On Tue, Aug 18, 2015 at 07:09:30PM +0200, Tim Kuijsten wrote:
> Op 15-08-15 om 21:14 schreef Devin Reade:
> >Interesting background info, including recommended minimum key sizes during 
> >the interim:
> >
> ><http://m.nsa.gov/ia/programs/suiteb_cryptography/index.shtml>
> >
> 
> I find it interesting that symmetric ciphers like 256 bit AES are probably
> quantum resistant[0], while all currently used public key systems can be
> easily broken with quantum computers (because they're based on integer
> factorization and discrete logarithms). So any traffic recorded today[1]
> that is using Diffie-Hellman key exchange will be easily broken in the not
> so far future. This has made me appreciate pre-shared key systems again.

In practical all today crypto systems are mix of symmetric and asymmetric algos.
> 
> [0] 
> https://en.wikipedia.org/wiki/Post-quantum_cryptography#Symmetric_Key_Based_Cryptography
> [1] "It is the first facility in the world expected to gather and house a
> yottabyte – or one thousand trillion gigabytes – of data."
> http://blog.governor.utah.gov/2012/02/2012-energy-summit/

Reply via email to