On Tue, 15 Aug 2000, David Honig wrote:

[original poster asks :]
> >Essentially what i'm asking is:  How would cryptography evolve once a
> >quantum computer is available?
> >
> 
> Simple.  Use bigger keys.  Bigger by the work-factor that quantum
> computation gives you (see Grover's algorithm).  E.g., a 512-bit symmetric
> block cipher should be good for a few more years, quantum computers
> or not.  3-AES anyone?

yup. but don't forget public key crypto...
what happens if quantum computers become practical :

symmetric crypto : barring specialised attacks for a cipher, 
brute force search goes from 2^n to 2^(n/2) steps. 
So 128 bit keys take 2^64 steps or so to break, 256 bit keys
take 2^128, 512 bit keys take 2^256 steps. So at 256 bits
or higher, you should be fine. 

public-key crypto : factoring and discrete log become "easy."
Thus RSA and Diffie-Hellman and all their cousins become broken.
Search begins in earnest for alternative one-way functions and public-key
cryptosystems. As far as I know,  NTRU doesn't have a quantum algorithm
for breaking it; there may be others. 

Actually, this brings up a point - what weird public-key cryptosystems
not based on factoring or discrete log are there? I can think of
Arithmetica's system and NTRU off the top of my head, but not much more. 

Thanks, 
-David


Reply via email to