TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Why Quantum Computers Might Not Break Cryptography

52 点作者 markhkim大约 8 年前

11 条评论

snakeanus大约 8 年前
I am worried about the following part from the paper &lt;<a href="https:&#x2F;&#x2F;cr.yp.to&#x2F;papers&#x2F;pqrsa-20170419.pdf&gt;" rel="nofollow">https:&#x2F;&#x2F;cr.yp.to&#x2F;papers&#x2F;pqrsa-20170419.pdf&gt;</a><p>&quot;Our batch prime-generation algorithm suggests that, to help reduce energy consumption and protect the environment, all users of RSA — including users of traditional pre-quantum RSA — should delegate their key-generation computations to NIST or anohter trusted third party. This speed improvement would also allow users to generate new RSA keys and erase old RSA keys more frequently, limiting the damage of key theft.&quot;<p>If you told me this was a parody of NSA disinfo, I&#x27;d believe it. But apparently, it&#x27;s a serious paper by djb and Heninger. What happened? Did they finally crack djb, maybe after tying him to the Appelbaum mess? I had hopes for him because ``Keeping crypto insecure&#x27;&#x27; was talking about stuff TLAs certainly didn&#x27;t want to see in the spotlight, but this is incredibly disappointing. When I read this passage for the first time I actually laughed for five minutes straight because it was so ridiculous.
评论 #14345709 未加载
评论 #14346888 未加载
评论 #14345672 未加载
评论 #14346694 未加载
DennisP大约 8 年前
There are post-quantum public key algorithms which are much more efficient than terabit-size RSA.<p><a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Post-quantum_cryptography" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Post-quantum_cryptography</a>
tptacek大约 8 年前
This seems pretty academic: even if RSA can be kept alive at some enormous key size, the reason we use RSA and not lattices or isogenies is that RSA is more practical.<p>That equation flips if quantum computing becomes a real threat, and the numbers in the paper don&#x27;t appear to change that at all: the key sizes theorized here are, for instance, far bigger than the keys we use in RLWE schemes.<p>As others here have noted: the paper we&#x27;re talking about is not entirely serious.
djrogers大约 8 年前
TLDR; RSA keys can be generated large enough (1TB was the example in the article) that it would still take an inordinate amount of time to brute force, in spite of the potential speed advantages available to the quantum computer.
评论 #14345064 未加载
exabrial大约 8 年前
That is an interesting argument... Today we assume RSA is &quot;Safe&quot; because we can guess the maximum computational power of an attacker, and using a key size that makes cracking the key an unfavorable avenue for attack.<p>He&#x27;s merely suggesting the same thing: use a really large key (terabit size), and since quantum computers are quite exotic, it will be an unfavorable avenue of attack.
评论 #14345074 未加载
darawk大约 8 年前
&gt; As part of the attack analysis, this paper introduces a new quantum factorization algorithm that is often much faster than Shor’s algorithm and much faster than pre-quantum factorization algorithms.<p>This seems like the real point of this paper, no? The rest seems like a joke.
gitpusher大约 8 年前
So... what is the argument exactly? That quantum computers won&#x27;t be fast enough to break a key that&#x27;s larger than most people&#x27;s hard drives and would be utterly useless in practice?
评论 #14345635 未加载
timthelion大约 8 年前
If I had a quantum computer that was capable of breaking RSA, I wouldn&#x27;t tell anyone. The whole point is to be able to spy on people, and you wouldn&#x27;t be able to do that if everyone knew that RSA was broken.<p>I don&#x27;t know if quantum computers exist, but I&#x27;m sure once they do, the people who build them will keep them secret.
评论 #14346572 未加载
评论 #14345193 未加载
评论 #14345385 未加载
Ar-Curunir大约 8 年前
I feel like the paper by DJB, which this article is based off of, was some sort of satire.
评论 #14346144 未加载
akfish大约 8 年前
My question is: how practical would it be to use a 1TB RSA key for average users? I assume that the size of cipher text would be somewhat depended on secret size.<p>The storage space and network bandwidth is not free.
t3soro大约 8 年前
Who gives a damn about a terabyte size key? what a pointless article.