[146778] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] Why prefer symmetric crypto over public key

daemon@ATHENA.MIT.EDU (Tony Arcieri)
Sat Sep 7 18:59:53 2013

X-Original-To: cryptography@metzdowd.com
In-Reply-To: <522B8631.1070002@sonic.net>
From: Tony Arcieri <bascule@gmail.com>
Date: Sat, 7 Sep 2013 15:40:08 -0700
To: Ray Dillinger <bear@sonic.net>
Cc: Crypto <cryptography@metzdowd.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

--===============7198341901600079255==
Content-Type: multipart/alternative; boundary=047d7b604d0281594304e5d2d7b6

--047d7b604d0281594304e5d2d7b6
Content-Type: text/plain; charset=ISO-8859-1

On Sat, Sep 7, 2013 at 1:01 PM, Ray Dillinger <bear@sonic.net> wrote:

> And IIRC, pretty much every asymmetric ciphersuite (including all public-
> key crypto) is vulnerable to some transformation of Shor's algorithm that
> is in fact practical to implement on such a machine.


Lattice-based (NTRU) or code-based (McEliece/McBits) public key systems are
still considered "post-quantum" algorithms. There are no presently known
quantum algorithms that work against these sorts of systems.

See http://pqcrypto.org/

-- 
Tony Arcieri

--047d7b604d0281594304e5d2d7b6
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">On Sat, Sep 7, 2013 at 1:01 PM, Ray Dillinger <span dir=3D=
"ltr">&lt;<a href=3D"mailto:bear@sonic.net" target=3D"_blank" onclick=3D"wi=
ndow.open(&#39;https://mail.google.com/mail/?view=3Dcm&amp;tf=3D1&amp;to=3D=
bear@sonic.net&amp;cc=3D&amp;bcc=3D&amp;su=3D&amp;body=3D&#39;,&#39;_blank&=
#39;);return false;">bear@sonic.net</a>&gt;</span> wrote:<br>

<div class=3D"gmail_extra"><div class=3D"gmail_quote"><blockquote class=3D"=
gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left-width:1px;border=
-left-color:rgb(204,204,204);border-left-style:solid;padding-left:1ex"><div=
 class=3D"im">

<span style=3D"color:rgb(34,34,34)">And IIRC, pretty much every asymmetric =
ciphersuite (including all public-</span><br></div>
key crypto) is vulnerable to some transformation of Shor&#39;s algorithm th=
at<br>
is in fact practical to implement on such a machine.</blockquote><div><br><=
/div><div>Lattice-based (NTRU) or code-based (McEliece/McBits) public key s=
ystems are still considered &quot;post-quantum&quot; algorithms. There are =
no presently known quantum algorithms that work against these sorts of syst=
ems.</div>

<div><br></div><div>See=A0<a href=3D"http://pqcrypto.org/">http://pqcrypto.=
org/</a></div><div>=A0</div></div>-- <br>Tony Arcieri<br>
</div></div>

--047d7b604d0281594304e5d2d7b6--

--===============7198341901600079255==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography
--===============7198341901600079255==--

home help back first fref pref prev next nref lref last post