On Tue, Aug 18, 2015 at 07:09:30PM +0200, Tim Kuijsten wrote: > Op 15-08-15 om 21:14 schreef Devin Reade: > >Interesting background info, including recommended minimum key sizes during > >the interim: > > > ><http://m.nsa.gov/ia/programs/suiteb_cryptography/index.shtml> > > > > I find it interesting that symmetric ciphers like 256 bit AES are probably > quantum resistant[0], while all currently used public key systems can be > easily broken with quantum computers (because they're based on integer > factorization and discrete logarithms). So any traffic recorded today[1] > that is using Diffie-Hellman key exchange will be easily broken in the not > so far future. This has made me appreciate pre-shared key systems again.
In practical all today crypto systems are mix of symmetric and asymmetric algos. > > [0] > https://en.wikipedia.org/wiki/Post-quantum_cryptography#Symmetric_Key_Based_Cryptography > [1] "It is the first facility in the world expected to gather and house a > yottabyte – or one thousand trillion gigabytes – of data." > http://blog.governor.utah.gov/2012/02/2012-energy-summit/