Questions tagged [post-quantum]

aka "quantum resistant"; refers to cryptography running on a classical computer which is resistant to quantum attacks. For algorithms running on a quantum computer, see [quantum-computing].

It is widely know that quantum computers (specifically Shor's algorithm) break our current public-key crypto systems based on RSA and elliptic curves. This includes public key encryption, digital signatures, and Diffie-Hellman key exchange.

Academics are heavily researching alternative public key systems which are resistant to attacks from both classical computers and quantum computers. This field of research is called "Post Quantum Cryptography" - often abbreviated as "PQCrypto".

The list of mathematical techniques that could yield successful post-quantum crypto primitives includes, as of writing May 2016:

12 questions
108
votes
5 answers

What kinds of encryption are _not_ breakable via Quantum Computers?

There's the recent article NSA seeks to build quantum computer that could crack most types of encryption. Now I'm not surprised by the NSA trying anything1, but what slightly baffles me is the word "most" - so, what encryption algorithms are known…
Tobias Kienzler
  • 7,578
  • 10
  • 43
  • 66
7
votes
3 answers

NTRUEncrypt in TLS and GPG encryption

Commonly used cryptosystems like RSA or ECC, on the other hand, will be broken if and when quantum computers become available. - https://tbuktu.github.io/ntru/ How can we introduce NTRU in GPG and TLS to send NTRU-Encrypted emails and communicate…
rubo77
  • 2,350
  • 10
  • 26
  • 48
5
votes
1 answer

Lattice based encryption, current status?

I see that a couple of years ago, post-quantum was a "5+ year horizon" project. Is that still the case? NTRUEncrypt in SSL and GPG encryption As the final comment on that thread said, a two-layer approach, with something currently trusted like RSA,…
MangoCat
  • 53
  • 2
5
votes
2 answers

How safe is this "Multidimensional-Encryption method" (includes xAES, familiar from Unseen.is)?

I would like to ask about this encryption method that I found: USPTO patent and it is related to this question here: A service that claims beyond army level encryption and Unseen.is encryption claims revisited with their proprietary, patented “xAES”…
5
votes
1 answer

Is there readily available encryption algorithms for current computers, that is safe from quantum computers?

Is there readily available encryption algorithms for current computers, that is safe from quantum computers? I know a bunch of currently popular encryption algorithms that are safe from current computers, but significantly weaker against a quantum…
Filip Haglund
  • 1,593
  • 1
  • 11
  • 20
3
votes
1 answer

Is it true that AES-128 and AES-256 are Quantum resistant?

Is it true that with the rise of quantum computers, which is pretty close these days, AES 128 and 256 are resistant? while PGP and RSA are not?
torhub1
  • 115
  • 1
  • 2
  • 3
2
votes
1 answer

Can I render public-key cryptography quantum resistant if I treat even the public keys as secret?

Here is the situation - RSA/ECC is not quantum resistant, because a quantum computer feasibly calculate the private key based on the knowledge of the public key (because the quantum computers tackle much easier the hardness of prime factorization, I…
1
vote
1 answer

Can I trust Post-Quantum VPN for protection against quantum computers?

Should I trust VPN services that provide post-quantum encryption like NewHope for protection against future quantum computers? How can I tell if the connection between me and the VPN is using post-quantum encryption?
Eleanor
  • 91
  • 4
1
vote
0 answers

Creating X509 certificate in C using post-quantum public key algorithm?

I'm trying to implement a self signed x509 certificate that uses a post-quantum (PQ) public key algorithm as the public key algorithm. I looked at the openssl library in c, and the way it's done using RSA. I'm essentially trying to replicate the…
1
vote
1 answer

CECPQ1 key exchange functionality

CECPQ1 (combined elliptic Curve and Post-Quantum Cryptography Key Exchange) is a new key exhange developed by google, which combine X25519 with NewHope (elliptic Curve KE + Post-quantum KE). Google has implemented CECPQ1 in boringSSL But there…
Omar
  • 13
  • 4
0
votes
1 answer

Will the public-key cryptosystem change in a post-quantum state?

I would like to preface this with the information that I am clearly not well versed in crypto, so my understand so far may not be accurate. CISA recently published an advisory Preparing Critical Infrastructure for Post-Quantum Cryptography which…
cutrightjm
  • 1,714
  • 4
  • 18
  • 31
0
votes
1 answer

Python SSL - No Shared Ciphers

I am using a custom Python build, with the liboqs-openssl which is encapsulating pq-algorithms. I generated the certificates using the provided dilithium2 algorithm and wanted to create a simple SSL connection with a Python client and…
Robinbux
  • 3
  • 2