- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
PKI and Quantum Computing
The thought of Quantum computing advances and Quantum computers being freely available will make our current cryptographic systems redundant. PKI will expire soon. Are there new algorithms being developed and also what is the approach. Is the NSA doing something about this? Is it something on your Organisation's radar today ?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi, fresh here so apologies for any mistakes by me! A question about RSA, strenghth and quantum computing (qubits), I have heard in conferences and lectures over the past years quite different stories on how many qubits it takes to actually break RSA cryptography, a range from "a few" to "several hundreds", I guess this also depends on the quality of the qubits and their entanglement, but does anyone have a good estimate?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
> Hi, fresh here so apologies for any mistakes by me! A question about RSA,
> strenghth and quantum computing (qubits), I have heard in conferences and
> lectures over the past years quite different stories on how many qubits it takes
> to actually break RSA cryptography, a range from "a few" to "several hundreds",
> I guess this also depends on the quality of the qubits and their entanglement,
> but does anyone have a good estimate?
Using the Shor algorithm you need twice as many qubits as the length of the key.
So, to break a 4,000 bit key, you need a machine with 8,000 qubits.
Since, except for D-Wave, we are only barely into double digits on most quantum
computers, we have some ways to go. (D-Wave doesn't count, since it is best
described as a quantum co-processor, rather than a full-fledged quantum computer.
Specifically, it cannot run the Shor algorithm.)
======================
rslade@gmail.com rmslade@outlook.com rslade@computercrime.org
"If you do buy a computer, don't turn it on." - Richards' 2nd Law
"Robert Slade's Guide to Computer Viruses" 0-387-94663-2
"Viruses Revealed" 0-07-213090-3
"Software Forensics" 0-07-142804-6
"Dictionary of Information Security" Syngress 1-59749-115-2
"Cybersecurity Lessons from CoVID-19" CRC Press 978-0-367-68269-9
============= for back issues:
[Base URL] site http://victoria.tc.ca/techrev/
CISSP refs: [Base URL]mnbksccd.htm
PC Security: [Base URL]mnvrrvsc.htm
Security Dict.: [Base URL]secgloss.htm
Security Educ.: [Base URL]comseced.htm
Book reviews: [Base URL]mnbk.htm
[Base URL]review.htm
Partial/recent: http://groups.yahoo.com/group/techbooks/
http://en.wikipedia.org/wiki/Robert_Slade
https://is.gd/RotlWB http://twitter.com/rslade
http://blogs.securiteam.com/index.php/archives/author/p1/
............
Other posts: https://community.isc2.org/t5/forums/recentpostspage/user-id/1324864413
This message may or may not be governed by the terms of
http://www.noticebored.com/html/cisspforumfaq.html#Friday or
https://blogs.securiteam.com/index.php/archives/1468
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Nist is at final stage to define PQC Algorithm
@https://csrc.nist.gov/projects/post-quantum-cryptography
The only big problem is .. htat those will be good untill someone else will find Qauntum Algorithms to break them.
The best way is start to consider the Crypto Agility as a must.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
HI @rslade
The main issue is having sufficient Quantum Memory which is stable enough to accommodate the Quantum Cryptography algorithms in order to break the RSA keys, there have been some exaggerations from various sources, which under scrutiny fail.
We may reach that level in 2026 or up to 2031 - the race is on at the present time.
Although the State Actors are actively working underground to achieve this pouring vast sums into the research and technologies required.
Regards
Caute_Cautim
- « Previous
-
- 1
- 2
- Next »