1978 Cryptosystem Resists Quantum Attack 185
KentuckyFC writes "In 1978, the CalTech mathematician Robert McEliece developed a cryptosystem based on the (then) new idea of using asymmetric mathematical functions to create different keys for encrypting and decrypting information. The security of these systems relies on mathematical steps that are easy to make in one direction but hard to do in the other. Today, popular encryption systems such as the RSA algorithm use exactly this idea. But in 1994, the mathematician Peter Shor dreamt up a quantum algorithm that could factorise much faster than any classical counterpart and so can break these codes. As soon as the first decent-sized quantum computer is switched on, these codes will become breakable. Since then, cryptographers have been hunting for encryption systems that will be safe in the post quantum world. Now a group of mathematicians have shown that the McEliece encryption system is safe against attack by Shor's algorithm and all other known quantum algorithms. That's because it does not depend on factorisation but gets its security from another asymmetric conundrum known as the hidden subgroup problem which they show is immune to all known quantum attacks."
Re:conspiracy theory (Score:2, Funny)
No. Nothing to see here.
If you want to test it (Score:5, Funny)
Re:If you want to test it (Score:4, Funny)
Send a bunch of encrypted e-mails containing questionable content and see if anyone comes knocking at your door. And be sure to not send any questionable content unencrypted, or to give any other reasons for them to show up.
But how will I know they're not just knocking at my door out of a desire to make my acquaintance?
Re:Timeless saying applies here... (Score:3, Funny)
Actually, with really hard-core crypto systems there are three traditional ways to break them: 1) rubber hose; 2) dumpster diving; or 3) box of chocolates/bouquet of roses.
What no wad of Cash xor hookers & blow?
Re:The article agrees with you (Score:5, Funny)
You read the article?!
Re:It's "Caltech", not "CalTech" or "Cal Tech" (Score:3, Funny)
Pidantic much? {sic}
Re:conspiracy theory (Score:1, Funny)
-= "MESSAE BLOCK"?
You've broken the encryption!
Re:Timeless saying applies here... (Score:3, Funny)
W8, why both of them wouldn't work?
Re:conspiracy theory (Score:3, Funny)
Simplistically: If THEY bought out 50% of the researchers in the field, without arousing suspicion amongst those who turned down the offer, THEY would only have a 50% chance of having one first.
Unfortunately, that same 50% chance collapsed to a more stable 0 once observed.
Re:If you want to test it (Score:5, Funny)
But how will I know they're not just knocking at my door out of a desire to make my acquaintance?
Easy. If they use your door knocker, they want to make your acquaintance. If they bring their own [gaam.com.au], they're coming for more than tea and crumpets.
Re:Timeless saying applies here... (Score:4, Funny)
WTF... OK... I can deal with slashdot being overrun by morns who know little but act big, but now we have to put up with text-ese ?
His UID is lower than yours so shouldn't it be "I can deal with that slashdot was overrun by morns who knew little when I signed up. (eol)"
Feed him some cat food (Score:4, Funny)
Maybe he did, maybe he didn't.