[Noisebridge-discuss] Secheduling a Cryptography Talk at Noisebridge on 4 August

John Shutt john.d.shutt at gmail.com
Tue Jul 26 16:54:31 UTC 2016

Thanks, Peter! I’ll add it to the calendar.
> On Jul 24, 2016, at 11:36 PM, Peter Schwabe <peter at cryptojedi.org> wrote:
> John Shutt <john.d.shutt at gmail.com> wrote:
>> Yep, a short abstract would be good. Thanks!
> Dear John, dear all,
> Sorry for the late response, how about this one:
> Title: Post-quantum crypto
> Abstract: In 2012, Mark Ketchen, researcher at IBM, stated about large
>          quantum computers that they are "within reach" and estimated
>          a timespan of 10 to 15 years until such computers can be
>          built. It is not clear if Ketchen is right with this estimate,
>          it is not even clear if a large quantum computer will ever be
>          built. However, what is clear is that such a computer will be
>          able to break all asymmetric cryptography in wide use today.
>          More specifically, it will break in polynomial time systems
>          that are based on factoring (like RSA) and systems based on
>          the discrete logarithm (like DSA, and Diffie-Hellman key
>          exchange), including their elliptic-curve variants.
>          There are asymmetric cryptographic systems that, as far as we
>          know, are not broken by quantum computers, so called
>          "post-quantum cryptography". It is obvious that once large
>          quantum computers exist, the world will need to switch to such
>          post-quantum schemes. However, users who are concerned about
>          long-term security, have to switch to post-quantum schemes for
>          confidentiality already now: an attacker who records and
>          stores key exchanges today can go back in a decade or two and
>          use a quantum computer to attack them. 
>          In my talk I will give a brief overview of post-quantum crypto
>          and then highlight what we can, and should, already do today
>          to provide long-term security in cryptographic systems. In
>          particular, I will present the "NewHope" key exchange, which
>          is currently used in an experiment by Google and is one of the
>          candidates to be considered for post-quantum key exchange in
>          Tor.
> Cheers,
> Peter

More information about the Noisebridge-discuss mailing list