• tym@lemmy.world
    link
    fedilink
    English
    arrow-up
    19
    arrow-down
    4
    ·
    17 hours ago

    This isn’t the flex you think it is, OP. 99% of cybercriminals are also cowards. Physical security of ANY kind beats even the best password managers.

    If you don’t know what lattice-based encryption is and how to purchase it through NordVPN, start reading up because encryption as we know it isn’t long for this world. Pretty sure they already dragged their feet too long on Bitcoin’s algorithm but the day cracking common ciphers is within the grasp of quantum clusters is the day we all become Amish. Plan accordingly!

    • Cocodapuf@lemmy.world
      link
      fedilink
      English
      arrow-up
      11
      ·
      edit-2
      5 hours ago

      My understanding is that quantum computing has been taken into account for some modern cryptography. And that memory-hard cryptography basically defeats quantum computing solutions. There are a few methods, but one of them is just very long keys, it’s trivial to make a cryptographic key longer.

      So sure, you could defeat some of that with a machine operating with 1024k entangled qbits, (which is… oh man… not an easy task), in which case, wow, congratulations. But what if I increase my key length to 100k? It might take an extra 3 seconds to check the key and log in, but it’ll take an extra 25 years for quantum computing to catch up.

        • procrastitron@lemmy.world
          link
          fedilink
          English
          arrow-up
          7
          ·
          9 hours ago

          Yes and No.

          Yes, everything increases in difficulty but the increases in difficulty are asymmetrical.

          The difficulty of reversing a computation (e.g. reversing a hash or decrypting an encrypted message) grows much faster than just performing the computation (e.g. hashing a message or encrypting one).

          That’s the basis for encryption to begin with.

          It’s also why increasing the size of the problem (e.g. the size of the hash or the size of a private key) makes it harder to crack.

          The threat posed by quantum computing is that it might be feasible to reverse much larger computations than it previously was. The caveat on that, however is that they have a hard limit of what problems they can solve based on the number of qbits they have.

          So for example, let’s say you use RSA for encryption and someone builds a 1024 qbit quantum computer. All you have to do is increase your key size so that it would require 1025 qbits to crack, and then that quantum computer wouldn’t provide an attacker any benefit at all.

          (Of course, they’d still be able to read your old messages, but that’s also a fundamental principle of cryptography; it only protects you for a period of time)