Re: [FRIAM] SIKE hack

2022-08-04 Thread Marcus Daniels
Really that sheetrock needed to be replaced anyway. 

-Original Message-
From: Friam  On Behalf Of Steve Smith
Sent: Thursday, August 4, 2022 10:17 AM
To: friam@redfish.com
Subject: Re: [FRIAM] SIKE hack


On 8/4/22 8:32 AM, glen wrote:
...
> Optimism is poison in large doses. I re-learn that lesson every time I 
> think something like "Yeah, I could rewire that" or "Sure, I can mount 
> that to the wall". Pffft. You'd think I could measure twice, cut once 
> by now.
I'm happy when I can get it down to "measure thrice, cut twice"

-. --- - / ...- .- .-.. .. -.. / -- --- .-. ... . / -.-. --- -.. .
FRIAM Applied Complexity Group listserv
Fridays 9a-12p Friday St. Johns Cafe   /   Thursdays 9a-12p Zoom 
https://bit.ly/virtualfriam
to (un)subscribe http://redfish.com/mailman/listinfo/friam_redfish.com
FRIAM-COMIC http://friam-comic.blogspot.com/
archives:  5/2017 thru present https://redfish.com/pipermail/friam_redfish.com/
  1/2003 thru 6/2021  http://friam.383.s1.nabble.com/

-. --- - / ...- .- .-.. .. -.. / -- --- .-. ... . / -.-. --- -.. .
FRIAM Applied Complexity Group listserv
Fridays 9a-12p Friday St. Johns Cafe   /   Thursdays 9a-12p Zoom 
https://bit.ly/virtualfriam
to (un)subscribe http://redfish.com/mailman/listinfo/friam_redfish.com
FRIAM-COMIC http://friam-comic.blogspot.com/
archives:  5/2017 thru present https://redfish.com/pipermail/friam_redfish.com/
  1/2003 thru 6/2021  http://friam.383.s1.nabble.com/


Re: [FRIAM] SIKE hack

2022-08-04 Thread Steve Smith



On 8/4/22 8:32 AM, glen wrote:
...
Optimism is poison in large doses. I re-learn that lesson every time I 
think something like "Yeah, I could rewire that" or "Sure, I can mount 
that to the wall". Pffft. You'd think I could measure twice, cut once 
by now.

I'm happy when I can get it down to "measure thrice, cut twice"

-. --- - / ...- .- .-.. .. -.. / -- --- .-. ... . / -.-. --- -.. .
FRIAM Applied Complexity Group listserv
Fridays 9a-12p Friday St. Johns Cafe   /   Thursdays 9a-12p Zoom 
https://bit.ly/virtualfriam
to (un)subscribe http://redfish.com/mailman/listinfo/friam_redfish.com
FRIAM-COMIC http://friam-comic.blogspot.com/
archives:  5/2017 thru present https://redfish.com/pipermail/friam_redfish.com/
 1/2003 thru 6/2021  http://friam.383.s1.nabble.com/


Re: [FRIAM] SIKE hack

2022-08-04 Thread Gillian Densmore
藍 is it bad I read the subject as Psych!(as in the slang) quantum
encryption broken.
I thoughtwell I know...just say I probably bring the mode and mean
average age down a few pegs on the list. but uuuh. who the heck still uses
80s-90s highschool slan...oh SIKE! with a S!
I still don't know what contents of the article was. just thought a derpy
misreading of email might make someones day!

On Thu, Aug 4, 2022 at 8:33 AM glen  wrote:

> I'm reminded of the adage "getting it right, not being right". On a
> similar note, I've seen some stark criticism of this thing:
>
> https://www.uaustin.org/founding-trustees
>
> And, at first blush, the presence of a proud spook like Lonsdale and a
> permanent grievance rhetorician like Heying ring some bells. But, again, if
> we apply "getting it right, not being right", it's easier to doff one's
> filter bubble goggles and see the percolating, co-evolutionary milieu in
> which we stew.
>
> I had to remind a colleague the other day that QC doesn't (really) exist,
> yet. So whatever one's (premature) conclusions might be, just soften a bit.
> The same applies to the crypto-currency space. While it's a crime against
> humanity to write off the suffering of suckers who spent their life's
> savings on some sh¡tcoin only to lose it all as blockchain growing pains,
> "caveat emptor" has been a well-worn phrase for eons. Optimism is poison in
> large doses. I re-learn that lesson every time I think something like
> "Yeah, I could rewire that" or "Sure, I can mount that to the wall". Pffft.
> You'd think I could measure twice, cut once by now.
>
> On 8/4/22 07:00, Sarbajit Roy wrote:
> > The story is dated 3-August, and to think that just last week on 27th
> July 2022 the headline was "... *IBM puts NIST’s quantum-resistant crypto
> to work in Z16 mainframe ... Big Blue says it helped developed the algos,
> so knows what it's doing***"
> >
> >
> https://www.theregister.com/2022/07/27/z16_ibm_post_quantum_crypto/?td=keepreading
> <
> https://www.theregister.com/2022/07/27/z16_ibm_post_quantum_crypto/?td=keepreading
> >
> >
> > On Thu, Aug 4, 2022 at 6:52 PM glen  geprope...@gmail.com>> wrote:
> >
> > Post-quantum crypto cracked in an hour with one core of an ancient
> Xeon
> >
> https://www.theregister.com/2022/08/03/nist_quantum_resistant_crypto_cracked/
> <
> https://www.theregister.com/2022/08/03/nist_quantum_resistant_crypto_cracked/
> >
> >
> >   From SMMRY:
> https://smmry.com/https://www.theregister.com/2022/08/03/nist_quantum_resistant_crypto_cracked/#_LENGTH=7
> <
> https://smmry.com/https://www.theregister.com/2022/08/03/nist_quantum_resistant_crypto_cracked/#_LENGTH=7
> >
> >  > Post-quantum crypto cracked in an hour with one Xeon core The
> Register
> >  > One of the four encryption algorithms the US National Institute
> of Standards and Technology recommended as likely to resist decryption by
> quantum computers has has holes kicked in it by researchers using a single
> core of an Intel Xeon CPU, released in 2013.
> >  >
> >  > Within SIKE lies a public key encryption algorithm and a key
> encapsulated mechanism, each instantiated with four parameter sets:
> SIKEp434, SIKEp503, SIKEp610 and SIKEp751.
> >  >
> >  > "Ran on a single core, the appended Magma code breaks the
> Microsoft SIKE challenges $IKEp182 and $IKEp217 in about 4 minutes and 6
> minutes, respectively. A run on the SIKEp434 parameters, previously
> believed to meet NIST's quantum security level 1, took about 62 minutes,
> again on a single core," wrote Castryck and Decru, of Katholieke
> Universiteit Leuven in a a preliminary article [PDF] announcing their
> discovery.
> >  >
> >  > Quantum-resistant encryption research is a hot topic because it
> is felt that quantum computers are almost certain to become prevalent and
> sufficiently powerful to crack existing encryption algorithms.
> >  >
> >  > Alongside the vintage processor, Castryck and Decru used a key
> recovery attack on the Supersingular Isogeny Diffie-Hellman key exchange
> protocol that was based on Ernest Kani's "Glue-and-split" theorem.
> >  >
> >  > "The attack exploits the fact that SIDH has auxiliary points and
> that the degree of the secret isogeny is known. The auxiliary points in
> SIDH have always been an annoyance and a potential weakness, and they have
> been exploited for fault attacks, the GPST adaptive attack, torsion point
> attacks, etc." argued University of Auckland mathematician Stephen
> Galbraith in his cryptography blog.
> >  >
> >  > Security researcher Kenneth White tweeted his awe and noted "In
> 10-20 yrs we *might* have practical quantum computers, so let's roll out
> replacement PQ crypto now. Which could be trivially broken today, on a
> laptop."
> >
>
>
> --
> ꙮ Mɥǝu ǝlǝdɥɐuʇs ɟᴉƃɥʇ' ʇɥǝ ƃɹɐss snɟɟǝɹs˙ ꙮ
>
> -. --- - / ...- .- .-.. .. -.. / -- --- .-. ... . / -.-. --- -.. .
> FRIAM Applied Complexity Group listserv
> Fridays 9a-12p Friday 

Re: [FRIAM] SIKE hack

2022-08-04 Thread glen

I'm reminded of the adage "getting it right, not being right". On a similar 
note, I've seen some stark criticism of this thing:

https://www.uaustin.org/founding-trustees

And, at first blush, the presence of a proud spook like Lonsdale and a permanent 
grievance rhetorician like Heying ring some bells. But, again, if we apply "getting 
it right, not being right", it's easier to doff one's filter bubble goggles and see 
the percolating, co-evolutionary milieu in which we stew.

I had to remind a colleague the other day that QC doesn't (really) exist, yet. So whatever one's (premature) 
conclusions might be, just soften a bit. The same applies to the crypto-currency space. While it's a crime 
against humanity to write off the suffering of suckers who spent their life's savings on some sh¡tcoin only 
to lose it all as blockchain growing pains, "caveat emptor" has been a well-worn phrase for eons. 
Optimism is poison in large doses. I re-learn that lesson every time I think something like "Yeah, I 
could rewire that" or "Sure, I can mount that to the wall". Pffft. You'd think I could measure 
twice, cut once by now.

On 8/4/22 07:00, Sarbajit Roy wrote:

The story is dated 3-August, and to think that just last week on 27th July 2022 the 
headline was "... *IBM puts NIST’s quantum-resistant crypto to work in Z16 mainframe 
... Big Blue says it helped developed the algos, so knows what it's doing***"

https://www.theregister.com/2022/07/27/z16_ibm_post_quantum_crypto/?td=keepreading 


On Thu, Aug 4, 2022 at 6:52 PM glen mailto:geprope...@gmail.com>> wrote:

Post-quantum crypto cracked in an hour with one core of an ancient Xeon
https://www.theregister.com/2022/08/03/nist_quantum_resistant_crypto_cracked/ 


  From SMMRY: 
https://smmry.com/https://www.theregister.com/2022/08/03/nist_quantum_resistant_crypto_cracked/#_LENGTH=7
 

 > Post-quantum crypto cracked in an hour with one Xeon core The Register
 > One of the four encryption algorithms the US National Institute of 
Standards and Technology recommended as likely to resist decryption by quantum 
computers has has holes kicked in it by researchers using a single core of an 
Intel Xeon CPU, released in 2013.
 >
 > Within SIKE lies a public key encryption algorithm and a key 
encapsulated mechanism, each instantiated with four parameter sets: SIKEp434, 
SIKEp503, SIKEp610 and SIKEp751.
 >
 > "Ran on a single core, the appended Magma code breaks the Microsoft SIKE 
challenges $IKEp182 and $IKEp217 in about 4 minutes and 6 minutes, respectively. A run on 
the SIKEp434 parameters, previously believed to meet NIST's quantum security level 1, took 
about 62 minutes, again on a single core," wrote Castryck and Decru, of Katholieke 
Universiteit Leuven in a a preliminary article [PDF] announcing their discovery.
 >
 > Quantum-resistant encryption research is a hot topic because it is felt 
that quantum computers are almost certain to become prevalent and sufficiently 
powerful to crack existing encryption algorithms.
 >
 > Alongside the vintage processor, Castryck and Decru used a key recovery attack on 
the Supersingular Isogeny Diffie-Hellman key exchange protocol that was based on Ernest 
Kani's "Glue-and-split" theorem.
 >
 > "The attack exploits the fact that SIDH has auxiliary points and that the 
degree of the secret isogeny is known. The auxiliary points in SIDH have always been an 
annoyance and a potential weakness, and they have been exploited for fault attacks, the GPST 
adaptive attack, torsion point attacks, etc." argued University of Auckland 
mathematician Stephen Galbraith in his cryptography blog.
 >
 > Security researcher Kenneth White tweeted his awe and noted "In 10-20 yrs we 
*might* have practical quantum computers, so let's roll out replacement PQ crypto now. Which 
could be trivially broken today, on a laptop."




--
ꙮ Mɥǝu ǝlǝdɥɐuʇs ɟᴉƃɥʇ' ʇɥǝ ƃɹɐss snɟɟǝɹs˙ ꙮ

-. --- - / ...- .- .-.. .. -.. / -- --- .-. ... . / -.-. --- -.. .
FRIAM Applied Complexity Group listserv
Fridays 9a-12p Friday St. Johns Cafe   /   Thursdays 9a-12p Zoom 
https://bit.ly/virtualfriam
to (un)subscribe http://redfish.com/mailman/listinfo/friam_redfish.com
FRIAM-COMIC http://friam-comic.blogspot.com/
archives:  5/2017 thru present https://redfish.com/pipermail/friam_redfish.com/
 1/2003 thru 6/2021  http://friam.383.s1.nabble.com/


Re: [FRIAM] SIKE hack

2022-08-04 Thread Sarbajit Roy
The story is dated 3-August, and to think that just last week on 27th July
2022 the headline was "... *IBM puts NIST’s quantum-resistant crypto to
work in Z16 mainframe ... Big Blue says it helped developed the algos, so
knows what it's doing* "

https://www.theregister.com/2022/07/27/z16_ibm_post_quantum_crypto/?td=keepreading

On Thu, Aug 4, 2022 at 6:52 PM glen  wrote:

> Post-quantum crypto cracked in an hour with one core of an ancient Xeon
>
> https://www.theregister.com/2022/08/03/nist_quantum_resistant_crypto_cracked/
>
>  From SMMRY:
> https://smmry.com/https://www.theregister.com/2022/08/03/nist_quantum_resistant_crypto_cracked/#_LENGTH=7
> > Post-quantum crypto cracked in an hour with one Xeon core The Register
> > One of the four encryption algorithms the US National Institute of
> Standards and Technology recommended as likely to resist decryption by
> quantum computers has has holes kicked in it by researchers using a single
> core of an Intel Xeon CPU, released in 2013.
> >
> > Within SIKE lies a public key encryption algorithm and a key
> encapsulated mechanism, each instantiated with four parameter sets:
> SIKEp434, SIKEp503, SIKEp610 and SIKEp751.
> >
> > "Ran on a single core, the appended Magma code breaks the Microsoft SIKE
> challenges $IKEp182 and $IKEp217 in about 4 minutes and 6 minutes,
> respectively. A run on the SIKEp434 parameters, previously believed to meet
> NIST's quantum security level 1, took about 62 minutes, again on a single
> core," wrote Castryck and Decru, of Katholieke Universiteit Leuven in a a
> preliminary article [PDF] announcing their discovery.
> >
> > Quantum-resistant encryption research is a hot topic because it is felt
> that quantum computers are almost certain to become prevalent and
> sufficiently powerful to crack existing encryption algorithms.
> >
> > Alongside the vintage processor, Castryck and Decru used a key recovery
> attack on the Supersingular Isogeny Diffie-Hellman key exchange protocol
> that was based on Ernest Kani's "Glue-and-split" theorem.
> >
> > "The attack exploits the fact that SIDH has auxiliary points and that
> the degree of the secret isogeny is known. The auxiliary points in SIDH
> have always been an annoyance and a potential weakness, and they have been
> exploited for fault attacks, the GPST adaptive attack, torsion point
> attacks, etc." argued University of Auckland mathematician Stephen
> Galbraith in his cryptography blog.
> >
> > Security researcher Kenneth White tweeted his awe and noted "In 10-20
> yrs we *might* have practical quantum computers, so let's roll out
> replacement PQ crypto now. Which could be trivially broken today, on a
> laptop."
>
>
> --
> ꙮ Mɥǝu ǝlǝdɥɐuʇs ɟᴉƃɥʇ' ʇɥǝ ƃɹɐss snɟɟǝɹs˙ ꙮ
>
> -. --- - / ...- .- .-.. .. -.. / -- --- .-. ... . / -.-. --- -.. .
> FRIAM Applied Complexity Group listserv
> Fridays 9a-12p Friday St. Johns Cafe   /   Thursdays 9a-12p Zoom
> https://bit.ly/virtualfriam
> to (un)subscribe http://redfish.com/mailman/listinfo/friam_redfish.com
> FRIAM-COMIC http://friam-comic.blogspot.com/
> archives:  5/2017 thru present
> https://redfish.com/pipermail/friam_redfish.com/
>   1/2003 thru 6/2021  http://friam.383.s1.nabble.com/
>
-. --- - / ...- .- .-.. .. -.. / -- --- .-. ... . / -.-. --- -.. .
FRIAM Applied Complexity Group listserv
Fridays 9a-12p Friday St. Johns Cafe   /   Thursdays 9a-12p Zoom 
https://bit.ly/virtualfriam
to (un)subscribe http://redfish.com/mailman/listinfo/friam_redfish.com
FRIAM-COMIC http://friam-comic.blogspot.com/
archives:  5/2017 thru present https://redfish.com/pipermail/friam_redfish.com/
  1/2003 thru 6/2021  http://friam.383.s1.nabble.com/


[FRIAM] SIKE hack

2022-08-04 Thread glen

Post-quantum crypto cracked in an hour with one core of an ancient Xeon
https://www.theregister.com/2022/08/03/nist_quantum_resistant_crypto_cracked/

From SMMRY: 
https://smmry.com/https://www.theregister.com/2022/08/03/nist_quantum_resistant_crypto_cracked/#_LENGTH=7

Post-quantum crypto cracked in an hour with one Xeon core The Register
One of the four encryption algorithms the US National Institute of Standards 
and Technology recommended as likely to resist decryption by quantum computers 
has has holes kicked in it by researchers using a single core of an Intel Xeon 
CPU, released in 2013.

Within SIKE lies a public key encryption algorithm and a key encapsulated 
mechanism, each instantiated with four parameter sets: SIKEp434, SIKEp503, 
SIKEp610 and SIKEp751.

"Ran on a single core, the appended Magma code breaks the Microsoft SIKE challenges 
$IKEp182 and $IKEp217 in about 4 minutes and 6 minutes, respectively. A run on the 
SIKEp434 parameters, previously believed to meet NIST's quantum security level 1, took 
about 62 minutes, again on a single core," wrote Castryck and Decru, of Katholieke 
Universiteit Leuven in a a preliminary article [PDF] announcing their discovery.

Quantum-resistant encryption research is a hot topic because it is felt that 
quantum computers are almost certain to become prevalent and sufficiently 
powerful to crack existing encryption algorithms.

Alongside the vintage processor, Castryck and Decru used a key recovery attack on the 
Supersingular Isogeny Diffie-Hellman key exchange protocol that was based on Ernest 
Kani's "Glue-and-split" theorem.

"The attack exploits the fact that SIDH has auxiliary points and that the degree of 
the secret isogeny is known. The auxiliary points in SIDH have always been an annoyance 
and a potential weakness, and they have been exploited for fault attacks, the GPST 
adaptive attack, torsion point attacks, etc." argued University of Auckland 
mathematician Stephen Galbraith in his cryptography blog.

Security researcher Kenneth White tweeted his awe and noted "In 10-20 yrs we *might* 
have practical quantum computers, so let's roll out replacement PQ crypto now. Which 
could be trivially broken today, on a laptop."



--
ꙮ Mɥǝu ǝlǝdɥɐuʇs ɟᴉƃɥʇ' ʇɥǝ ƃɹɐss snɟɟǝɹs˙ ꙮ

-. --- - / ...- .- .-.. .. -.. / -- --- .-. ... . / -.-. --- -.. .
FRIAM Applied Complexity Group listserv
Fridays 9a-12p Friday St. Johns Cafe   /   Thursdays 9a-12p Zoom 
https://bit.ly/virtualfriam
to (un)subscribe http://redfish.com/mailman/listinfo/friam_redfish.com
FRIAM-COMIC http://friam-comic.blogspot.com/
archives:  5/2017 thru present https://redfish.com/pipermail/friam_redfish.com/
 1/2003 thru 6/2021  http://friam.383.s1.nabble.com/