🤣 is it bad I read the subject as Psych!(as in the slang) quantum encryption broken. I thought....well I know...just say I probably bring the mode and mean average age down a few pegs on the list. but uuuh. who the heck still uses 80s-90s highschool slan...oooooh SIKE! with a S! I still don't know what contents of the article was. just thought a derpy misreading of email might make someones day!
On Thu, Aug 4, 2022 at 8:33 AM glen <[email protected]> wrote: > I'm reminded of the adage "getting it right, not being right". On a > similar note, I've seen some stark criticism of this thing: > > https://www.uaustin.org/founding-trustees > > And, at first blush, the presence of a proud spook like Lonsdale and a > permanent grievance rhetorician like Heying ring some bells. But, again, if > we apply "getting it right, not being right", it's easier to doff one's > filter bubble goggles and see the percolating, co-evolutionary milieu in > which we stew. > > I had to remind a colleague the other day that QC doesn't (really) exist, > yet. So whatever one's (premature) conclusions might be, just soften a bit. > The same applies to the crypto-currency space. While it's a crime against > humanity to write off the suffering of suckers who spent their life's > savings on some sh¡tcoin only to lose it all as blockchain growing pains, > "caveat emptor" has been a well-worn phrase for eons. Optimism is poison in > large doses. I re-learn that lesson every time I think something like > "Yeah, I could rewire that" or "Sure, I can mount that to the wall". Pffft. > You'd think I could measure twice, cut once by now. > > On 8/4/22 07:00, Sarbajit Roy wrote: > > The story is dated 3-August, and to think that just last week on 27th > July 2022 the headline was "... *IBM puts NIST’s quantum-resistant crypto > to work in Z16 mainframe ... Big Blue says it helped developed the algos, > so knows what it's doing***" > > > > > https://www.theregister.com/2022/07/27/z16_ibm_post_quantum_crypto/?td=keepreading > < > https://www.theregister.com/2022/07/27/z16_ibm_post_quantum_crypto/?td=keepreading > > > > > > On Thu, Aug 4, 2022 at 6:52 PM glen <[email protected] <mailto: > [email protected]>> wrote: > > > > Post-quantum crypto cracked in an hour with one core of an ancient > Xeon > > > https://www.theregister.com/2022/08/03/nist_quantum_resistant_crypto_cracked/ > < > https://www.theregister.com/2022/08/03/nist_quantum_resistant_crypto_cracked/ > > > > > > From SMMRY: > https://smmry.com/https://www.theregister.com/2022/08/03/nist_quantum_resistant_crypto_cracked/#&SM_LENGTH=7 > < > https://smmry.com/https://www.theregister.com/2022/08/03/nist_quantum_resistant_crypto_cracked/#&SM_LENGTH=7 > > > > > Post-quantum crypto cracked in an hour with one Xeon core The > Register > > > One of the four encryption algorithms the US National Institute > of Standards and Technology recommended as likely to resist decryption by > quantum computers has has holes kicked in it by researchers using a single > core of an Intel Xeon CPU, released in 2013. > > > > > > Within SIKE lies a public key encryption algorithm and a key > encapsulated mechanism, each instantiated with four parameter sets: > SIKEp434, SIKEp503, SIKEp610 and SIKEp751. > > > > > > "Ran on a single core, the appended Magma code breaks the > Microsoft SIKE challenges $IKEp182 and $IKEp217 in about 4 minutes and 6 > minutes, respectively. A run on the SIKEp434 parameters, previously > believed to meet NIST's quantum security level 1, took about 62 minutes, > again on a single core," wrote Castryck and Decru, of Katholieke > Universiteit Leuven in a a preliminary article [PDF] announcing their > discovery. > > > > > > Quantum-resistant encryption research is a hot topic because it > is felt that quantum computers are almost certain to become prevalent and > sufficiently powerful to crack existing encryption algorithms. > > > > > > Alongside the vintage processor, Castryck and Decru used a key > recovery attack on the Supersingular Isogeny Diffie-Hellman key exchange > protocol that was based on Ernest Kani's "Glue-and-split" theorem. > > > > > > "The attack exploits the fact that SIDH has auxiliary points and > that the degree of the secret isogeny is known. The auxiliary points in > SIDH have always been an annoyance and a potential weakness, and they have > been exploited for fault attacks, the GPST adaptive attack, torsion point > attacks, etc." argued University of Auckland mathematician Stephen > Galbraith in his cryptography blog. > > > > > > Security researcher Kenneth White tweeted his awe and noted "In > 10-20 yrs we *might* have practical quantum computers, so let's roll out > replacement PQ crypto now. Which could be trivially broken today, on a > laptop." > > > > > -- > ꙮ Mɥǝu ǝlǝdɥɐuʇs ɟᴉƃɥʇ' ʇɥǝ ƃɹɐss snɟɟǝɹs˙ ꙮ > > -. --- - / ...- .- .-.. .. -.. / -- --- .-. ... . / -.-. --- -.. . > FRIAM Applied Complexity Group listserv > Fridays 9a-12p Friday St. Johns Cafe / Thursdays 9a-12p Zoom > https://bit.ly/virtualfriam > to (un)subscribe http://redfish.com/mailman/listinfo/friam_redfish.com > FRIAM-COMIC http://friam-comic.blogspot.com/ > archives: 5/2017 thru present > https://redfish.com/pipermail/friam_redfish.com/ > 1/2003 thru 6/2021 http://friam.383.s1.nabble.com/ >
-. --- - / ...- .- .-.. .. -.. / -- --- .-. ... . / -.-. --- -.. . FRIAM Applied Complexity Group listserv Fridays 9a-12p Friday St. Johns Cafe / Thursdays 9a-12p Zoom https://bit.ly/virtualfriam to (un)subscribe http://redfish.com/mailman/listinfo/friam_redfish.com FRIAM-COMIC http://friam-comic.blogspot.com/ archives: 5/2017 thru present https://redfish.com/pipermail/friam_redfish.com/ 1/2003 thru 6/2021 http://friam.383.s1.nabble.com/
