top | item 39742147

(no title)

dr_hooo | 1 year ago

I was all for post-quantum crypto until I heard the news about SIKE being broken with a simple computer.

How will you make sure this does not happen to the algorithms you chose?

discuss

order

Tutanota|1 year ago

As all post-quantum crypto is relatively new there is still the risk of it being broken in the future. This is why we combine the new algorithms with classical ones in an hybrid approach so that the encryption stays at least as secure as it is now.

aborsy|1 year ago

By mixing it up with classical encryption algorithms. The implementations don’t use pure post quantum cryptography, see SSH.

defrost|1 year ago

Learn some math.

SIKE was known to be breakable since at least 1997, specific breaking algorithms were developed in 2000, and these were implemented in Magma (a symbolic algebra suite from John Cannon, Sydney Uni, second generation after the original Cayley system of the mid 1980s).

It wasn't a choice that would have been put forward by people in the abstract algebra game - just something put forward as a 'candidate' by security researchers.

Something something Venn diagrams.

dikaio|1 year ago

Little rude, he was just asking a question.

Learn some decency.