Oddbean new post about | logout
 Quick query using LMs

Q1:

Several post-quantum cryptography schemes and algorithms are being developed and implemented to resist potential attacks from future quantum computers. Some notable examples include:

1. Open Quantum Safe (OQS) project: Aims to integrate current post-quantum schemes in one library, including algorithms like Ring Learning with Errors (LWE) key exchange (BCNS15 and NewHope) and Module Learning With Error (ML-KEM) (CRYSTALS-Kyber).
2. Frodo: A learning-with-errors (LWE) based key exchange algorithm.
 NTRU Encrypt: A lattice-based encryption algorithm with a relatively small public key size (766.25 B) and private key size (842.875 B).
3. Random Linear Code based encryption (RLCE): A scheme with a larger public key size (115 kB) and smaller private key size (3 kB).

>Note
Additionally, the National Institute of Standards and Technology (NIST) has announced its first quantum-resistant algorithms, based on structured lattices and hash functions, which could resist quantum computer attacks.

 
 Q2:

Post-Quantum Cryptography: One approach to combat quantum attacks on classical encryption is to transition to post-quantum cryptography (PQC). PQC algorithms rely on mathematical problems that are believed to be hard for both classical and quantum computers, such as lattice-based, code-based, and multivariate cryptography. Implementing PQC standards and protocols would ensure continued security even if quantum computers become powerful enough to break classical encryption.

Key Exchange and Rekeying: Another strategy is to focus on key exchange and rekeying mechanisms. In the event of a quantum computer breaking classical encryption, rekeying with fresh, post-quantum secure keys would mitigate the impact. This approach would require frequent key updates and efficient key management systems.

Hybrid Approach: A hybrid approach combines classical and post-quantum cryptography. This involves using classical encryption for initial communication and then transitioning to post-quantum encryption for sensitive data or long-term storage. This hybrid approach would provide a temporary buffer against quantum attacks while PQC standards are widely adopted.

Error-Correcting Codes: Improving error-correcting codes for quantum computers could also help combat quantum attacks. By reducing the number of physical qubits required for logical qubits, error-correcting codes could make it more difficult for quantum computers to achieve a sufficient number of qubits to break classical encryption.

Quantum-Resistant Hash Functions: Developing quantum-resistant hash functions would provide an additional layer of security. Hash functions are used in digital signatures and message authentication codes, and quantum-resistant variants would ensure the integrity of data even if quantum computers become powerful enough to break classical hash functions.

Monitoring and Adaptation: Finally, it's essential to continuously monitor the development of quantum computing and adapt cryptographic protocols and algorithms accordingly. This would involve staying informed about advancements in quantum computing, assessing their potential impact on cryptography, and updating cryptographic standards and practices as needed.
 
 Thsnks for this.

I saw where HCSB (bank) has created an optical key hardware. 

The assumption is that once a Qubit (sent as a proton) is observed, its state changes and therefore becomes unreadable (decryptable) as what it once was it no longer is.

Might work for a bank but not seeing how the average person will combat decryption  
 There are services that have implemented already some of these solutions,  check them out,  one is Mullvad VPN,  someone sent me this snapshot while discussing the same subject in a CyberSec forum

https://image.nostr.build/e49ee8407cca0cfb97da343f060441a229935b468a541d807087c1f79a700575.jpg
 
 IT is so fascinating to me.

Back in the ‘80’s I “knew it all”.

Sheesh…now even Google Analytics is so advanced one benefits from certification in that LOL

Simply amazing to me🥸 
 And yet,  most IT current workforce needs to reinvent themselves and fast,  AI is taking already all low entry level jobs,  but that will come soon to medium and high level,  very few niches will still require the human labor