'The encryption guarding digital communications could someday be cracked by quantum computers. Dubbed 'Q-day,' that moment could upend military and economic security worldwide. Great powers are sprinting to get there first.'
They still have to contend with the 'harvest now, decrypt later' which has been ongoing for a while I'm sure.
https://www.reuters.com/investigates/special-report/us-china-tech-quantum/
On Fri, 15 Dec 2023 08:50:42 -0800 (PST), Fred Bloggs <bloggs.fredbloggs.fred@gmail.com> wrote:
'The encryption guarding digital communications could someday be cracked by quantum computers. Dubbed 'Q-day,' that moment could upend military and economic security worldwide. Great powers are sprinting to get there first.'
They still have to contend with the 'harvest now, decrypt later' which has been ongoing for a while I'm sure.
https://www.reuters.com/investigates/special-report/us-china-tech-quantum/
One-time-pads are cheap and easy nowadays, and nothing can crack that.
On 12/15/23 18:32, John Larkin wrote:
On Fri, 15 Dec 2023 08:50:42 -0800 (PST), Fred Bloggs
<bloggs.fredbloggs.fred@gmail.com> wrote:
'The encryption guarding digital communications could someday be cracked by quantum computers. Dubbed 'Q-day,' that moment could upend military and economic security worldwide. Great powers are sprinting to get there first.'One-time-pads are cheap and easy nowadays, and nothing can crack that.
They still have to contend with the 'harvest now, decrypt later' which has been ongoing for a while I'm sure.
https://www.reuters.com/investigates/special-report/us-china-tech-quantum/ >>
I don't believe quantum computers will ever deliver. One-time-
pads aren't really a solution either. There are two problems:
How do you produce them and how do you deliver them?
The beauty of public key encryption is that anyone can send you
an encrypted message that only you can decrypt. The public key
is the product of two very large primes and the algorithm is
such that that you need the individual primes, the private key,
to decode the message. The security of the algorithm relies on
the difficulty of finding those primes.
Up to present, as far as I know, quantum computers haven't yet
succeeded in finding the prime factors of numbers with more than
three digits. There is still a long way to go. As I understand
Shor's algorithm, they aren't likely to ever get there. I believe
the limits of Shor's algorithm are about the same as our ability
to measure time or frequency, with goes to 18 digits or so, a
far cry from the 512+ digits required to attack current public
key algorithms by that approach.
Historically, it has always been far easier to capture the sender
or addressee and menace/torture him a bit.
Jeroen Belleman
I don't believe quantum computers will ever deliver. One-time-
pads aren't really a solution either. There are two problems:
How do you produce them and how do you deliver them?
The beauty of public key encryption is that anyone can send you
an encrypted message that only you can decrypt. The public key
is the product of two very large primes and the algorithm is
such that that you need the individual primes, the private key,
to decode the message. The security of the algorithm relies on
the difficulty of finding those primes.
Up to present, as far as I know, quantum computers haven't yet
succeeded in finding the prime factors of numbers with more than
three digits. There is still a long way to go. As I understand
Shor's algorithm, they aren't likely to ever get there. I believe
the limits of Shor's algorithm are about the same as our ability
to measure time or frequency, with goes to 18 digits or so, a
far cry from the 512+ digits required to attack current public
key algorithms by that approach.
Historically, it has always been far easier to capture the sender
or addressee and menace/torture him a bit.
On Fri, 15 Dec 2023 19:18:54 +0100, Jeroen Belleman
<jeroen@nospam.please> wrote:
On 12/15/23 18:32, John Larkin wrote:
On Fri, 15 Dec 2023 08:50:42 -0800 (PST), Fred Bloggs
<bloggs.fredbloggs.fred@gmail.com> wrote:
'The encryption guarding digital communications could someday be cracked by quantum computers. Dubbed 'Q-day,' that moment could upend military and economic security worldwide. Great powers are sprinting to get there first.'One-time-pads are cheap and easy nowadays, and nothing can crack that.
They still have to contend with the 'harvest now, decrypt later' which has been ongoing for a while I'm sure.
https://www.reuters.com/investigates/special-report/us-china-tech-quantum/ >>>
I don't believe quantum computers will ever deliver. One-time-
pads aren't really a solution either. There are two problems:
How do you produce them and how do you deliver them?
A hardware-based random number generator, and memory sticks.
The beauty of public key encryption is that anyone can send you
an encrypted message that only you can decrypt. The public key
is the product of two very large primes and the algorithm is
such that that you need the individual primes, the private key,
to decode the message. The security of the algorithm relies on
the difficulty of finding those primes.
That keeps getting easier. If quantum computers ever really work, they
could crack public encryption instantly.
On 12/15/2023 11:18 AM, Jeroen Belleman wrote:
I don't believe quantum computers will ever deliver. One-time-
pads aren't really a solution either. There are two problems:
How do you produce them and how do you deliver them?
OTPs need to be truly random to be effective. And, of a size
comparable to the size of the message being protected. The
randomness aspect precludes the use of any "set of bits" that
already exists "in the wild" (e.g., the text of "War and Peace")
as those things are likely available to adversaries AND not
truly random.
ALL users of a pad have to be kept in sync -- or, "told"
of the (nonoverlapping) offset into the pad that should be
used as the start for this message (which leaks information
as to the size of previous messages).
And, if you can SECURELY distribute a pad of size X, then
why not distribute your MESSAGE using the same SECURE
mechanism?
Also, keep in mind that for interactive *communications*
running at bus speeds, you can consume a huge pad in
milliseconds.
It's surprisingly difficult to produce cryptographic-quality
random numbers. It's easy for some undetected bias to creep
in, which gives a toehold to eavesdroppers.
The delivery problem is not how to store the OTP. It's rather
how you deliver it into the hands of the intended recipient
while making sure that only *he* gets it. It's not impossible,
embassies do it all the time. It's just a huge hassle, and
things do go wrong from time to time.
On Fri, 15 Dec 2023 08:50:42 -0800 (PST), Fred Bloggs ><bloggs.fredbloggs.fred@gmail.com> wrote:
'The encryption guarding digital communications could someday be cracked by quantum computers. Dubbed 'Q-day,' that moment
could upend military and economic security worldwide. Great powers are sprinting to get there first.'
They still have to contend with the 'harvest now, decrypt later' which has been ongoing for a while I'm sure.
https://www.reuters.com/investigates/special-report/us-china-tech-quantum/
One-time-pads are cheap and easy nowadays, and nothing can crack that.
It's surprisingly difficult to produce cryptographic-quality
random numbers. It's easy for some undetected bias to creep
in, which gives a toehold to eavesdroppers.
Not really true; digital logic isn't noise-sensitive, but analog methods of making/capturing random noise are relatively trivial.
The "cryptographic-quality"
specifications are subject to creep, and are at relatively (IMHO) absurd heights relative to realistic scales (time-to-test of the order of the age of the universe).
Tabulations like Rand "One Million Random Digits..." are relatively easily available,
and the foreword in that volume explains the process.
The right kind of generator isn't a digital computer but an amplifier
with gain, acting on thermal noise. A combination
of one-time use and good-enough randomness is not beatable.
The right kind of generator isn't a digital computer but an amplifier
with gain, acting on thermal noise. A combination of one-time use and good-enough randomness is not beatable.
It's surprisingly difficult to produce cryptographic-quality
random numbers. It's easy for some undetected bias to creep in, which
gives a toehold to eavesdroppers.
Not really true; digital logic isn't noise-sensitive, but analog methods
of making/capturing random noise are relatively trivial. The "cryptographic-quality" specifications are subject to creep, and are at relatively (IMHO) absurd heights relative to realistic scales
(time-to-test of the order of the age of the universe).
Tabulations like Rand "One Million Random Digits..." are relatively
easily available, and the foreword in that volume explains the process.
The right kind of generator isn't a digital computer but an amplifier
with gain, acting on thermal noise. A combination
of one-time use and good-enough randomness is not beatable.
Mike Monett VE3BTI <spamme@not.com> wrote:
One bad character screwed the whole page. I removed the character and >reposted the text. Hope it works.
The right kind of generator isn't a digital computer but an amplifier
with gain, acting on thermal noise. A combination of one-time use and
good-enough randomness is not beatable.
For most purposes, a code that takes a long time to break is good enough.
Any data will have become useless.
Gibson Research Corporation, by Steve Gibson, produces high quality code
that is often good enough.
Home Page
https://www.grc.com/default.htm
Gibson Ultra High Security Password Generator >https://www.grc.com/passwords.htm
Some results:
Generating long, high-quality random passwords is
not simple. So here is some totally random raw
material, generated just for YOU, to start with.
On a sunny day (Fri, 15 Dec 2023 09:32:28 -0800) it happened John Larkin ><jl@997PotHill.com> wrote in <ia3pnid1el7ao2d0oorq7ibuia8fo923v0@4ax.com>:
On Fri, 15 Dec 2023 08:50:42 -0800 (PST), Fred Bloggs >><bloggs.fredbloggs.fred@gmail.com> wrote:
'The encryption guarding digital communications could someday be cracked by quantum computers. Dubbed 'Q-day,' that momentOne-time-pads are cheap and easy nowadays, and nothing can crack that.
could upend military and economic security worldwide. Great powers are sprinting to get there first.'
They still have to contend with the 'harvest now, decrypt later' which has been ongoing for a while I'm sure.
https://www.reuters.com/investigates/special-report/us-china-tech-quantum/ >>
Unless you use one multiple times.
On Sat, 16 Dec 2023 06:12:55 GMT, Jan Panteltje <alien@comet.invalid>
wrote:
On a sunny day (Fri, 15 Dec 2023 09:32:28 -0800) it happened John Larkin >><jl@997PotHill.com> wrote in <ia3pnid1el7ao2d0oorq7ibuia8fo923v0@4ax.com>:
On Fri, 15 Dec 2023 08:50:42 -0800 (PST), Fred Bloggs >>><bloggs.fredbloggs.fred@gmail.com> wrote:
'The encryption guarding digital communications could someday be cracked by quantum computers. Dubbed 'Q-day,' that momentOne-time-pads are cheap and easy nowadays, and nothing can crack that.
could upend military and economic security worldwide. Great powers are sprinting to get there first.'
They still have to contend with the 'harvest now, decrypt later' which has been ongoing for a while I'm sure.
https://www.reuters.com/investigates/special-report/us-china-tech-quantum/ >>>
Unless you use one multiple times.
Don't do that!
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 300 |
Nodes: | 16 (2 / 14) |
Uptime: | 85:58:49 |
Calls: | 6,717 |
Calls today: | 1 |
Files: | 12,248 |
Messages: | 5,358,388 |
Posted today: | 1 |