On 1/2/25 18:25, Robert J. Hansen via Gnupg-users wrote:
[...]
The lowest common denominator will remain plain ECC or RSA, as it
> is today. That’s bad.
Why? Breaking RSA-4096 via Shor's algorithm is straight out of
science fiction. It requires 8k qubits for the computation alone:
once you take into account error correction, 40k or more qubits, all
in an ensemble with a decoherence time orders of magnitude beyond what
we have today.
*THANK* *YOU*
I have been looking for hard numbers for the applicability of Shor's
algorithm to RSA for a long time. You have just provided the first hard
numbers I have seen. (I knew that at least 4096 qubits would be needed
to hold a result, but apparently it needs far more than that.)
I have also long suspected that, while RSA key lengths beyond 4096 bits
have diminishing returns against conventional computing, they may be
more secure against quantum computing, perhaps even with increasing returns.
Also, can you cite a good source for how Shor's algorithm scales? And
how do analogous attacks on elliptic curve cryptosystems scale? Thanks
in advance.
-- Jacob
_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users