Supersingular Isogeny Diffie Hellman Key Exchage

Page 1 of 1 [ 3 posts ] 

gabemai314
Blue Jay
Blue Jay

User avatar

Joined: 12 Feb 2017
Age: 25
Gender: Male
Posts: 76
Location: Loveland, Colorado, USA, Earth, Solar System, Gould Belt, Orion Arm, Milky Way Galaxy, Local Group, Virgo Supercluster, Laniakea Supercluster, Universe

17 Sep 2017, 10:54 pm

What is your opinion on the Supersingular Isogeny Diffie Hellman (SIDH) key exchange algorithm as a viable post-quantum cryptographic key exchange algorithm? From the research I have done on the subject, it seems like a viable option when the time comes to ditch current asymmetric key exchange algorithms. (e.g. the NSA creating a quantum computer capable of breaking elliptical curve cryptography by using a modified version of Shor's algorithm) https://en.wikipedia.org/wiki/Supersing ... y_exchange


_________________
I am open to PMs.
GitHub: https://github.com/gabemaiberger/


Ichinin
Veteran
Veteran

User avatar

Joined: 3 Apr 2009
Gender: Male
Posts: 3,653
Location: A cold place with lots of blondes.

18 Sep 2017, 3:53 am

My opinion as a security professional is that there is too much focus on cryptography as a magic solution to everything when the services it protects are still vulnerable against simple buffer overflow attacks that can allow attackers to compromise a host, effectively being able to install code that could intercept or manipulate network traffic, the shadowbrokers leak showed this clearly.

As for alternatives to that could be used post-quantum: knapsack.


_________________
"It is far better to grasp the Universe as it really is than to persist in delusion, however satisfying and reassuring" (Carl Sagan)


BaalChatzaf
Veteran
Veteran

User avatar

Joined: 11 Mar 2008
Gender: Male
Posts: 1,050
Location: Monroe Twp. NJ

22 Sep 2017, 11:04 am

gabemai314 wrote:
What is your opinion on the Supersingular Isogeny Diffie Hellman (SIDH) key exchange algorithm as a viable post-quantum cryptographic key exchange algorithm? From the research I have done on the subject, it seems like a viable option when the time comes to ditch current asymmetric key exchange algorithms. (e.g. the NSA creating a quantum computer capable of breaking elliptical curve cryptography by using a modified version of Shor's algorithm) https://en.wikipedia.org/wiki/Supersing ... y_exchange


Time to go back to one time pads with random sequences generating by radioactive sources. Quantum computers cannot break those.


_________________
Socrates' Last Words: I drank what!! !?????