this post was submitted on 15 Jul 2023
43 points (95.7% liked)

Asklemmy

43835 readers
736 users here now

A loosely moderated place to ask open-ended questions

Search asklemmy ๐Ÿ”

If your post meets the following criteria, it's welcome here!

  1. Open-ended question
  2. Not offensive: at this point, we do not have the bandwidth to moderate overtly political discussions. Assume best intent and be excellent to each other.
  3. Not regarding using or support for Lemmy: context, see the list of support communities and tools for finding communities below
  4. Not ad nauseam inducing: please make sure it is a question that would be new to most members
  5. An actual topic of discussion

Looking for support?

Looking for a community?

~Icon~ ~by~ ~@Double_A@discuss.tchncs.de~

founded 5 years ago
MODERATORS
top 15 comments
sorted by: hot top controversial new old
[โ€“] hunter2@lemmy.ml 40 points 1 year ago (1 children)

Quantum computers are nowhere near usable for breaking classical cryptography at the moment, though opinions on how soon it will come vary. As others have said, we have quantum resistant algorithms ready to go, so future encryption is fine.

The greater concern is that a lot of traffic and data encrypted using classical algorithms has been logged or stored in various mediums. An old encrypted drive, or communications stored by nation state actors (the NSA and such). These will be broken, and a lot of past secrets might come out from hiding.

[โ€“] Laser@feddit.de 14 points 1 year ago (1 children)

An old encrypted drive

All of these use ciphers that are only affected by Grover's algorithm. This basically halves the exponent on your key space (so instead of 2^128 keys you only have 2^64 keys), however this doesn't necessarily mean that the algorithm is faster than a good parallel brute force on classical computers.

The more problematic algorithms are the ones affected by Shor's algorithm, which are all algorithms in broad use today that involve some sort of agreeing on a shared secret.

[โ€“] hunter2@lemmy.ml 1 points 1 year ago

I'm not well versed on the speed of Grover's over classical brute force. According to NIST this is correct! Thanks for the addition.

[โ€“] 001100010010@lemmy.dbzer0.com 14 points 1 year ago* (last edited 1 year ago)

Meh... we used to use much weaker encryption algorithms, and kept upgrading those algorithms. This will just be another phase of making stronger encryption algorithms. AES-256 is already quantum resistant, we just need to work on a quantum resistant asymmetric system. Pretty sure we can get it done before a quantum computer with enough qbits is invented.

[โ€“] airbussy@lemmy.one 9 points 1 year ago (2 children)

This video by Veritasium was pretty insightful on the topic.

https://youtu.be/-UrdExQW0cs

But I guess we'll have to see about "store now, decrypt later"...

[โ€“] PipedLinkBot@feddit.rocks 13 points 1 year ago

Here is an alternative Piped link(s): https://piped.video/-UrdExQW0cs

Piped is a privacy-respecting open-source alternative frontend to YouTube.

I'm open-source, check me out at GitHub.

[โ€“] Valmond@lemmy.ml 3 points 1 year ago (1 children)

New assymetric algos exist and the new standard is worked on right now IIRC (it might have been done already).

[โ€“] airbussy@lemmy.one 1 points 1 year ago

At 17:42 in the vid he talks about now algorithms, specifically one with vectors. His explanation is pretty good and comprehensable for not mathematically gifted people

[โ€“] aDogCalledSpot@lemmy.zip 4 points 1 year ago

There are already quite a few approaches to quantum safe encryption. We'll just have to switch to different algorithms. It's really nothing to worry about.

https://en.m.wikipedia.org/wiki/Post-quantum_cryptography

[โ€“] PonyOfWar@pawb.social 4 points 1 year ago

Not happening soon and when it does, we'll have better algorithms that can't be cracked by quantum computers.

[โ€“] colonial@lemmy.world 3 points 1 year ago* (last edited 1 year ago)

I'll believe it when I see it. There's a long, long way to go between current quantum tech and something that can crack modern 4096-bit RSA.

And honestly, it'll probably come so slowly that we'll have all switched to better algorithms by the time RSA cracking becomes feasible. (Yeah, I know about store now decrypt later, but that won't really affect the average person if it takes decades to come to fruition.)

[โ€“] Antimutt@lemmy.world 2 points 1 year ago

It reminds me I could store my public key in the avatar. We may have to make things more difficult with steg.

[โ€“] Kolanaki@yiffit.net 1 points 1 year ago

Wouldn't it still take them a very long time to break modern encryption?

And what about if someone made new encryption with quantum computers?

I assume it's inevitable and there are people working on a solution. That aside, I'm pretty excited to see what quantum computing will be capable of in our lifetime.

[โ€“] lynny@lemmy.world 0 points 1 year ago

It's been known to be an issue for a very long time now. It is what it is. Nothing is going to change the fact that my data will be decrypted.

load more comments
view more: next โ€บ