On 18 August 2015 at 21:30, Артур Истомин <[email protected]>
wrote:

> On Tue, Aug 18, 2015 at 07:09:30PM +0200, Tim Kuijsten wrote:
> > Op 15-08-15 om 21:14 schreef Devin Reade:
> > >Interesting background info, including recommended minimum key sizes
> during the interim:
> > >
> > ><http://m.nsa.gov/ia/programs/suiteb_cryptography/index.shtml>
> > >
> >
> > I find it interesting that symmetric ciphers like 256 bit AES are
> probably
> > quantum resistant[0], while all currently used public key systems can be
> > easily broken with quantum computers (because they're based on integer
> > factorization and discrete logarithms). So any traffic recorded today[1]
> > that is using Diffie-Hellman key exchange will be easily broken in the
> not
> > so far future. This has made me appreciate pre-shared key systems again.
>
> In practical all today crypto systems are mix of symmetric and asymmetric
> algos.
>

Yeah, but if you transmit your symmetric keys via asymmetric encryption,
and the latter can be... you know.


> > [0]
>
https://en.wikipedia.org/wiki/Post-quantum_cryptography#Symmetric_Key_Based_C
ryptography
> > [1] "It is the first facility in the world expected to gather and house a
> > yottabyte – or one thousand trillion gigabytes – of data."
> > http://blog.governor.utah.gov/2012/02/2012-energy-summit/

Reply via email to