[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

Re: How NSA access was built into Windows



On Thu, 2007-01-18 at 11:18 -0600, Bruno Wolff III wrote:
> On Thu, Jan 18, 2007 at 07:58:19 -0600,
>   Marc Schwartz <marc_schwartz comcast net> wrote:
> > 
> > If that was reality, then all bets are off, because quantum computers
> > would be reasonably expected to render all current and generally
> > available cryptosystems useless.
> 
> I don't believe that is true. I do believe that RSA public key systems
> are toast under that assumption though.

The basic premise of toasting RSA PKI systems would be the exponentially
increased ability to factor very large numbers. This would involve
Schor's approach.

If one has access to such computational power and algorithms, it would
similarly make brute force attacks on other algorithms subject to
substantial reduction in time requirements by reducing the effective key
space by a factor of two, I believe, presuming worst case scenarios of
searching all possible keys.

So, these days, certainly anything less than 256 bit keys (net 128 bits)
would become susceptible to exhaustive key searches on such a platform.
128 bit keys would effectively become no stronger than 64 bit keys and
so on.

How many folks today are using symmetric key based systems with key
lengths over 128 bits?  I am.

Bear in mind that when the USG announced that AES could be used to
protect Top Secret information, they only approved it at 192 or 256 bit
key lengths, not at 128.

Of course, in all computations, we are presuming that all keys would
actually have to be attempted. On average it would take a quantum
computer time that is proportional to the square root of the size of the
effective key space to identify the correct key.

Food for thought.

HTH,

Marc Schwartz



[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]