Key Size - Effect of Quantum Computing Attacks On Key Strength

Effect of Quantum Computing Attacks On Key Strength

The two best known quantum computing attacks are based on Shor's algorithm and Grover's algorithm. Of the two, Shor's offers the greater risk to current security systems.

Derivatives of Shor's algorithm are widely conjectured to be effective against all mainstream public-key algorithms including RSA, Diffie-Hellman and elliptic curve cryptography. According to Professor Gilles Brassard, an expert in quantum computing: "The time needed to factor an RSA integer is the same order as the time needed to use that same integer as modulus for a single RSA encryption. In other words, it takes no more time to break RSA on a quantum computer (up to a multiplicative constant) than to use it legitimately on a classical computer." The general consensus is that these public key algorithms are insecure at any key size if sufficiently large quantum computers capable of running Shor's algorithm become available. The implication of this attack is that all data encrypted using current standards based security systems such as the ubiquitous SSL used to protect e-commerce and Internet banking and SSH used to protect access to sensitive computing systems is at risk. Encrypted data protected using public-key algorithms can be archived and may be broken at a later time.

Mainstream symmetric ciphers (such as AES or Twofish) and collision resistant hash functions (such as SHA) are widely conjectured to offer greater security against known quantum computing attacks. They are widely conjectured to be most vulnerable to Grover's algorithm. Bennett, Bernstein, Brassard, and Vazirani proved in 1996 that a brute-force key search on a quantum computer cannot be faster than roughly 2n/2 invocations of the underlying cryptographic algorithm, compared with roughly 2n in the classical case. Thus in the presence of large quantum computers an n-bit key can provide at least n/2 bits of security. Quantum brute force is easily defeated by doubling the key length, which has little extra computational cost in ordinary use. This implies that at least a 160-bit symmetric key is required to achieve 80-bit security rating against a quantum computer.

Read more about this topic:  Key Size

Famous quotes containing the words effect of, effect, quantum, attacks, key and/or strength:

    What has been the effect of [religious] coercion? To make one half the world fools, and the other half hypocrites. To support roguery and error all over the earth.
    Thomas Jefferson (1743–1826)

    At first I intended to become a student of the Senate rules and I did learn much about them, but I soon found that the Senate had but one fixed rule, subject to exceptions of course, which was to the effect that the Senate would do anything it wanted to do whenever it wanted to do it.
    Calvin Coolidge (1872–1933)

    But how is one to make a scientist understand that there is something unalterably deranged about differential calculus, quantum theory, or the obscene and so inanely liturgical ordeals of the precession of the equinoxes.
    Antonin Artaud (1896–1948)

    I find that with me low spirits and feeble health come and go together. The last two or three months I have had frequent attacks of the blues. They generally are upon me or within me when I am somewhat out of order in bowels, throat, or head.
    Rutherford Birchard Hayes (1822–1893)

    They have thrown away her electric toothbrush, someone else slips
    The key into the lock of her safety-deposit box
    At the Crocker-Anglo Bank; her seat at the cricket matches
    Is warmed by buttocks less delectable than hers.
    Randall Jarrell (1914–1965)

    I believe that Harmon would be the easiest to defeat, though he might gain much strength from the Republicans. Clark would surely lose New York. I am beginning to feel that by some stroke of genius they may name Woodrow Wilson, and that seems a pretty hard tussle.
    William Howard Taft (1857–1930)