this post was submitted on 22 Sep 2023
25 points (96.3% liked)

privacy

363 readers
1 users here now

Rules (WIP)

  1. No ad hominem allowed
  2. Attack the idea, not the poster

founded 1 year ago
MODERATORS
top 2 comments
sorted by: hot top controversial new old
[–] [email protected] 7 points 1 year ago (1 children)

I want to preface this by saying that while I have done some undergraduate work in this area, I am by no means an expert on this topic. If I’m wrong or missing some context, hopefully someone with more knowledge than me can comment and correct me.

This doesn’t really seem like much to me. The major quantum threat is Shor’s algorithm, which gives an attacker with access to a sufficiently powerful quantum computer the ability to easily solve the discrete log problem. This new protocol still relies on the discrete log problem, and is therefore still vulnerable to the same threat. I don’t understand everything in the paper, but from what I can tell I think they just made DH a little more robust in general, rather than actually providing a long-term quantum solution.

[–] [email protected] 3 points 1 year ago

Thank you for the insightful comment :)