• Voroxpete@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    28
    ·
    edit-2
    1 day ago

    The notion that quantum computing will make encryption useless anytime in the near future is a wild fantasy.

    Yes, the potential exists that a fully realized version of quantum computing might do this. If such a thing actually ends up existing anytime soon. That is a big if. Right now we’re still very much in the “Working out if this is even feasible” stage.

    Even if fully realized quantum computers become a thing, and do all the things we want them to do, we’ll be decades away from having enough of them to be able to apply quantum compute time to any random conversation on the off chance it contains something important. That’s like fishing by hocking gold bars into the ocean in the hopes that one of them hits a fish on the way down.

    • Thekingoflorda@lemmy.world
      link
      fedilink
      English
      arrow-up
      6
      ·
      12 hours ago

      It doesn’t really matter that it’s still a long time away, once it arrives all previous messages could potentially be decrypted. Messages can be intercepted and stored, and I would bet a lot that an organization like the NSA does this. Feels to me like it’s more of a better be safe them sorry thing.

      • futatorius@lemm.ee
        link
        fedilink
        English
        arrow-up
        1
        ·
        5 hours ago

        There are encyption methods in existence that are resistant to any likely implementation of quantum computing as it’s now understood. It may be that, in the future, quantum computing is developed to be better able to crack those ciphers, but it’s equally likely that other methods of encryption will be developed that are even more resistant to quantum cracking.

      • Voroxpete@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        2
        ·
        7 hours ago

        Again, what you’re not clocking here is that it will be a very, very long time before we have sufficient quantum compute time available to engage in large scale decryption. Even just getting to the point where they can decrypt all newly generated messages will be a long time. By that point you’d have decades of historical messages to did through.

        Barring some wild, out of nowhere leap forward in the feasibility, scalability and affordability of the tech, you’ll be dead by the time the NSA gets around to reading your old messages.

        • Thekingoflorda@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          7 hours ago

          But they don’t have to dig trough all messages though. They can target specific people or organizations. And the fact that there is a possibility that this happens within the next 50 years, is a concern for spy agencies and other organizations with sensitive data.

    • drosophila@lemmy.blahaj.zone
      link
      fedilink
      English
      arrow-up
      1
      ·
      11 hours ago

      Even if it takes 100+ years for quantum cryptanalysis to become viable I would rather we start switching over to better algorithms now.

  • 7rokhym@lemmy.ca
    link
    fedilink
    English
    arrow-up
    4
    ·
    19 hours ago

    “With regard to the algorithms used to hash data – particularly SHA-224 and SHA-256 – Buchanan expressed surprise that neither will be approved for use beyond 2030.”

    Sounds like corruption to me. Hey gov’t pal, let’s make crazy requirements for security due to a quantum boogyman so I can sell you consultants and all new equipment with insane processing capabilities for a shit ton of money. Look for the greasy palms.

    Decades of research and we are at 100 qbits and estimates are bouncing around that estimate it will take millions. Once we build them, job #1 will be reading government email?

    Maybe, but it’s a lot easier just to use backdoors, software bugs, spies, and good ol’ bribes.

  • tkw8@lemm.ee
    link
    fedilink
    English
    arrow-up
    9
    ·
    edit-2
    1 day ago

    … plans emerged last week when the Australian Signals Directorate (ASD) published guidance for High Assurance Cryptographic Equipment (HACE) – devices that send and/or receive sensitive information – that calls for disallowing the cryptographic algorithms SHA-256, RSA, ECDSA and ECDH, among others, by the end of this decade.

    With regard to the algorithms used to hash data – particularly SHA-224 and SHA-256 – Buchanan expressed surprise that neither will be approved for use beyond 2030.

    “The migration within five years will not be easy, as every single web connection currently uses ECDH and RSA/ECDSA,” he wrote. “These methods are also used for many other parts of a secure infrastructure.”

    Looks like we could be in for interesting times.