hashcat Forum
ECC and SHA 256 vs quantum computing - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Misc (https://hashcat.net/forum/forum-15.html)
+--- Forum: General Talk (https://hashcat.net/forum/forum-33.html)
+--- Thread: ECC and SHA 256 vs quantum computing (/thread-6858.html)



ECC and SHA 256 vs quantum computing - dapa - 09-10-2017

Hi all

new here.. I want to know more about quantum computing breaking ECC and SHA 256. Can you point me to some useful links/discussion about that?

thank you!


RE: ECC and SHA 256 vs quantum computing - undeath - 09-10-2017

Hashing algorithms are usually not vulnerable to quantum computer attacks. Attacks against cryptographic algorithms mostly rely on being able to solve a very small but important set of mathematical problems used in most public key systems. There's some nice overview on wikipedia.

https://en.wikipedia.org/wiki/Elliptic_curve_cryptography#Quantum_computing_attacks
https://en.wikipedia.org/wiki/Post-quantum_cryptography


RE: ECC and SHA 256 vs quantum computing - dapa - 09-11-2017

(09-10-2017, 06:08 PM)undeath Wrote: Hashing algorithms are usually not vulnerable to quantum computer attacks. Attacks against cryptographic algorithms mostly rely on being able to solve a very small but important set of mathematical problems used in most public key systems. There's some nice overview on wikipedia.

https://en.wikipedia.org/wiki/Elliptic_curve_cryptography#Quantum_computing_attacks
https://en.wikipedia.org/wiki/Post-quantum_cryptography

thanks, i am aware of the post quantum wiki page. I was asking about qubit units and whether they were able to break ECC, SHA256 and SHA512? Someone that is into cryptography told me SHA512 was cracked in several ms
I can't find any source for that


RE: ECC and SHA 256 vs quantum computing - undeath - 09-11-2017

According to this paper it would require 1000 qubits to break ECC-160.

As I said in my previous post, hashing algorithms are usually not vulnerable to quantum computer attacks, which includes the SHA-2 familiy. I'm not aware of any such attacks for SHA-2. The fact that your "someone that is into cryptography" was even able to come up with some timing makes the claim even more ridiculous because we definitely do not have any kind of computation device available that can break the SHA-2 algorithm. That would be big news.


RE: ECC and SHA 256 vs quantum computing - jennie - 09-17-2017

Thanks for all the information! As stupid as it may sound, I haven't read those Wikipedia articles yet. Gonna catch up! Smile