TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Why Quantum Computers Might Not Break Cryptography

52 pointsby markhkimabout 8 years ago

11 comments

snakeanusabout 8 years ago
I am worried about the following part from the paper &lt;<a href="https:&#x2F;&#x2F;cr.yp.to&#x2F;papers&#x2F;pqrsa-20170419.pdf&gt;" rel="nofollow">https:&#x2F;&#x2F;cr.yp.to&#x2F;papers&#x2F;pqrsa-20170419.pdf&gt;</a><p>&quot;Our batch prime-generation algorithm suggests that, to help reduce energy consumption and protect the environment, all users of RSA — including users of traditional pre-quantum RSA — should delegate their key-generation computations to NIST or anohter trusted third party. This speed improvement would also allow users to generate new RSA keys and erase old RSA keys more frequently, limiting the damage of key theft.&quot;<p>If you told me this was a parody of NSA disinfo, I&#x27;d believe it. But apparently, it&#x27;s a serious paper by djb and Heninger. What happened? Did they finally crack djb, maybe after tying him to the Appelbaum mess? I had hopes for him because ``Keeping crypto insecure&#x27;&#x27; was talking about stuff TLAs certainly didn&#x27;t want to see in the spotlight, but this is incredibly disappointing. When I read this passage for the first time I actually laughed for five minutes straight because it was so ridiculous.
评论 #14345709 未加载
评论 #14346888 未加载
评论 #14345672 未加载
评论 #14346694 未加载
DennisPabout 8 years ago
There are post-quantum public key algorithms which are much more efficient than terabit-size RSA.<p><a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Post-quantum_cryptography" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Post-quantum_cryptography</a>
tptacekabout 8 years ago
This seems pretty academic: even if RSA can be kept alive at some enormous key size, the reason we use RSA and not lattices or isogenies is that RSA is more practical.<p>That equation flips if quantum computing becomes a real threat, and the numbers in the paper don&#x27;t appear to change that at all: the key sizes theorized here are, for instance, far bigger than the keys we use in RLWE schemes.<p>As others here have noted: the paper we&#x27;re talking about is not entirely serious.
djrogersabout 8 years ago
TLDR; RSA keys can be generated large enough (1TB was the example in the article) that it would still take an inordinate amount of time to brute force, in spite of the potential speed advantages available to the quantum computer.
评论 #14345064 未加载
exabrialabout 8 years ago
That is an interesting argument... Today we assume RSA is &quot;Safe&quot; because we can guess the maximum computational power of an attacker, and using a key size that makes cracking the key an unfavorable avenue for attack.<p>He&#x27;s merely suggesting the same thing: use a really large key (terabit size), and since quantum computers are quite exotic, it will be an unfavorable avenue of attack.
评论 #14345074 未加载
darawkabout 8 years ago
&gt; As part of the attack analysis, this paper introduces a new quantum factorization algorithm that is often much faster than Shor’s algorithm and much faster than pre-quantum factorization algorithms.<p>This seems like the real point of this paper, no? The rest seems like a joke.
gitpusherabout 8 years ago
So... what is the argument exactly? That quantum computers won&#x27;t be fast enough to break a key that&#x27;s larger than most people&#x27;s hard drives and would be utterly useless in practice?
评论 #14345635 未加载
timthelionabout 8 years ago
If I had a quantum computer that was capable of breaking RSA, I wouldn&#x27;t tell anyone. The whole point is to be able to spy on people, and you wouldn&#x27;t be able to do that if everyone knew that RSA was broken.<p>I don&#x27;t know if quantum computers exist, but I&#x27;m sure once they do, the people who build them will keep them secret.
评论 #14346572 未加载
评论 #14345193 未加载
评论 #14345385 未加载
Ar-Curunirabout 8 years ago
I feel like the paper by DJB, which this article is based off of, was some sort of satire.
评论 #14346144 未加载
akfishabout 8 years ago
My question is: how practical would it be to use a 1TB RSA key for average users? I assume that the size of cipher text would be somewhat depended on secret size.<p>The storage space and network bandwidth is not free.
t3soroabout 8 years ago
Who gives a damn about a terabyte size key? what a pointless article.