“With regard to the algorithms used to hash data – particularly SHA-224 and SHA-256 – Buchanan expressed surprise that neither will be approved for use beyond 2030.”
Sounds like corruption to me. Hey gov’t pal, let’s make crazy requirements for security due to a quantum boogyman so I can sell you consultants and all new equipment with insane processing capabilities for a shit ton of money. Look for the greasy palms.
Decades of research and we are at 100 qbits and estimates are bouncing around that estimate it will take millions. Once we build them, job #1 will be reading government email?
Maybe, but it’s a lot easier just to use backdoors, software bugs, spies, and good ol’ bribes.
The notion that quantum computing will make encryption useless anytime in the near future is a wild fantasy.
Yes, the potential exists that a fully realized version of quantum computing might do this. If such a thing actually ends up existing anytime soon. That is a big if. Right now we’re still very much in the “Working out if this is even feasible” stage.
Even if fully realized quantum computers become a thing, and do all the things we want them to do, we’ll be decades away from having enough of them to be able to apply quantum compute time to any random conversation on the off chance it contains something important. That’s like fishing by hocking gold bars into the ocean in the hopes that one of them hits a fish on the way down.
… plans emerged last week when the Australian Signals Directorate (ASD) published guidance for High Assurance Cryptographic Equipment (HACE) – devices that send and/or receive sensitive information – that calls for disallowing the cryptographic algorithms SHA-256, RSA, ECDSA and ECDH, among others, by the end of this decade.
With regard to the algorithms used to hash data – particularly SHA-224 and SHA-256 – Buchanan expressed surprise that neither will be approved for use beyond 2030.
“The migration within five years will not be easy, as every single web connection currently uses ECDH and RSA/ECDSA,” he wrote. “These methods are also used for many other parts of a secure infrastructure.”
Looks like we could be in for interesting times.