Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Are we having fun yet?

Are we having fun yet?

Scheduled Pinned Locked Moved Uncategorized
27 Posts 12 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • sophieschmieg@infosec.exchangeS sophieschmieg@infosec.exchange

    Are we having fun yet?

    Link Preview Image
    Shor's algorithm is possible with as few as 10,000 reconfigurable atomic qubits

    Abstract page for arXiv paper 2603.28627: Shor's algorithm is possible with as few as 10,000 reconfigurable atomic qubits

    favicon

    arXiv.org (arxiv.org)

    tomgag@infosec.exchangeT This user is from outside of this forum
    tomgag@infosec.exchangeT This user is from outside of this forum
    tomgag@infosec.exchange
    wrote last edited by
    #5

    @sophieschmieg from a quick look, this seems a bit... audacious?

    under plausible assumptions, the runtime for discrete logarithms on the P-256 elliptic curve could be just a few days for a system with 26,000
    physical qubits

    sophieschmieg@infosec.exchangeS 1 Reply Last reply
    1
    0
    • R relay@relay.infosec.exchange shared this topic
    • ar1@mastodon.socialA ar1@mastodon.social

      @sophieschmieg is it still "in 8 years we're gonna be able to break all encryption by quantum computers", like in the last 30 years, or is this a real danger? I mean are 10k reconfigurable atomic qubits happening now already? I am a layman, so apologies for an uneducated question.

      sophieschmieg@infosec.exchangeS This user is from outside of this forum
      sophieschmieg@infosec.exchangeS This user is from outside of this forum
      sophieschmieg@infosec.exchange
      wrote last edited by
      #6

      @ar1 the timeline got moved in substantially. Of course things can go wrong for the physicists, but 3 years seems feasible now.

      ar1@mastodon.socialA 1 Reply Last reply
      0
      • tomgag@infosec.exchangeT tomgag@infosec.exchange

        @sophieschmieg from a quick look, this seems a bit... audacious?

        under plausible assumptions, the runtime for discrete logarithms on the P-256 elliptic curve could be just a few days for a system with 26,000
        physical qubits

        sophieschmieg@infosec.exchangeS This user is from outside of this forum
        sophieschmieg@infosec.exchangeS This user is from outside of this forum
        sophieschmieg@infosec.exchange
        wrote last edited by
        #7

        @tomgag these are not the only quantum physicists that have said that recently.

        1 Reply Last reply
        0
        • sophieschmieg@infosec.exchangeS sophieschmieg@infosec.exchange

          Are we having fun yet?

          Link Preview Image
          Shor's algorithm is possible with as few as 10,000 reconfigurable atomic qubits

          Abstract page for arXiv paper 2603.28627: Shor's algorithm is possible with as few as 10,000 reconfigurable atomic qubits

          favicon

          arXiv.org (arxiv.org)

          targetdrone@mastodon.socialT This user is from outside of this forum
          targetdrone@mastodon.socialT This user is from outside of this forum
          targetdrone@mastodon.social
          wrote last edited by
          #8

          @sophieschmieg When people question the aggressive quantum readiness timelines given that 100 qubit computers are all we have today, I have to explain that it's not just a matter of building a computer with a million qubits, but that researchers are still publishing optimizations that may cut that by a factor of 10, or 100, or more. And we simply don't know if or when they'll figure out something better.

          emc2@indieweb.socialE odr_k4tana@infosec.exchangeO 2 Replies Last reply
          0
          • wordshaper@weatherishappening.networkW This user is from outside of this forum
            wordshaper@weatherishappening.networkW This user is from outside of this forum
            wordshaper@weatherishappening.network
            wrote last edited by
            #9

            @sophieschmieg On the one hand a weird focus on cryptocurrency is weird, on the other if we managed to break all of the cryptocurrencies with relatively small/cheap (relatively!) quantum computers I suspect I would laugh so hard I hurt myself. And then I'd send pastries to whoever worked out how to do that because they 100% deserved them.

            1 Reply Last reply
            0
            • targetdrone@mastodon.socialT targetdrone@mastodon.social

              @sophieschmieg When people question the aggressive quantum readiness timelines given that 100 qubit computers are all we have today, I have to explain that it's not just a matter of building a computer with a million qubits, but that researchers are still publishing optimizations that may cut that by a factor of 10, or 100, or more. And we simply don't know if or when they'll figure out something better.

              emc2@indieweb.socialE This user is from outside of this forum
              emc2@indieweb.socialE This user is from outside of this forum
              emc2@indieweb.social
              wrote last edited by
              #10

              @targetdrone @sophieschmieg

              It's that, plus the fact that the day you migrate to PQC, all your *future* comms are safe, but all your past comms *will* be vulnerable some day.

              If those comms contain other key / authentication materials for other parts of the system, then the Adversary will gain access to those as well.

              That, and the unfortunate reality that a lot of orgs will drag their feet on this and you'll have vulnerable crypto in prod probably even after the first utility scale machines.

              targetdrone@mastodon.socialT 1 Reply Last reply
              0
              • targetdrone@mastodon.socialT targetdrone@mastodon.social

                @sophieschmieg When people question the aggressive quantum readiness timelines given that 100 qubit computers are all we have today, I have to explain that it's not just a matter of building a computer with a million qubits, but that researchers are still publishing optimizations that may cut that by a factor of 10, or 100, or more. And we simply don't know if or when they'll figure out something better.

                odr_k4tana@infosec.exchangeO This user is from outside of this forum
                odr_k4tana@infosec.exchangeO This user is from outside of this forum
                odr_k4tana@infosec.exchange
                wrote last edited by
                #11

                @targetdrone @sophieschmieg if we haven't learned from Y2K that preparing for shit quietly in the background pays off, we haven't learned anything.

                argv_minus_one@mastodon.sdf.orgA 1 Reply Last reply
                0
                • emc2@indieweb.socialE emc2@indieweb.social

                  @targetdrone @sophieschmieg

                  It's that, plus the fact that the day you migrate to PQC, all your *future* comms are safe, but all your past comms *will* be vulnerable some day.

                  If those comms contain other key / authentication materials for other parts of the system, then the Adversary will gain access to those as well.

                  That, and the unfortunate reality that a lot of orgs will drag their feet on this and you'll have vulnerable crypto in prod probably even after the first utility scale machines.

                  targetdrone@mastodon.socialT This user is from outside of this forum
                  targetdrone@mastodon.socialT This user is from outside of this forum
                  targetdrone@mastodon.social
                  wrote last edited by
                  #12

                  @emc2 @sophieschmieg On the flip side, quantum attacks will remain expensive for a long time. Nobody's going to spend coin to crack rabbitfanciersforum.com when they could instead profit from cracking verylargebank.com.

                  If I were an attacker, I'd go after the CAs like digicert et al. With a signing key I would forge any site certs I wanted. PQ preparedness won't stop this until the bad CA certs are out of everyone's trust stores.

                  sophieschmieg@infosec.exchangeS emc2@indieweb.socialE 2 Replies Last reply
                  0
                  • targetdrone@mastodon.socialT targetdrone@mastodon.social

                    @emc2 @sophieschmieg On the flip side, quantum attacks will remain expensive for a long time. Nobody's going to spend coin to crack rabbitfanciersforum.com when they could instead profit from cracking verylargebank.com.

                    If I were an attacker, I'd go after the CAs like digicert et al. With a signing key I would forge any site certs I wanted. PQ preparedness won't stop this until the bad CA certs are out of everyone's trust stores.

                    sophieschmieg@infosec.exchangeS This user is from outside of this forum
                    sophieschmieg@infosec.exchangeS This user is from outside of this forum
                    sophieschmieg@infosec.exchange
                    wrote last edited by
                    #13

                    @targetdrone @emc2 yeah, CAs and CT logs are the keys you want.

                    1 Reply Last reply
                    0
                    • targetdrone@mastodon.socialT targetdrone@mastodon.social

                      @emc2 @sophieschmieg On the flip side, quantum attacks will remain expensive for a long time. Nobody's going to spend coin to crack rabbitfanciersforum.com when they could instead profit from cracking verylargebank.com.

                      If I were an attacker, I'd go after the CAs like digicert et al. With a signing key I would forge any site certs I wanted. PQ preparedness won't stop this until the bad CA certs are out of everyone's trust stores.

                      emc2@indieweb.socialE This user is from outside of this forum
                      emc2@indieweb.socialE This user is from outside of this forum
                      emc2@indieweb.social
                      wrote last edited by
                      #14

                      @targetdrone @sophieschmieg

                      Yes, it will be stuff like "we're going to spend the next two months cracking the key agreement on this intercept from such and such embassy we intercepted in 2007", probably for decades after the first utility scale machines exist.

                      However, I could see seemingly lower-value targets getting hit in order to set up aggregation, supply chain, or other attacks.

                      sophieschmieg@infosec.exchangeS targetdrone@mastodon.socialT 2 Replies Last reply
                      0
                      • emc2@indieweb.socialE emc2@indieweb.social

                        @targetdrone @sophieschmieg

                        Yes, it will be stuff like "we're going to spend the next two months cracking the key agreement on this intercept from such and such embassy we intercepted in 2007", probably for decades after the first utility scale machines exist.

                        However, I could see seemingly lower-value targets getting hit in order to set up aggregation, supply chain, or other attacks.

                        sophieschmieg@infosec.exchangeS This user is from outside of this forum
                        sophieschmieg@infosec.exchangeS This user is from outside of this forum
                        sophieschmieg@infosec.exchange
                        wrote last edited by
                        #15

                        @emc2 @targetdrone yeah. In fact I'm worried that in some sense slower and less accessible CRQC paradoxically pose a greater risk to the common people: if, at the extreme but imaginable end, it takes two months to break a key, and you only have one quantum computer, exploiting SNDL for random cables very quickly becomes unsatisfying. And breaking fairly few supply chain keys (CA, CT logs, identity providers, software signing etc) becomes very tempting, even if it risks giving away that you have a CRQC at your disposal. And those supply chain risks in turn put everyone at risk, not just some limited spy games between embassies.

                        emc2@indieweb.socialE 1 Reply Last reply
                        0
                        • odr_k4tana@infosec.exchangeO odr_k4tana@infosec.exchange

                          @targetdrone @sophieschmieg if we haven't learned from Y2K that preparing for shit quietly in the background pays off, we haven't learned anything.

                          argv_minus_one@mastodon.sdf.orgA This user is from outside of this forum
                          argv_minus_one@mastodon.sdf.orgA This user is from outside of this forum
                          argv_minus_one@mastodon.sdf.org
                          wrote last edited by
                          #16

                          @odr_k4tana

                          A lot of people think Y2K was a hoax because there was no huge apocalyptic disaster.

                          For some reason they find it difficult to believe that the huge apocalyptic disaster would have happened if not for the large, costly effort to fix the bugs *before* the big day.

                          @targetdrone @sophieschmieg

                          internic@mathstodon.xyzI 1 Reply Last reply
                          0
                          • emc2@indieweb.socialE emc2@indieweb.social

                            @targetdrone @sophieschmieg

                            Yes, it will be stuff like "we're going to spend the next two months cracking the key agreement on this intercept from such and such embassy we intercepted in 2007", probably for decades after the first utility scale machines exist.

                            However, I could see seemingly lower-value targets getting hit in order to set up aggregation, supply chain, or other attacks.

                            targetdrone@mastodon.socialT This user is from outside of this forum
                            targetdrone@mastodon.socialT This user is from outside of this forum
                            targetdrone@mastodon.social
                            wrote last edited by
                            #17

                            @emc2 @sophieschmieg Breaking a 2048-bit RSA key will likely take a year or more of quantum compute time initially. Using the going rate of $98USD/minute for access to an (inadequate) 100-qubit machine, we can ballpark an initial cost of 8 or 9 figures.

                            You'd have to be absolutely certain of the value of the key you are cracking to realize a return on that kind of investment.

                            emc2@indieweb.socialE 1 Reply Last reply
                            0
                            • targetdrone@mastodon.socialT targetdrone@mastodon.social

                              @emc2 @sophieschmieg Breaking a 2048-bit RSA key will likely take a year or more of quantum compute time initially. Using the going rate of $98USD/minute for access to an (inadequate) 100-qubit machine, we can ballpark an initial cost of 8 or 9 figures.

                              You'd have to be absolutely certain of the value of the key you are cracking to realize a return on that kind of investment.

                              emc2@indieweb.socialE This user is from outside of this forum
                              emc2@indieweb.socialE This user is from outside of this forum
                              emc2@indieweb.social
                              wrote last edited by
                              #18

                              @targetdrone @sophieschmieg

                              I can't go into too much detail (propin, ndas, etc) but the actual cost of a utility scale machine will be in the hundreds of thousands per day. The time will vary depending on the architecture, but you're looking at order months to hit the P-256 curve. RSA is more of a moving target, but expect similar.

                              1 Reply Last reply
                              0
                              • sophieschmieg@infosec.exchangeS sophieschmieg@infosec.exchange

                                @emc2 @targetdrone yeah. In fact I'm worried that in some sense slower and less accessible CRQC paradoxically pose a greater risk to the common people: if, at the extreme but imaginable end, it takes two months to break a key, and you only have one quantum computer, exploiting SNDL for random cables very quickly becomes unsatisfying. And breaking fairly few supply chain keys (CA, CT logs, identity providers, software signing etc) becomes very tempting, even if it risks giving away that you have a CRQC at your disposal. And those supply chain risks in turn put everyone at risk, not just some limited spy games between embassies.

                                emc2@indieweb.socialE This user is from outside of this forum
                                emc2@indieweb.socialE This user is from outside of this forum
                                emc2@indieweb.social
                                wrote last edited by
                                #19

                                @sophieschmieg @targetdrone

                                This is very true, and in fact I would expect targeting more public infrastructure that would allow massive disruption (e.g. Central banks, public utilities in major cities, CAs, etc) to be a better ROI, if you're after disruptive effects.

                                1 Reply Last reply
                                0
                                • sophieschmieg@infosec.exchangeS sophieschmieg@infosec.exchange

                                  Oh, and in case you weren't having enough fun, here are some updated resource estimates for running Shor's on elliptic curves, unfortunately weirdly focused on cryptocurrencies.

                                  Fun fact: I almost found a soundness problem in that zero knowledge proof that was based on a quine. Unfortunately the circuit cannot produce quines.

                                  Link Preview Image
                                  Safeguarding cryptocurrency by disclosing quantum vulnerabilities responsibly

                                  favicon

                                  (research.google)

                                  sophieschmieg@infosec.exchangeS This user is from outside of this forum
                                  sophieschmieg@infosec.exchangeS This user is from outside of this forum
                                  sophieschmieg@infosec.exchange
                                  wrote last edited by
                                  #20

                                  And now also on Ars Technica:

                                  @dangoodin

                                  Link Preview Image
                                  Quantum computers need vastly fewer resources than thought to break vital encryption

                                  No, the sky isn't falling, but Q Day is coming, and it won't be as expensive as thought.

                                  favicon

                                  Ars Technica (arstechnica.com)

                                  1 Reply Last reply
                                  0
                                  • argv_minus_one@mastodon.sdf.orgA argv_minus_one@mastodon.sdf.org

                                    @odr_k4tana

                                    A lot of people think Y2K was a hoax because there was no huge apocalyptic disaster.

                                    For some reason they find it difficult to believe that the huge apocalyptic disaster would have happened if not for the large, costly effort to fix the bugs *before* the big day.

                                    @targetdrone @sophieschmieg

                                    internic@mathstodon.xyzI This user is from outside of this forum
                                    internic@mathstodon.xyzI This user is from outside of this forum
                                    internic@mathstodon.xyz
                                    wrote last edited by
                                    #21

                                    @argv_minus_one In fairness, for people who only have any memory of the 21st century I can understand how the idea of society coming together at scale and spending resources to tackle a foreseeable problem before it becomes a crisis might seem farfetched.
                                    @odr_k4tana @targetdrone @sophieschmieg

                                    argv_minus_one@mastodon.sdf.orgA 1 Reply Last reply
                                    0
                                    • internic@mathstodon.xyzI internic@mathstodon.xyz

                                      @argv_minus_one In fairness, for people who only have any memory of the 21st century I can understand how the idea of society coming together at scale and spending resources to tackle a foreseeable problem before it becomes a crisis might seem farfetched.
                                      @odr_k4tana @targetdrone @sophieschmieg

                                      argv_minus_one@mastodon.sdf.orgA This user is from outside of this forum
                                      argv_minus_one@mastodon.sdf.orgA This user is from outside of this forum
                                      argv_minus_one@mastodon.sdf.org
                                      wrote last edited by
                                      #22

                                      @internic

                                      Society didn't come together at scale. Society, for the most part, was panicked that the end of the world was nigh.

                                      Business leaders are the ones who came together, presumably because they didn't want their businesses to abruptly screech to a halt on 2000-01-01, and hired an army of programmers to fix the bugs.

                                      @odr_k4tana @targetdrone @sophieschmieg

                                      argv_minus_one@mastodon.sdf.orgA 1 Reply Last reply
                                      0
                                      • argv_minus_one@mastodon.sdf.orgA argv_minus_one@mastodon.sdf.org

                                        @internic

                                        Society didn't come together at scale. Society, for the most part, was panicked that the end of the world was nigh.

                                        Business leaders are the ones who came together, presumably because they didn't want their businesses to abruptly screech to a halt on 2000-01-01, and hired an army of programmers to fix the bugs.

                                        @odr_k4tana @targetdrone @sophieschmieg

                                        argv_minus_one@mastodon.sdf.orgA This user is from outside of this forum
                                        argv_minus_one@mastodon.sdf.orgA This user is from outside of this forum
                                        argv_minus_one@mastodon.sdf.org
                                        wrote last edited by
                                        #23

                                        @internic

                                        Perhaps it's easier for business leaders to sigh and loosen the purse strings when the disaster (1) is absolutely certain to happen, and (2) will happen at an exact predetermined time.

                                        There's no rationalizing inaction with “it'll be the next CEO's problem” when you know for sure exactly when it will happen and therefore exactly whose problem it will be.

                                        @odr_k4tana @targetdrone @sophieschmieg

                                        1 Reply Last reply
                                        0
                                        • sophieschmieg@infosec.exchangeS sophieschmieg@infosec.exchange

                                          @ar1 the timeline got moved in substantially. Of course things can go wrong for the physicists, but 3 years seems feasible now.

                                          ar1@mastodon.socialA This user is from outside of this forum
                                          ar1@mastodon.socialA This user is from outside of this forum
                                          ar1@mastodon.social
                                          wrote last edited by
                                          #24

                                          @sophieschmieg ok. Reading up on it, I think I now understand better.

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups