deflating heffalumps

Jacob Bachmeyer jcb62281 at gmail.com
Fri Jan 3 04:43:20 CET 2025


On 1/2/25 20:47, Robert J. Hansen wrote:
> [...]
>
>> I have also long suspected that, while RSA key lengths beyond 4096 
>> bits have diminishing returns against conventional computing, they 
>> may be more secure against quantum computing, perhaps even with 
>> increasing returns.
>
> Following the (very rough) rule of thumb that each additional bit 
> requires two additional qubits, then yes, RSA can in some sense be 
> viewed as post-quantum already, since you can ratchet its difficulty 
> up arbitrarily to whatever level of quantum resistance you want. 
> Afraid of an adversary with science fiction hardware and a 20kbit 
> ensemble? Use RSA-16384 and sleep easy.

Do I understand correctly that, while the complexity of conventional 
factoring scales with a logarithm of RSA key length, Shor's algorithm 
has a space requirement that scales linearly, but the engineering 
challenges implied by that linear growth scale exponentially?

Examples from Wikipedia ("Key size") include a 3072-bit RSA key having a 
2**128 work factor, but reaching 2**256 against /conventional/ computing 
requires a 15360-bit RSA key.  On the other hand, those same RSA keys 
would require 15k and 75k qubits, respectively?  Are those figures 
including error correction or /before/ error correction?

> I am wholly in favor of research into PQC and encourage the adoption 
> of PQC where appropriate. However, I am also wholly in favor of 
> thinking deeply on the words "where appropriate".

Agreed.  I also suspect that we may have practically-relevant PQC right 
under our noses, right now:  RSA.

>> Also, can you cite a good source for how Shor's algorithm scales?
>
> https://arxiv.org/pdf/quant-ph/9602016 is the standard paper. I seem 
> to recall we've improved on it slightly since, but not by much.

Thank you.  I will enjoy reading that later.

>>  And how do analogous attacks on elliptic curve cryptosystems scale?
>
> My understanding (which is limited: I'm not Scott Aaronson) is that 
> Shor's algorithm, expressed in its most generic form, applies to any 
> hidden-subgroup problem. That means discrete logs will fall to it in a 
> similar way. I can't guarantee the 5N+1 rule will hold true, but I 
> would definitely expect a kN+c rule with small values for k and c.

Do the mathematical complexities that prevent conventional computing 
from making short work of 256-bit ECC keys also affect Shor's algorithm?

If not, that would mean that RSA is actually /stronger/ against future 
threats and TLS should be moving back to RSA and Diffie-Hellman posthaste.


-- Jacob




More information about the Gnupg-users mailing list