On Mon, 12 Jan 2015 18:48:41 +0000 Ciaran McCreesh wrote:
> On Mon, 12 Jan 2015 19:44:46 +0100
> Kristian Fiskerstrand <k...@gentoo.org> wrote:
> > Shor's would be effective against discrete logs (including ECC) as
> > well, so wouldn't be applicable to this selection. For post-quantum
> > asymmetric crypto we'd likely need e.g a lattice based primitive.
> 
> We're not post-quantum,

Are you sure? The simplest Shor's factorisation machine was already
built and published in open press:
http://arxiv.org/abs/quant-ph/0112176
This was done 14(!!) years ago. I don't doubt there was a
significant progress in this field thereafter. But it is likely
that results are classified.

And Yale university have annonced a serious progress in errors
correction recently:
http://news.yale.edu/2013/01/11/new-qubit-control-bodes-well-future-quantum-computing

> and if we were no-one knows how anything would
> do anyway... Why not stick to threats that actually exist?

They are exist. No agency will announce that they broke RSA
regardless of the key length. This information will be kept
top secret as long as possible, so one should prepare today and
beforehand.

There are post-quantum solutions and implementations, see
app-crypt/codecrypt.

Best regards,
Andrew Savchenko

Attachment: pgpgUJFDhMuDa.pgp
Description: PGP signature

Reply via email to