Fwd: [Cryptography] Proof that the NSA does not have a quantum computer capable of attacking public key crypto (yet)
---------- Forwarded message ---------- From: Henry Baker <hbaker1@pipeline.com> Date: Thu, 11 Feb 2016 12:59:38 -0800 Subject: Re: [Cryptography] Proof that the NSA does not have a quantum computer capable of attacking public key crypto (yet) To: Phillip Hallam-Baker <phill@hallambaker.com> Cc: cryptography@metzdowd.com At 08:49 PM 2/9/2016, Phillip Hallam-Baker wrote:
Proof that the NSA does not have a quantum computer capable of attacking public key crypto (yet)
A) Assume that the NSA has such a machine.
I think that someone at NSA invented Bitcoin to supercharge the development of fast encryption/decryption chips. New forms of QC-resistant XXXcoins will be developed for similar reasons. How to leverage NSA's research $$$$$$$$$$$'s. It seems to have worked! Recall that "miners" get paid in Bitcoin, but chip developers get paid in real $$$. Algorithm/SW developers don't need to get paid at all, because they do it for the love of computer science, society and world peace. _______________________________________________ The cryptography mailing list cryptography@metzdowd.com http://www.metzdowd.com/mailman/listinfo/cryptography
On Thu, 11 Feb 2016 23:53:36 -0500 grarpamp <grarpamp@gmail.com> wrote:
I think that someone at NSA invented Bitcoin to supercharge the development of fast encryption/decryption chips.
bitcoin chips only do one particular hash? And there isn't anything especial about them anyway? (meaning any IC manufacturer could have created them, they didn't because there was no demand)
New forms of QC-resistant XXXcoins will be developed for similar reasons.
How to leverage NSA's research $$$$$$$$$$$'s.
It seems to have worked!
Recall that "miners" get paid in Bitcoin, but chip developers get paid in real $$$.
Algorithm/SW developers don't need to get paid at all, because they do it for the love of computer science, society and world peace.
_______________________________________________ The cryptography mailing list cryptography@metzdowd.com http://www.metzdowd.com/mailman/listinfo/cryptography
Isn't it much more important "Can NSA break RSA efficiently" or even "Can they efficiently factor integers"? AFAICT these are not known to be theoretically equivalent. There were low exponent attack ($3$) IIRC. Don't remember seeing X509 RSA cert with exponent other than 2^16+1 (or something like this) and this is not much bigger...
participants (3)
-
Georgi Guninski
-
grarpamp
-
juan