this post was submitted on 18 Dec 2024
93 points (97.9% liked)

Technology

60109 readers
2414 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 2 years ago
MODERATORS
top 13 comments
sorted by: hot top controversial new old
[–] Voroxpete@sh.itjust.works 31 points 1 week ago* (last edited 1 week ago) (5 children)

The notion that quantum computing will make encryption useless anytime in the near future is a wild fantasy.

Yes, the potential exists that a fully realized version of quantum computing might do this. If such a thing actually ends up existing anytime soon. That is a big if. Right now we're still very much in the "Working out if this is even feasible" stage.

Even if fully realized quantum computers become a thing, and do all the things we want them to do, we'll be decades away from having enough of them to be able to apply quantum compute time to any random conversation on the off chance it contains something important. That's like fishing by hocking gold bars into the ocean in the hopes that one of them hits a fish on the way down.

[–] Septimaeus@infosec.pub 3 points 4 days ago

I wouldn’t necessarily say fantasy. Grover’s only requires 2n qubits to brute force, where n is # of bits mod N.

So consider RSA 2048 / AES 128. Still common. You’re probably in range of wifi that uses it. That would only require ~4096 qbs to brute force. For reference, Osprey (2022) had 400+ qbs and Condor (2023) has 1k+ (with ECC it’s lower but can’t remember how much).

Probably within a decade you can rent a machine with enough for these older protocols, and that’s not a very long time to hold onto data if it’s potentially high value. So “fantasy” might be a stretch.

[–] TimeSquirrel@kbin.melroy.org 7 points 1 week ago (2 children)

Also getting tired of people associating the word "quantum" with futuristic or extremely advanced, thinking somehow they will supercharge AI or something.

All it means is the idea that everything is discrete packets of energy, or "quanta", existing in various fields. It's a mathematical model to describe what we see. That's it.

[–] Voroxpete@sh.itjust.works 12 points 1 week ago* (last edited 1 week ago)

In the case of quantum computing, there is a real meaning to it (in really vague terms, its computing using the suoerposition of quantum states to collapse extraordinarily complex problems down to a single answer). The problem rather is that right now companies are eagerly hyping this tech as being "just around the corner" when it's nothing of the sort (unless a bunch of massive breakthroughs suddenly turn up).

[–] vane@lemmy.world 3 points 1 week ago

I think that's enough to be honest because reality exists only when we look at it.

[–] Thekingoflorda@lemmy.world 7 points 1 week ago (2 children)

It doesn’t really matter that it’s still a long time away, once it arrives all previous messages could potentially be decrypted. Messages can be intercepted and stored, and I would bet a lot that an organization like the NSA does this. Feels to me like it’s more of a better be safe them sorry thing.

[–] Voroxpete@sh.itjust.works 2 points 1 week ago (1 children)

Again, what you're not clocking here is that it will be a very, very long time before we have sufficient quantum compute time available to engage in large scale decryption. Even just getting to the point where they can decrypt all newly generated messages will be a long time. By that point you'd have decades of historical messages to did through.

Barring some wild, out of nowhere leap forward in the feasibility, scalability and affordability of the tech, you'll be dead by the time the NSA gets around to reading your old messages.

[–] Thekingoflorda@lemmy.world 1 points 1 week ago

But they don’t have to dig trough all messages though. They can target specific people or organizations. And the fact that there is a possibility that this happens within the next 50 years, is a concern for spy agencies and other organizations with sensitive data.

[–] futatorius@lemm.ee 1 points 1 week ago

There are encyption methods in existence that are resistant to any likely implementation of quantum computing as it's now understood. It may be that, in the future, quantum computing is developed to be better able to crack those ciphers, but it's equally likely that other methods of encryption will be developed that are even more resistant to quantum cracking.

[–] drosophila@lemmy.blahaj.zone 4 points 1 week ago

Even if it takes 100+ years for quantum cryptanalysis to become viable I would rather we start switching over to better algorithms now.

[–] fmstrat@lemmy.nowsci.com 2 points 1 week ago

It's the specifics that matter though. IF this happens, it won't be "random conversations". It will be decrypting Zcash purchases, or specific VPN sessions. It's the reason national defense communication goes through air gapped lines, future proofs against those targeted methods.

[–] tkw8@lemm.ee 9 points 1 week ago* (last edited 1 week ago)

… plans emerged last week when the Australian Signals Directorate (ASD) published guidance for High Assurance Cryptographic Equipment (HACE) – devices that send and/or receive sensitive information – that calls for disallowing the cryptographic algorithms SHA-256, RSA, ECDSA and ECDH, among others, by the end of this decade.

With regard to the algorithms used to hash data – particularly SHA-224 and SHA-256 – Buchanan expressed surprise that neither will be approved for use beyond 2030.

"The migration within five years will not be easy, as every single web connection currently uses ECDH and RSA/ECDSA," he wrote. "These methods are also used for many other parts of a secure infrastructure."

Looks like we could be in for interesting times.

[–] 7rokhym@lemmy.ca 3 points 1 week ago

"With regard to the algorithms used to hash data – particularly SHA-224 and SHA-256 – Buchanan expressed surprise that neither will be approved for use beyond 2030."

Sounds like corruption to me. Hey gov't pal, let's make crazy requirements for security due to a quantum boogyman so I can sell you consultants and all new equipment with insane processing capabilities for a shit ton of money. Look for the greasy palms.

Decades of research and we are at 100 qbits and estimates are bouncing around that estimate it will take millions. Once we build them, job #1 will be reading government email?

Maybe, but it's a lot easier just to use backdoors, software bugs, spies, and good ol' bribes.