I'm reminded of the adage "getting it right, not being right". On a similar 
note, I've seen some stark criticism of this thing:

https://www.uaustin.org/founding-trustees

And, at first blush, the presence of a proud spook like Lonsdale and a permanent 
grievance rhetorician like Heying ring some bells. But, again, if we apply "getting 
it right, not being right", it's easier to doff one's filter bubble goggles and see 
the percolating, co-evolutionary milieu in which we stew.

I had to remind a colleague the other day that QC doesn't (really) exist, yet. So whatever one's (premature) 
conclusions might be, just soften a bit. The same applies to the crypto-currency space. While it's a crime 
against humanity to write off the suffering of suckers who spent their life's savings on some sh¡tcoin only 
to lose it all as blockchain growing pains, "caveat emptor" has been a well-worn phrase for eons. 
Optimism is poison in large doses. I re-learn that lesson every time I think something like "Yeah, I 
could rewire that" or "Sure, I can mount that to the wall". Pffft. You'd think I could measure 
twice, cut once by now.

On 8/4/22 07:00, Sarbajit Roy wrote:
The story is dated 3-August, and to think that just last week on 27th July 2022 the 
headline was "... *IBM puts NIST’s quantum-resistant crypto to work in Z16 mainframe 
... Big Blue says it helped developed the algos, so knows what it's doing***"

https://www.theregister.com/2022/07/27/z16_ibm_post_quantum_crypto/?td=keepreading 
<https://www.theregister.com/2022/07/27/z16_ibm_post_quantum_crypto/?td=keepreading>

On Thu, Aug 4, 2022 at 6:52 PM glen <[email protected] 
<mailto:[email protected]>> wrote:

    Post-quantum crypto cracked in an hour with one core of an ancient Xeon
    https://www.theregister.com/2022/08/03/nist_quantum_resistant_crypto_cracked/ 
<https://www.theregister.com/2022/08/03/nist_quantum_resistant_crypto_cracked/>

      From SMMRY: 
https://smmry.com/https://www.theregister.com/2022/08/03/nist_quantum_resistant_crypto_cracked/#&SM_LENGTH=7
 
<https://smmry.com/https://www.theregister.com/2022/08/03/nist_quantum_resistant_crypto_cracked/#&SM_LENGTH=7>
     > Post-quantum crypto cracked in an hour with one Xeon core The Register
     > One of the four encryption algorithms the US National Institute of 
Standards and Technology recommended as likely to resist decryption by quantum 
computers has has holes kicked in it by researchers using a single core of an 
Intel Xeon CPU, released in 2013.
     >
     > Within SIKE lies a public key encryption algorithm and a key 
encapsulated mechanism, each instantiated with four parameter sets: SIKEp434, 
SIKEp503, SIKEp610 and SIKEp751.
     >
     > "Ran on a single core, the appended Magma code breaks the Microsoft SIKE 
challenges $IKEp182 and $IKEp217 in about 4 minutes and 6 minutes, respectively. A run on 
the SIKEp434 parameters, previously believed to meet NIST's quantum security level 1, took 
about 62 minutes, again on a single core," wrote Castryck and Decru, of Katholieke 
Universiteit Leuven in a a preliminary article [PDF] announcing their discovery.
     >
     > Quantum-resistant encryption research is a hot topic because it is felt 
that quantum computers are almost certain to become prevalent and sufficiently 
powerful to crack existing encryption algorithms.
     >
     > Alongside the vintage processor, Castryck and Decru used a key recovery attack on 
the Supersingular Isogeny Diffie-Hellman key exchange protocol that was based on Ernest 
Kani's "Glue-and-split" theorem.
     >
     > "The attack exploits the fact that SIDH has auxiliary points and that the 
degree of the secret isogeny is known. The auxiliary points in SIDH have always been an 
annoyance and a potential weakness, and they have been exploited for fault attacks, the GPST 
adaptive attack, torsion point attacks, etc." argued University of Auckland 
mathematician Stephen Galbraith in his cryptography blog.
     >
     > Security researcher Kenneth White tweeted his awe and noted "In 10-20 yrs we 
*might* have practical quantum computers, so let's roll out replacement PQ crypto now. Which 
could be trivially broken today, on a laptop."



--
ꙮ Mɥǝu ǝlǝdɥɐuʇs ɟᴉƃɥʇ' ʇɥǝ ƃɹɐss snɟɟǝɹs˙ ꙮ

-. --- - / ...- .- .-.. .. -.. / -- --- .-. ... . / -.-. --- -.. .
FRIAM Applied Complexity Group listserv
Fridays 9a-12p Friday St. Johns Cafe   /   Thursdays 9a-12p Zoom 
https://bit.ly/virtualfriam
to (un)subscribe http://redfish.com/mailman/listinfo/friam_redfish.com
FRIAM-COMIC http://friam-comic.blogspot.com/
archives:  5/2017 thru present https://redfish.com/pipermail/friam_redfish.com/
 1/2003 thru 6/2021  http://friam.383.s1.nabble.com/

Reply via email to