Quantum Computers Are Not a Threat to 128-bit Symmetric Keys

64 points by Shorden


vrolfs

Very nice article. But there is one thing I don't understand. If key exchange algorithms like ECDH are in danger of being broken, then all currently happening symmetric encryption which is set up using ECDH can be recorded now and later decrypted?

This would mean that currently, Alice could record all of Bob's https traffic, and have some hope that in, say, 40 years, she can decrypt it all. Is this understanding correct?

david_chisnall

Interestingly, a lot of IoT things use TLS with AES and pre-shared keys, because even ECDH is hard on tiny embedded devices. This remains secure (as long as the keys are not leaked: the fact that this is hard is a big part of why people don’t do this in other contexts).

Some systems also have a SHA-256-based KDF and a secret that generates an AES key from the secret and a nonce (often a device ID and a random number), which should also be fine, if I understand correctly.

indolering

I knew that there were attacks better than grovers already, but I'm glad we have found an upper limit.