this post was submitted on 27 Feb 2025
740 points (98.9% liked)

Technology

63375 readers
6440 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

cross-posted from: https://lemm.ee/post/56769139

cross-posted from: https://sopuli.xyz/post/23170564

you are viewing a single comment's thread
view the rest of the comments
[โ€“] [email protected] 6 points 1 day ago (1 children)

Basically, all encryption multiplies some big prime numbers to get the key

No, not all encryption. First of all there's two main categories of encryption:

  • asymmetrical
  • symmetrical

The most widely used algorithms of asymmetrical encryption rely on the prime factorization problem or similar problems that are weak to quantum computers. So these ones will break. Symmetrical encryption will not break. I'm not saying all this to be a pedant; it's actually significant for the safety of our current communications. Well-designed schemes like TLS and the Signal protocol use a combination of both types because they have complementary strengths and weaknesses. In very broad strokes:

  • asymmetrical encryption is used to initiate the communication because it can verify the identity of the other party
  • an algorithm that is safe against eavesdropping is used to generate a key for symmetric encryption
  • the symmetric key is used to encrypt the payload and it is thrown away after communication is over

This is crucial because it means that even if someone is storing your messages today to decrypt them in the future with a quantum computer they are unlikely to succeed if a sufficiently strong symmetric key is used. They will decrypt the initial messages of the handshake, see the messages used to negotiate the symmetric key, but they won't be able to derive the key because as we said, it's safe against eavesdropping.

So a lot of today's encrypted messages are safe. But in the future a quantum computer will be able to get the private key for the asymmetric encryption and perform a MitM attack or straight-up impersonate another entity. So we have to migrate to post-quantum algorithms before we get to that point.

For storage, only symmetric algorithms are used generally I believe, so that's already safe as is, assuming as always the choice of a strong algorithm and sufficiently long key.

[โ€“] [email protected] 1 points 19 hours ago

That's a comment I was hoping for, thanks :)