> As I understand it, quantum computers effectively halve the keyspace, so 
> perhaps "suck" is too strong a term, but it isn't completely catastrophic for 
> symmetric encryption the same way it is with RSA/ECC-like pubkey systems.

That's not my understanding.

The document I'm looking at [1] is quite damning and indicates QM systems break 
traditional symmetric ciphers like DES and AES in no time at all using "20 
questions" algorithm:

> If we guess that each iteration will take 1 millisecond, then the total time 
> for a known plaintext attack on DES is going to be 56 milliseconds.
> 
> Cipher systems like AES-256 can also be broken is less than a second.
> 

- Greg

[1] Quantum Computers for Code Breaking, Dave D' Rave, 2600 Magazine

--
Please do not email me anything that you are not comfortable also sharing with 
the NSA.

On Jan 25, 2015, at 11:06 AM, Tony Arcieri <[email protected]> wrote:

> On Sun, Jan 25, 2015 at 11:04 AM, Tao Effect <[email protected]> wrote:
> "More good news: quantum computers suck at breaking symmetric encryption"
> 
> Do you have a citation for that? It conflicts with what I've heard from 
> others.
> 
> As I understand it, quantum computers effectively halve the keyspace, so 
> perhaps "suck" is too strong a term, but it isn't completely catastrophic for 
> symmetric encryption the same way it is with RSA/ECC-like pubkey systems.
> 
> --
> Tony Arcieri

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

_______________________________________________
Messaging mailing list
[email protected]
https://moderncrypto.org/mailman/listinfo/messaging

Reply via email to