On 1/2/25 20:47, Robert J. Hansen wrote:
[...]

I have also long suspected that, while RSA key lengths beyond 4096 bits have diminishing returns against conventional computing, they may be more secure against quantum computing, perhaps even with increasing returns.

Following the (very rough) rule of thumb that each additional bit requires two additional qubits, then yes, RSA can in some sense be viewed as post-quantum already, since you can ratchet its difficulty up arbitrarily to whatever level of quantum resistance you want. Afraid of an adversary with science fiction hardware and a 20kbit ensemble? Use RSA-16384 and sleep easy.

Do I understand correctly that, while the complexity of conventional factoring scales with a logarithm of RSA key length, Shor's algorithm has a space requirement that scales linearly, but the engineering challenges implied by that linear growth scale exponentially?

Examples from Wikipedia ("Key size") include a 3072-bit RSA key having a 2**128 work factor, but reaching 2**256 against /conventional/ computing requires a 15360-bit RSA key.  On the other hand, those same RSA keys would require 15k and 75k qubits, respectively?  Are those figures including error correction or /before/ error correction?

I am wholly in favor of research into PQC and encourage the adoption of PQC where appropriate. However, I am also wholly in favor of thinking deeply on the words "where appropriate".

Agreed.  I also suspect that we may have practically-relevant PQC right under our noses, right now:  RSA.

Also, can you cite a good source for how Shor's algorithm scales?

https://arxiv.org/pdf/quant-ph/9602016 is the standard paper. I seem to recall we've improved on it slightly since, but not by much.

Thank you.  I will enjoy reading that later.

 And how do analogous attacks on elliptic curve cryptosystems scale?

My understanding (which is limited: I'm not Scott Aaronson) is that Shor's algorithm, expressed in its most generic form, applies to any hidden-subgroup problem. That means discrete logs will fall to it in a similar way. I can't guarantee the 5N+1 rule will hold true, but I would definitely expect a kN+c rule with small values for k and c.

Do the mathematical complexities that prevent conventional computing from making short work of 256-bit ECC keys also affect Shor's algorithm?

If not, that would mean that RSA is actually /stronger/ against future threats and TLS should be moving back to RSA and Diffie-Hellman posthaste.


-- Jacob


_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to