Flipchan writes:

> I dont think so, quantum 4times at fast so we just need to generate 4times as 
> strong keys the entropy will just be bigger, But as Long as we are not useing 
> like 56 bit des keys its okey

You're probably thinking of safety of symmetric encryption, where there
is a quadratic speedup from quantum computers.

https://en.wikipedia.org/wiki/Grover's_algorithm

The situation is a lot worse with public-key encryption, where there
is a much bigger speedup

https://en.wikipedia.org/wiki/Shor%27s_algorithm

So experts generally believe that we don't really need new symmetric
encryption algorithms to defend against quantum computers (things like
AES are OK), but we do need new public-key algorithms (things like RSA
are not OK).  This is discussed in the beginning of

https://www.pqcrypto.org/www.springer.com/cda/content/document/cda_downloaddocument/9783540887010-c1.pdf

-- 
Seth Schoen  <sch...@eff.org>
Senior Staff Technologist                       https://www.eff.org/
Electronic Frontier Foundation                  https://www.eff.org/join
815 Eddy Street, San Francisco, CA  94109       +1 415 436 9333 x107
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to