Content deleted Content added
→Key generation: Citeseerx→cite web |
0x951F6F9D0435CB3EE6A5753D55460A8b70f24985 Tags: Reverted Visual edit Mobile edit Mobile web edit |
||
Line 31:
Most modern symmetric-key algorithms appear to be resistant to the threat of [[post-quantum cryptography]].<ref name="djb-intro">{{cite book |author=Daniel J. Bernstein |title=Post-Quantum Cryptography |year=2009 |chapter=Introduction to post-quantum cryptography |author-link=Daniel J. Bernstein |chapter-url=http://www.pqcrypto.org/www.springer.com/cda/content/document/cda_downloaddocument/9783540887010-c1.pdf}}</ref> [[Quantum computing|Quantum computers]] would exponentially increase the speed at which these ciphers can be decoded; notably, [[Grover's algorithm]] would take the square-root of the time traditionally required for a [[brute-force attack]], although these vulnerabilities can be compensated for by doubling key length.<ref name="djb-groverr">{{cite journal |author=Daniel J. Bernstein |author-link=Daniel J. Bernstein |date=2010-03-03 |title=Grover vs. McEliece |url=http://cr.yp.to/codes/grovercode-20100303.pdf}}</ref> For example, a 128 bit AES cipher would not be secure against such an attack as it would reduce the time required to test all possible iterations from over 10 quintillion years to about six months. By contrast, it would still take a quantum computer the same amount of time to decode a 256 bit AES cipher as it would a conventional computer to decode a 128 bit AES cipher.<ref>{{Cite web |last=Wood |first=Lamont |date=2011-03-21 |title=The Clock Is Ticking for Encryption |url=https://www.computerworld.com/article/2550008/the-clock-is-ticking-for-encryption.html |access-date=2022-12-05 |website=Computerworld |language=en}}</ref> For this reason, AES-256 is believed to be "quantum resistant".<ref>{{Cite web |last=O'Shea |first=Dan |date=2022-04-29 |title=AES-256 joins the quantum resistance |url=https://www.fierceelectronics.com/electronics/aes-256-joins-quantum-resistance |access-date=2022-12-05 |website=Fierce Electronics |language=en}}</ref>
{{main|Key Management Interoperability Protocol}}0x951F6F9D0435CB3EE6A5753D55460A8b70f24985▼
▲{{main|Key Management Interoperability Protocol}}
== Key establishment ==
|