ECC and SHA 256 vs quantum computing - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Misc (https://hashcat.net/forum/forum-15.html) +--- Forum: General Talk (https://hashcat.net/forum/forum-33.html) +--- Thread: ECC and SHA 256 vs quantum computing (/thread-6858.html) |
ECC and SHA 256 vs quantum computing - dapa - 09-10-2017 Hi all new here.. I want to know more about quantum computing breaking ECC and SHA 256. Can you point me to some useful links/discussion about that? thank you! RE: ECC and SHA 256 vs quantum computing - undeath - 09-10-2017 Hashing algorithms are usually not vulnerable to quantum computer attacks. Attacks against cryptographic algorithms mostly rely on being able to solve a very small but important set of mathematical problems used in most public key systems. There's some nice overview on wikipedia. https://en.wikipedia.org/wiki/Elliptic_curve_cryptography#Quantum_computing_attacks https://en.wikipedia.org/wiki/Post-quantum_cryptography RE: ECC and SHA 256 vs quantum computing - dapa - 09-11-2017 (09-10-2017, 06:08 PM)undeath Wrote: Hashing algorithms are usually not vulnerable to quantum computer attacks. Attacks against cryptographic algorithms mostly rely on being able to solve a very small but important set of mathematical problems used in most public key systems. There's some nice overview on wikipedia. thanks, i am aware of the post quantum wiki page. I was asking about qubit units and whether they were able to break ECC, SHA256 and SHA512? Someone that is into cryptography told me SHA512 was cracked in several ms I can't find any source for that RE: ECC and SHA 256 vs quantum computing - undeath - 09-11-2017 According to this paper it would require 1000 qubits to break ECC-160. As I said in my previous post, hashing algorithms are usually not vulnerable to quantum computer attacks, which includes the SHA-2 familiy. I'm not aware of any such attacks for SHA-2. The fact that your "someone that is into cryptography" was even able to come up with some timing makes the claim even more ridiculous because we definitely do not have any kind of computation device available that can break the SHA-2 algorithm. That would be big news. RE: ECC and SHA 256 vs quantum computing - jennie - 09-17-2017 Thanks for all the information! As stupid as it may sound, I haven't read those Wikipedia articles yet. Gonna catch up! |