Tuesday, August 2, 2022

Post-quantum encryption contender is taken out by single-core PC and 1 hour


Post-quantum encryption contender is taken out by single-core PC and 1 hour

Enlarge (credit: Getty Images)

In the US government's ongoing campaign to protect data in the age of quantum computers, a new and powerful attack that used a single traditional computer to completely break a fourth-round candidate highlights the risks involved in standardizing the next generation of encryption algorithms.

Last month, the US Department of Commerce's National Institute of Standards and Technology, or NIST, selected four post-quantum computing encryption algorithms to replace algorithms like RSA, Diffie-Hellman, and elliptic curve Diffie-Hellman, which are unable to withstand attacks from a quantum computer.

In the same move, NIST advanced four additional algorithms as potential replacements pending further testing in hopes one or more of them may also be suitable encryption alternatives in a post-quantum world. The new attack breaks SIKE, which is one of the latter four additional algorithms. The attack has no impact on the four PQC algorithms selected by NIST as approved standards, all of which rely on completely different mathematical techniques than SIKE.

Read 14 remaining paragraphs | Comments

Reference : https://ift.tt/6kWvJum

No comments:

Post a Comment

The Top 10 Telecommunications Stories of 2024

For IEEE Spectrum readers following telecommunications news in 2024, signals expanding their reach and range animated readers to read mo...