorithm that no one else can break, even 
> after years of analysis. And the only way to prove that is to subject 
> the algorithm to years of analysis by the best cryptographers around."
> 
> The winning PQC algorithms have had some of that analysis, but perhaps 
> not enough. I would not be surprised if, like some of the candidates, 
> the winners were comprehensively broken.
> 
> And there is another risk: that they will broken in ways we don't know 
> about now. Quantum computers of the needed scale still don't exist, and 
> we don't have years of practice using them - so it is practically 
> inevitable that new attack techniques using quantum computers will be 
> developed.
> 

See further below where Fairbrother returns to this subject.

> 
>> If any bad actor has a quantum computer with just a few more Qubits
>> than the ones demonstrated in public, they can break most current 
>> public key algorithms using known attack algorithms written a long 
>> time ago for
>> such (then hypothetical) computers. 
> 
> Err, no. Just no.

Note that I was talking logarithmic steps, not single Qbit steps.

> 
> You would need about 1,000 reliable entangled error-free qubits 
> equivalent (REEFQe) to do any useful cryptanalysis of present day public 
> key algorithms, and we are nowhere near that. Not even 100 REEFQe, more 
> like 20.
> 
> Having 1,000 error prone qbits, which has been done in a couple of 
> cases, is not nearly enough. Neither is D-wave's 1,200 calibrated 
> annealing qbits.
 >

Would those numbers apply to things like EdDSA and ECDSA?

> 
> Not even close.
> 
> And close only counts in horseshoes and hand grenades.
> 
> 
>> They can also break symmetric
>> encryption at the same difficulty as if the key length was half as many
>> bits (thus AES 128 would be as weak as IDEA, AES 256 as weak as AES
>> 128). [..] Any PQC public key algorithm will need to be combined with 
>> double strength symmetric algorithms.
> 
> Now there we agree, in fact double strength symmetric algorithms should 
> be de rigueur in general use as of yesterday: but I don't see why we 
> can't double up and use classic public key algorithms *as well as* PQC 
> public key algorithms, at least for a while.
> 

Yes, doubling up the types of algorithms used is a good way to hedge 
bets against bad algorithms.  Staying with known at-risk algorithms is
problematic.


Enjoy

Jakob
-- 
Jakob Bohm, CIO, Partner, WiseMo A/S.  https://www.wisemo.com
Transformervej 29, 2860 Søborg, Denmark.  Direct +45 31 13 16 10
This public discussion message is non-binding and may contain errors.
WiseMo - Remote Service Management for PCs, Phones and Embedded