this post was submitted on 24 Jun 2024
80 points (97.6% liked)

Asklemmy

44630 readers
1104 users here now

A loosely moderated place to ask open-ended questions

Search asklemmy ๐Ÿ”

If your post meets the following criteria, it's welcome here!

  1. Open-ended question
  2. Not offensive: at this point, we do not have the bandwidth to moderate overtly political discussions. Assume best intent and be excellent to each other.
  3. Not regarding using or support for Lemmy: context, see the list of support communities and tools for finding communities below
  4. Not ad nauseam inducing: please make sure it is a question that would be new to most members
  5. An actual topic of discussion

Looking for support?

Looking for a community?

~Icon~ ~by~ ~@Double_[email protected]~

founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[โ€“] Aux 1 points 7 months ago (1 children)

What do you mean by useless? These are standard algorithms used everywhere. Get your head out of the sand.

[โ€“] [email protected] 0 points 7 months ago* (last edited 7 months ago)

Yeah, and they all bootstrap using things like Diffie-Hellman, and intrinsically must. Which are broken by Shor's algorithm. For example, a TLS connection could use TLS_ECDHE to share a secret and generate a temporary one-time secret, and then move to an AES stream based on that shared secret for the actual data. If a quantum attacker broke that first step, they could read the AES-encrypted data no problem, because they would also have the one-time secret.

Do you have some choice insults for NIST as well? They're putting a lot of effort into things like Kyber, but maybe they don't understand cryptographic protocols as well as you do.