• Voroxpete
    link
    fedilink
    English
    arrow-up
    27
    arrow-down
    1
    ·
    edit-2
    22 hours ago

    The notion that quantum computing will make encryption useless anytime in the near future is a wild fantasy.

    Yes, the potential exists that a fully realized version of quantum computing might do this. If such a thing actually ends up existing anytime soon. That is a big if. Right now we’re still very much in the “Working out if this is even feasible” stage.

    Even if fully realized quantum computers become a thing, and do all the things we want them to do, we’ll be decades away from having enough of them to be able to apply quantum compute time to any random conversation on the off chance it contains something important. That’s like fishing by hocking gold bars into the ocean in the hopes that one of them hits a fish on the way down.

    • fmstrat@lemmy.nowsci.com
      link
      fedilink
      English
      arrow-up
      1
      ·
      2 hours ago

      It’s the specifics that matter though. IF this happens, it won’t be “random conversations”. It will be decrypting Zcash purchases, or specific VPN sessions. It’s the reason national defense communication goes through air gapped lines, future proofs against those targeted methods.

    • Thekingoflorda@lemmy.world
      link
      fedilink
      English
      arrow-up
      6
      arrow-down
      1
      ·
      9 hours ago

      It doesn’t really matter that it’s still a long time away, once it arrives all previous messages could potentially be decrypted. Messages can be intercepted and stored, and I would bet a lot that an organization like the NSA does this. Feels to me like it’s more of a better be safe them sorry thing.

      • futatorius@lemm.ee
        link
        fedilink
        English
        arrow-up
        1
        ·
        3 hours ago

        There are encyption methods in existence that are resistant to any likely implementation of quantum computing as it’s now understood. It may be that, in the future, quantum computing is developed to be better able to crack those ciphers, but it’s equally likely that other methods of encryption will be developed that are even more resistant to quantum cracking.

      • Voroxpete
        link
        fedilink
        English
        arrow-up
        2
        ·
        5 hours ago

        Again, what you’re not clocking here is that it will be a very, very long time before we have sufficient quantum compute time available to engage in large scale decryption. Even just getting to the point where they can decrypt all newly generated messages will be a long time. By that point you’d have decades of historical messages to did through.

        Barring some wild, out of nowhere leap forward in the feasibility, scalability and affordability of the tech, you’ll be dead by the time the NSA gets around to reading your old messages.

        • Thekingoflorda@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          arrow-down
          1
          ·
          4 hours ago

          But they don’t have to dig trough all messages though. They can target specific people or organizations. And the fact that there is a possibility that this happens within the next 50 years, is a concern for spy agencies and other organizations with sensitive data.

    • drosophila@lemmy.blahaj.zone
      link
      fedilink
      English
      arrow-up
      1
      ·
      9 hours ago

      Even if it takes 100+ years for quantum cryptanalysis to become viable I would rather we start switching over to better algorithms now.

    • TimeSquirrel@kbin.melroy.org
      link
      fedilink
      arrow-up
      8
      arrow-down
      1
      ·
      21 hours ago

      Also getting tired of people associating the word “quantum” with futuristic or extremely advanced, thinking somehow they will supercharge AI or something.

      All it means is the idea that everything is discrete packets of energy, or “quanta”, existing in various fields. It’s a mathematical model to describe what we see. That’s it.

      • Voroxpete
        link
        fedilink
        English
        arrow-up
        10
        ·
        edit-2
        5 hours ago

        In the case of quantum computing, there is a real meaning to it (in really vague terms, its computing using the suoerposition of quantum states to collapse extraordinarily complex problems down to a single answer). The problem rather is that right now companies are eagerly hyping this tech as being “just around the corner” when it’s nothing of the sort (unless a bunch of massive breakthroughs suddenly turn up).

      • vane@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        18 hours ago

        I think that’s enough to be honest because reality exists only when we look at it.

  • 7rokhym@lemmy.ca
    link
    fedilink
    English
    arrow-up
    4
    arrow-down
    1
    ·
    17 hours ago

    “With regard to the algorithms used to hash data – particularly SHA-224 and SHA-256 – Buchanan expressed surprise that neither will be approved for use beyond 2030.”

    Sounds like corruption to me. Hey gov’t pal, let’s make crazy requirements for security due to a quantum boogyman so I can sell you consultants and all new equipment with insane processing capabilities for a shit ton of money. Look for the greasy palms.

    Decades of research and we are at 100 qbits and estimates are bouncing around that estimate it will take millions. Once we build them, job #1 will be reading government email?

    Maybe, but it’s a lot easier just to use backdoors, software bugs, spies, and good ol’ bribes.

  • tkw8@lemm.ee
    link
    fedilink
    English
    arrow-up
    9
    ·
    edit-2
    22 hours ago

    … plans emerged last week when the Australian Signals Directorate (ASD) published guidance for High Assurance Cryptographic Equipment (HACE) – devices that send and/or receive sensitive information – that calls for disallowing the cryptographic algorithms SHA-256, RSA, ECDSA and ECDH, among others, by the end of this decade.

    With regard to the algorithms used to hash data – particularly SHA-224 and SHA-256 – Buchanan expressed surprise that neither will be approved for use beyond 2030.

    “The migration within five years will not be easy, as every single web connection currently uses ECDH and RSA/ECDSA,” he wrote. “These methods are also used for many other parts of a secure infrastructure.”

    Looks like we could be in for interesting times.