Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Are we having fun yet?

Are we having fun yet?

Scheduled Pinned Locked Moved Uncategorized
27 Posts 12 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • tomgag@infosec.exchangeT tomgag@infosec.exchange

    @sophieschmieg from a quick look, this seems a bit... audacious?

    under plausible assumptions, the runtime for discrete logarithms on the P-256 elliptic curve could be just a few days for a system with 26,000
    physical qubits

    sophieschmieg@infosec.exchangeS This user is from outside of this forum
    sophieschmieg@infosec.exchangeS This user is from outside of this forum
    sophieschmieg@infosec.exchange
    wrote last edited by
    #7

    @tomgag these are not the only quantum physicists that have said that recently.

    1 Reply Last reply
    0
    • sophieschmieg@infosec.exchangeS sophieschmieg@infosec.exchange

      Are we having fun yet?

      Link Preview Image
      Shor's algorithm is possible with as few as 10,000 reconfigurable atomic qubits

      Abstract page for arXiv paper 2603.28627: Shor's algorithm is possible with as few as 10,000 reconfigurable atomic qubits

      favicon

      arXiv.org (arxiv.org)

      targetdrone@mastodon.socialT This user is from outside of this forum
      targetdrone@mastodon.socialT This user is from outside of this forum
      targetdrone@mastodon.social
      wrote last edited by
      #8

      @sophieschmieg When people question the aggressive quantum readiness timelines given that 100 qubit computers are all we have today, I have to explain that it's not just a matter of building a computer with a million qubits, but that researchers are still publishing optimizations that may cut that by a factor of 10, or 100, or more. And we simply don't know if or when they'll figure out something better.

      emc2@indieweb.socialE odr_k4tana@infosec.exchangeO 2 Replies Last reply
      0
      • wordshaper@weatherishappening.networkW This user is from outside of this forum
        wordshaper@weatherishappening.networkW This user is from outside of this forum
        wordshaper@weatherishappening.network
        wrote last edited by
        #9

        @sophieschmieg On the one hand a weird focus on cryptocurrency is weird, on the other if we managed to break all of the cryptocurrencies with relatively small/cheap (relatively!) quantum computers I suspect I would laugh so hard I hurt myself. And then I'd send pastries to whoever worked out how to do that because they 100% deserved them.

        1 Reply Last reply
        0
        • targetdrone@mastodon.socialT targetdrone@mastodon.social

          @sophieschmieg When people question the aggressive quantum readiness timelines given that 100 qubit computers are all we have today, I have to explain that it's not just a matter of building a computer with a million qubits, but that researchers are still publishing optimizations that may cut that by a factor of 10, or 100, or more. And we simply don't know if or when they'll figure out something better.

          emc2@indieweb.socialE This user is from outside of this forum
          emc2@indieweb.socialE This user is from outside of this forum
          emc2@indieweb.social
          wrote last edited by
          #10

          @targetdrone @sophieschmieg

          It's that, plus the fact that the day you migrate to PQC, all your *future* comms are safe, but all your past comms *will* be vulnerable some day.

          If those comms contain other key / authentication materials for other parts of the system, then the Adversary will gain access to those as well.

          That, and the unfortunate reality that a lot of orgs will drag their feet on this and you'll have vulnerable crypto in prod probably even after the first utility scale machines.

          targetdrone@mastodon.socialT 1 Reply Last reply
          0
          • targetdrone@mastodon.socialT targetdrone@mastodon.social

            @sophieschmieg When people question the aggressive quantum readiness timelines given that 100 qubit computers are all we have today, I have to explain that it's not just a matter of building a computer with a million qubits, but that researchers are still publishing optimizations that may cut that by a factor of 10, or 100, or more. And we simply don't know if or when they'll figure out something better.

            odr_k4tana@infosec.exchangeO This user is from outside of this forum
            odr_k4tana@infosec.exchangeO This user is from outside of this forum
            odr_k4tana@infosec.exchange
            wrote last edited by
            #11

            @targetdrone @sophieschmieg if we haven't learned from Y2K that preparing for shit quietly in the background pays off, we haven't learned anything.

            argv_minus_one@mastodon.sdf.orgA 1 Reply Last reply
            0
            • emc2@indieweb.socialE emc2@indieweb.social

              @targetdrone @sophieschmieg

              It's that, plus the fact that the day you migrate to PQC, all your *future* comms are safe, but all your past comms *will* be vulnerable some day.

              If those comms contain other key / authentication materials for other parts of the system, then the Adversary will gain access to those as well.

              That, and the unfortunate reality that a lot of orgs will drag their feet on this and you'll have vulnerable crypto in prod probably even after the first utility scale machines.

              targetdrone@mastodon.socialT This user is from outside of this forum
              targetdrone@mastodon.socialT This user is from outside of this forum
              targetdrone@mastodon.social
              wrote last edited by
              #12

              @emc2 @sophieschmieg On the flip side, quantum attacks will remain expensive for a long time. Nobody's going to spend coin to crack rabbitfanciersforum.com when they could instead profit from cracking verylargebank.com.

              If I were an attacker, I'd go after the CAs like digicert et al. With a signing key I would forge any site certs I wanted. PQ preparedness won't stop this until the bad CA certs are out of everyone's trust stores.

              sophieschmieg@infosec.exchangeS emc2@indieweb.socialE 2 Replies Last reply
              0
              • targetdrone@mastodon.socialT targetdrone@mastodon.social

                @emc2 @sophieschmieg On the flip side, quantum attacks will remain expensive for a long time. Nobody's going to spend coin to crack rabbitfanciersforum.com when they could instead profit from cracking verylargebank.com.

                If I were an attacker, I'd go after the CAs like digicert et al. With a signing key I would forge any site certs I wanted. PQ preparedness won't stop this until the bad CA certs are out of everyone's trust stores.

                sophieschmieg@infosec.exchangeS This user is from outside of this forum
                sophieschmieg@infosec.exchangeS This user is from outside of this forum
                sophieschmieg@infosec.exchange
                wrote last edited by
                #13

                @targetdrone @emc2 yeah, CAs and CT logs are the keys you want.

                1 Reply Last reply
                0
                • targetdrone@mastodon.socialT targetdrone@mastodon.social

                  @emc2 @sophieschmieg On the flip side, quantum attacks will remain expensive for a long time. Nobody's going to spend coin to crack rabbitfanciersforum.com when they could instead profit from cracking verylargebank.com.

                  If I were an attacker, I'd go after the CAs like digicert et al. With a signing key I would forge any site certs I wanted. PQ preparedness won't stop this until the bad CA certs are out of everyone's trust stores.

                  emc2@indieweb.socialE This user is from outside of this forum
                  emc2@indieweb.socialE This user is from outside of this forum
                  emc2@indieweb.social
                  wrote last edited by
                  #14

                  @targetdrone @sophieschmieg

                  Yes, it will be stuff like "we're going to spend the next two months cracking the key agreement on this intercept from such and such embassy we intercepted in 2007", probably for decades after the first utility scale machines exist.

                  However, I could see seemingly lower-value targets getting hit in order to set up aggregation, supply chain, or other attacks.

                  sophieschmieg@infosec.exchangeS targetdrone@mastodon.socialT 2 Replies Last reply
                  0
                  • emc2@indieweb.socialE emc2@indieweb.social

                    @targetdrone @sophieschmieg

                    Yes, it will be stuff like "we're going to spend the next two months cracking the key agreement on this intercept from such and such embassy we intercepted in 2007", probably for decades after the first utility scale machines exist.

                    However, I could see seemingly lower-value targets getting hit in order to set up aggregation, supply chain, or other attacks.

                    sophieschmieg@infosec.exchangeS This user is from outside of this forum
                    sophieschmieg@infosec.exchangeS This user is from outside of this forum
                    sophieschmieg@infosec.exchange
                    wrote last edited by
                    #15

                    @emc2 @targetdrone yeah. In fact I'm worried that in some sense slower and less accessible CRQC paradoxically pose a greater risk to the common people: if, at the extreme but imaginable end, it takes two months to break a key, and you only have one quantum computer, exploiting SNDL for random cables very quickly becomes unsatisfying. And breaking fairly few supply chain keys (CA, CT logs, identity providers, software signing etc) becomes very tempting, even if it risks giving away that you have a CRQC at your disposal. And those supply chain risks in turn put everyone at risk, not just some limited spy games between embassies.

                    emc2@indieweb.socialE 1 Reply Last reply
                    0
                    • odr_k4tana@infosec.exchangeO odr_k4tana@infosec.exchange

                      @targetdrone @sophieschmieg if we haven't learned from Y2K that preparing for shit quietly in the background pays off, we haven't learned anything.

                      argv_minus_one@mastodon.sdf.orgA This user is from outside of this forum
                      argv_minus_one@mastodon.sdf.orgA This user is from outside of this forum
                      argv_minus_one@mastodon.sdf.org
                      wrote last edited by
                      #16

                      @odr_k4tana

                      A lot of people think Y2K was a hoax because there was no huge apocalyptic disaster.

                      For some reason they find it difficult to believe that the huge apocalyptic disaster would have happened if not for the large, costly effort to fix the bugs *before* the big day.

                      @targetdrone @sophieschmieg

                      internic@mathstodon.xyzI 1 Reply Last reply
                      0
                      • emc2@indieweb.socialE emc2@indieweb.social

                        @targetdrone @sophieschmieg

                        Yes, it will be stuff like "we're going to spend the next two months cracking the key agreement on this intercept from such and such embassy we intercepted in 2007", probably for decades after the first utility scale machines exist.

                        However, I could see seemingly lower-value targets getting hit in order to set up aggregation, supply chain, or other attacks.

                        targetdrone@mastodon.socialT This user is from outside of this forum
                        targetdrone@mastodon.socialT This user is from outside of this forum
                        targetdrone@mastodon.social
                        wrote last edited by
                        #17

                        @emc2 @sophieschmieg Breaking a 2048-bit RSA key will likely take a year or more of quantum compute time initially. Using the going rate of $98USD/minute for access to an (inadequate) 100-qubit machine, we can ballpark an initial cost of 8 or 9 figures.

                        You'd have to be absolutely certain of the value of the key you are cracking to realize a return on that kind of investment.

                        emc2@indieweb.socialE 1 Reply Last reply
                        0
                        • targetdrone@mastodon.socialT targetdrone@mastodon.social

                          @emc2 @sophieschmieg Breaking a 2048-bit RSA key will likely take a year or more of quantum compute time initially. Using the going rate of $98USD/minute for access to an (inadequate) 100-qubit machine, we can ballpark an initial cost of 8 or 9 figures.

                          You'd have to be absolutely certain of the value of the key you are cracking to realize a return on that kind of investment.

                          emc2@indieweb.socialE This user is from outside of this forum
                          emc2@indieweb.socialE This user is from outside of this forum
                          emc2@indieweb.social
                          wrote last edited by
                          #18

                          @targetdrone @sophieschmieg

                          I can't go into too much detail (propin, ndas, etc) but the actual cost of a utility scale machine will be in the hundreds of thousands per day. The time will vary depending on the architecture, but you're looking at order months to hit the P-256 curve. RSA is more of a moving target, but expect similar.

                          1 Reply Last reply
                          0
                          • sophieschmieg@infosec.exchangeS sophieschmieg@infosec.exchange

                            @emc2 @targetdrone yeah. In fact I'm worried that in some sense slower and less accessible CRQC paradoxically pose a greater risk to the common people: if, at the extreme but imaginable end, it takes two months to break a key, and you only have one quantum computer, exploiting SNDL for random cables very quickly becomes unsatisfying. And breaking fairly few supply chain keys (CA, CT logs, identity providers, software signing etc) becomes very tempting, even if it risks giving away that you have a CRQC at your disposal. And those supply chain risks in turn put everyone at risk, not just some limited spy games between embassies.

                            emc2@indieweb.socialE This user is from outside of this forum
                            emc2@indieweb.socialE This user is from outside of this forum
                            emc2@indieweb.social
                            wrote last edited by
                            #19

                            @sophieschmieg @targetdrone

                            This is very true, and in fact I would expect targeting more public infrastructure that would allow massive disruption (e.g. Central banks, public utilities in major cities, CAs, etc) to be a better ROI, if you're after disruptive effects.

                            1 Reply Last reply
                            0
                            • sophieschmieg@infosec.exchangeS sophieschmieg@infosec.exchange

                              Oh, and in case you weren't having enough fun, here are some updated resource estimates for running Shor's on elliptic curves, unfortunately weirdly focused on cryptocurrencies.

                              Fun fact: I almost found a soundness problem in that zero knowledge proof that was based on a quine. Unfortunately the circuit cannot produce quines.

                              Link Preview Image
                              Safeguarding cryptocurrency by disclosing quantum vulnerabilities responsibly

                              favicon

                              (research.google)

                              sophieschmieg@infosec.exchangeS This user is from outside of this forum
                              sophieschmieg@infosec.exchangeS This user is from outside of this forum
                              sophieschmieg@infosec.exchange
                              wrote last edited by
                              #20

                              And now also on Ars Technica:

                              @dangoodin

                              Link Preview Image
                              Quantum computers need vastly fewer resources than thought to break vital encryption

                              No, the sky isn't falling, but Q Day is coming, and it won't be as expensive as thought.

                              favicon

                              Ars Technica (arstechnica.com)

                              1 Reply Last reply
                              0
                              • argv_minus_one@mastodon.sdf.orgA argv_minus_one@mastodon.sdf.org

                                @odr_k4tana

                                A lot of people think Y2K was a hoax because there was no huge apocalyptic disaster.

                                For some reason they find it difficult to believe that the huge apocalyptic disaster would have happened if not for the large, costly effort to fix the bugs *before* the big day.

                                @targetdrone @sophieschmieg

                                internic@mathstodon.xyzI This user is from outside of this forum
                                internic@mathstodon.xyzI This user is from outside of this forum
                                internic@mathstodon.xyz
                                wrote last edited by
                                #21

                                @argv_minus_one In fairness, for people who only have any memory of the 21st century I can understand how the idea of society coming together at scale and spending resources to tackle a foreseeable problem before it becomes a crisis might seem farfetched.
                                @odr_k4tana @targetdrone @sophieschmieg

                                argv_minus_one@mastodon.sdf.orgA 1 Reply Last reply
                                0
                                • internic@mathstodon.xyzI internic@mathstodon.xyz

                                  @argv_minus_one In fairness, for people who only have any memory of the 21st century I can understand how the idea of society coming together at scale and spending resources to tackle a foreseeable problem before it becomes a crisis might seem farfetched.
                                  @odr_k4tana @targetdrone @sophieschmieg

                                  argv_minus_one@mastodon.sdf.orgA This user is from outside of this forum
                                  argv_minus_one@mastodon.sdf.orgA This user is from outside of this forum
                                  argv_minus_one@mastodon.sdf.org
                                  wrote last edited by
                                  #22

                                  @internic

                                  Society didn't come together at scale. Society, for the most part, was panicked that the end of the world was nigh.

                                  Business leaders are the ones who came together, presumably because they didn't want their businesses to abruptly screech to a halt on 2000-01-01, and hired an army of programmers to fix the bugs.

                                  @odr_k4tana @targetdrone @sophieschmieg

                                  argv_minus_one@mastodon.sdf.orgA 1 Reply Last reply
                                  0
                                  • argv_minus_one@mastodon.sdf.orgA argv_minus_one@mastodon.sdf.org

                                    @internic

                                    Society didn't come together at scale. Society, for the most part, was panicked that the end of the world was nigh.

                                    Business leaders are the ones who came together, presumably because they didn't want their businesses to abruptly screech to a halt on 2000-01-01, and hired an army of programmers to fix the bugs.

                                    @odr_k4tana @targetdrone @sophieschmieg

                                    argv_minus_one@mastodon.sdf.orgA This user is from outside of this forum
                                    argv_minus_one@mastodon.sdf.orgA This user is from outside of this forum
                                    argv_minus_one@mastodon.sdf.org
                                    wrote last edited by
                                    #23

                                    @internic

                                    Perhaps it's easier for business leaders to sigh and loosen the purse strings when the disaster (1) is absolutely certain to happen, and (2) will happen at an exact predetermined time.

                                    There's no rationalizing inaction with “it'll be the next CEO's problem” when you know for sure exactly when it will happen and therefore exactly whose problem it will be.

                                    @odr_k4tana @targetdrone @sophieschmieg

                                    1 Reply Last reply
                                    0
                                    • sophieschmieg@infosec.exchangeS sophieschmieg@infosec.exchange

                                      @ar1 the timeline got moved in substantially. Of course things can go wrong for the physicists, but 3 years seems feasible now.

                                      ar1@mastodon.socialA This user is from outside of this forum
                                      ar1@mastodon.socialA This user is from outside of this forum
                                      ar1@mastodon.social
                                      wrote last edited by
                                      #24

                                      @sophieschmieg ok. Reading up on it, I think I now understand better.

                                      1 Reply Last reply
                                      0
                                      • icing@chaos.socialI This user is from outside of this forum
                                        icing@chaos.socialI This user is from outside of this forum
                                        icing@chaos.social
                                        wrote last edited by
                                        #25

                                        @lcamtuf @sophieschmieg @dangoodin
                                        If we train LLMs on encrypted data, they will decrypt everything. It might not be the original plaintext, but it will make sense for most people.

                                        You may E2E the conversation with your mom, but everyone knows how those things go, right? With a little context from your social media profiles, there are no more secrets.😌

                                        1 Reply Last reply
                                        0
                                        • sophieschmieg@infosec.exchangeS sophieschmieg@infosec.exchange

                                          Oh, and in case you weren't having enough fun, here are some updated resource estimates for running Shor's on elliptic curves, unfortunately weirdly focused on cryptocurrencies.

                                          Fun fact: I almost found a soundness problem in that zero knowledge proof that was based on a quine. Unfortunately the circuit cannot produce quines.

                                          Link Preview Image
                                          Safeguarding cryptocurrency by disclosing quantum vulnerabilities responsibly

                                          favicon

                                          (research.google)

                                          vaurora@mstdn.socialV This user is from outside of this forum
                                          vaurora@mstdn.socialV This user is from outside of this forum
                                          vaurora@mstdn.social
                                          wrote last edited by
                                          #26

                                          @sophieschmieg has anyone written a description of the zero knowledge proof for people with B.S. level mathematics education? I will attempt to read the paper but would love to read anything by experts

                                          vaurora@mstdn.socialV 1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups