Comments
Start Preparing Now for the Post-Quantum Future
Newest First  |  Oldest First  |  Threaded View
timhollebeek
50%
50%
timhollebeek,
User Rank: Author
1/2/2019 | 1:41:25 PM
Re: Classical is better
It is true that potential number-theoretic breakthroughs could threaten RSA before quantum computers do.  I know several experts who view this as an additional reason to move to post-quantum methods before that happens.

However, it is not true that smart people have ignored or neglected the problem of finding better classical factoring algorithms.  Plenty of effort has been expended by some extremely smart number theoreticians for a long, long time, yet 2048-bit numbers still cannot be factored in "minutes" as you suggest.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
12/29/2018 | 6:21:10 PM
trumping the 5G race
Making these trends all the more important is the notion that secure quantum communications will be the next big thing after 5G -- and, thus, critical to national security, as highlighted by a recent USAF report.

In particular, the report pointed to recent experiments involving a Chinese launched satellite from which tthe altering of quantum subparticles entangled with quantum subparticles on Earth affected the latter subparticles -- and further experimentation in that field by scientists around the globe.
fojo123
50%
50%
fojo123,
User Rank: Apprentice
12/29/2018 | 7:27:56 AM
Classical is better
"While some of the world's brightest minds are working on "quantum-safe" encryption mechanisms, the process will take time..."

 

It's all very well being "some of the world's brightest minds", but when number theoretic problems like integer factoriation are solved in practically fast polynomial time on classical computers, thanks to a very deep understanding of number theory translated into clever and efficient algorithms that can break RSA-1024, 2048 or 4096 in a matter of minutes, then quantum computers will become a rather moot point. It's like saying I can build a ten tonne hydraulic steam hammer press, and it can crack all types of nuts instantly, including cashews, walnuts, almonds and brazils, when in fact a small, hand-held vise-like tool can perform the job just as well, and with magnitudes less effort and expense. Added further to that, is the fact that with quantum computers, there's a form of 'quantum cop-out', where we have no greater understanding of number theory than we did before, we simply rely on quantum spookiness to solve our problems for us, instead of old fashioned ingenuity, tenacity and resilience when tackling difficult mathematical problems. You'd be suprised how far you could progress in solving these problems classically, if you but only tried. Maybe some old-fashioned discernment and wisdom would go a long way in general in the modern world. If as many people as are working on quantum computers, worked with as much effort and enthusiasm on understanding number theory problems, then these problems would have been solved satisfactorily quickly and efficiently many years ago, all the while increasing our insight into the nature of these problems, and having many important and useful corollaries and knock-on effects in other fields as well.   


Government Shutdown Brings Certificate Lapse Woes
Curtis Franklin Jr., Senior Editor at Dark Reading,  1/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-6487
PUBLISHED: 2019-01-18
TP-Link WDR Series devices through firmware v3 (such as TL-WDR5620 V3.0) are affected by command injection (after login) leading to remote code execution, because shell metacharacters can be included in the weather get_weather_observe citycode field.
CVE-2018-20735
PUBLISHED: 2019-01-17
** DISPUTED ** An issue was discovered in BMC PATROL Agent through 11.3.01. It was found that the PatrolCli application can allow for lateral movement and escalation of privilege inside a Windows Active Directory environment. It was found that by default the PatrolCli / PATROL Agent application only...
CVE-2019-0624
PUBLISHED: 2019-01-17
A spoofing vulnerability exists when a Skype for Business 2015 server does not properly sanitize a specially crafted request, aka "Skype for Business 2015 Spoofing Vulnerability." This affects Skype.
CVE-2019-0646
PUBLISHED: 2019-01-17
A Cross-site Scripting (XSS) vulnerability exists when Team Foundation Server does not properly sanitize user provided input, aka "Team Foundation Server Cross-site Scripting Vulnerability." This affects Team.
CVE-2019-0647
PUBLISHED: 2019-01-17
An information disclosure vulnerability exists when Team Foundation Server does not properly handle variables marked as secret, aka "Team Foundation Server Information Disclosure Vulnerability." This affects Team.