TLS 1.3 starts a new road-map

This time it’s on a Quantum Path

--

While some organisations are on a path to insert backdoors into TLS 1.3 [backdoor], others are looking much further into the future, and making sure that our existing security infrastructure doesn’t open-up all of our existing data. And with GDPR on the horizon, things will be serious in terms of protecting data, with a large-scale breach of data bringing both fines and a reduction in levels of trust. In the future we must thus encrypt by default, and check of our connections for their identity and trustworthiness. But what happens if the Internet is cracked by a powerful computer?

Our existing methods

The race to defeat the cracking of public key methods with quantum computers has already started, and, to some extent, we must starting planning now to see the end of RSA and Elliptic Curve. The two main protections that we have are the difficulty in factorizing a number and in finding a discrete logarithms. For example if:

N = 167,393,905,215,827,498,969,023,638,554,233,713,209

then a computer must find the two prime numbers which created this factor, which are:

p=9,243,514,199,999,342,993 and q=18,109,336,080,842,435,113 [here]

--

--

Prof Bill Buchanan OBE FRSE
ASecuritySite: When Bob Met Alice

Professor of Cryptography. Serial innovator. Believer in fairness, justice & freedom. Based in Edinburgh. Old World Breaker. New World Creator. Building trust.