DEF CON 33 - Post Quantum Panic: When Will the Cracking Begin, & Can We Detect it? - K Karagiannis

Due to recently published algorithmic improvements (1399 qubits @ 2048 bit key length for Shor’s) and leaps being made in quantum computing hardware (IBM Starling @ 200 logical qubits in 2029, and IBM Blue Jay @ 2000 logical quibits from 2033 and on), encryption is in danger of State-sponsored and high end-criminal attacks as soon as 2030. Particularly susceptible are crypto-currencies like Bitcoin, which rely on the Elliptic Curve Discrete Logarithm Problem (ECDLP) and are attackable by Shor’s factoring capability on a predictably feasible quantum computer.

  • vacuumflower@lemmy.sdf.org
    link
    fedilink
    English
    arrow-up
    5
    arrow-down
    2
    ·
    21 hours ago

    … Which is why we all should immediately switch to post-quantum encryption possibly much weaker against conventional cryptanalysis. Thank you, NIST, NSA and other such respectable official bodies. Of course I believe you.

    In general the whole “everyone should use standard state-of-the-art cryptography” turned out to be a con. And somehow the more “standard state-of-the-art” things were broken, the more was the confidence that they are what should be used. In the 90s “standard state-of-the-art” things were being broken casually, and non-standardized ciphers were made and used far more often than now, and somehow that was fine.

    I dunno, we’re all using AES with even hardware implementations of it, potentially backdoored, and with approved recommended S-boxes, without explanation how were these chosen (“by the criteria of peace on earth and goodwill toward men” is not an explanation, a mathematical paper consisting of actions you repeat and unambiguously get the same set would be that).

    I think if you are afraid of your cryptography rotting, embracing some pluralism outside of cryptography is what you should do. Like maybe partitioning (by bits, not splitting into meaningful portions god forbid) the compressed data and encrypting partitions with different algorithms (one AES, one Kuznetchik, one something elliptic, one something Chinese).

    • Seefra 1@lemmy.zip
      link
      fedilink
      English
      arrow-up
      2
      ·
      17 hours ago

      … Which is why we all should immediately switch to post-quantum encryption possibly much weaker against conventional cryptanalysis.

      There’s no need to switch, you can just layer it, and should be done asap