110

There's the recent article NSA seeks to build quantum computer that could crack most types of encryption. Now I'm not surprised by the NSA trying anything1, but what slightly baffles me is the word "most" - so, what encryption algorithms are known and sufficiently field-tested that are not severely vulnerable to Quantum Computing?

Mike Ounsworth
  • 59,005
  • 21
  • 158
  • 212
Tobias Kienzler
  • 7,868
  • 11
  • 44
  • 71
  • 2
    Quantum computers are still a ways off. The concept relies on using bits, that when unobserved, are both 1 and 0 and so able to calculate with all the values that can be represented in the given space -- with one calculation.

    As romantic as this sounds, I have yet to hear of a way to calculate with this bits while leaving them unobserved.

    – November Jan 03 '14 at 20:39
  • 1
    Don't assume that just because an organization the size of the NSA is trying to build something that they expect to successfully deploy one anytime soon. Because arms-races are races, often an organization will research something because they don't want to be just starting out when their competitors are deploying one. If the NSA builds up a brain-trust of people who know about quantum computing then they might be able to deploy one ahead of their competitors, and are less likely to be caught flat-footed. – Mike Samuel Jan 03 '14 at 22:49
  • My concern is not the NSA, who might just as well use some less pleasant meatworld methods to obtain one's secrets, but rather the implications of QC in general – Tobias Kienzler Jan 04 '14 at 08:32
  • Why wouldn't quantum computers also enable correspondingly stronger encryption? – mirimir Jan 04 '14 at 09:27
  • @mirimir Who claimed that? Of course there's Quantum Cryptography, but even once available not everyone will be able to afford it I assume, so it's still important to know what classical encryption one can rely upon even if potential eavesdroppers have Quantum Computers – Tobias Kienzler Jan 04 '14 at 15:30
  • 1
    Best to use OTP -in real world and for the virtual world use symmetric algorithms + 256bit keys. look at this http://www.theguardian.com/world/2013/sep/05/nsa-how-to-remain-secure-surveillance – Johny Jan 03 '14 at 18:02
  • @November Slightly modifying this nice Gedankenexperiment, assume a friend of yours went outside before it got cold. Neither you or they know how many gloves (if any) they took with them, but both know where the remaining ones would be; and that, due to the severe cold, your friend would return home for the remaining glove(s) once they noticed some were missing. Assume the same for a friend your friend wanted to meet outside. Now observe whether some of their gloves are at home - and voilà you can determine whether they met outside or come home – Tobias Kienzler Jan 05 '14 at 10:33
  • 7
    @November Your knowledge is outdated. Computations on qbits have been performed. Just not very many. But there’s nothing “romantic” about this concept, it’s been demonstrated in practice. – Konrad Rudolph Jan 05 '14 at 16:38
  • Thanks for correcting me. This is very exciting, do you have a link that explains this more in-depth? – November Jan 05 '14 at 17:54
  • 1
    @November This just came out: http://arxiv.org/pdf/1512.02206v1.pdf It is a bit technical and requires a quite a bit of knowledge to be usable, but I guess most people here are :-) – flindeberg Dec 10 '15 at 10:16