Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I was all for post-quantum crypto until I heard the news about SIKE being broken with a simple computer.

How will you make sure this does not happen to the algorithms you chose?



As all post-quantum crypto is relatively new there is still the risk of it being broken in the future. This is why we combine the new algorithms with classical ones in an hybrid approach so that the encryption stays at least as secure as it is now.


By mixing it up with classical encryption algorithms. The implementations don’t use pure post quantum cryptography, see SSH.


Learn some math.

SIKE was known to be breakable since at least 1997, specific breaking algorithms were developed in 2000, and these were implemented in Magma (a symbolic algebra suite from John Cannon, Sydney Uni, second generation after the original Cayley system of the mid 1980s).

It wasn't a choice that would have been put forward by people in the abstract algebra game - just something put forward as a 'candidate' by security researchers.

Something something Venn diagrams.


Little rude, he was just asking a question.

Learn some decency.


Learn some math, more specifically learn abstract algebra | read current papers in the field, befriend people active in the field that have taken over from Charles Leedham-Green, George Havas, et al is good practical advice to avoid using methods already known for decades to be weak.

It answers the question.

> Learn some decency.

Little rude, given the question asked was answered.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: