Difference between revisions of "Encryption"

From MgmtWiki
Jump to: navigation, search
(Definitions)
(Problems)
Line 7: Line 7:
 
* Encryption that cannot be broken by adversaries depends ultimately on one-way processes that cannot be determined by the result.
 
* Encryption that cannot be broken by adversaries depends ultimately on one-way processes that cannot be determined by the result.
 
* Sometime the one-way functions turn out to be vulnerable. The most recent vulnerability was found with a combination of quantum computing an Schnor's algorithm. See the wiki page on [[Quantum Computing Threat]] for details and possible solutions.
 
* Sometime the one-way functions turn out to be vulnerable. The most recent vulnerability was found with a combination of quantum computing an Schnor's algorithm. See the wiki page on [[Quantum Computing Threat]] for details and possible solutions.
 +
* It is prudent to think that all existing encryption techniques of today will become vulnerable in the future, it is advisable to always exploring for new one-way functions that will not be vulnerable to attacks in the near future.
  
 
==Solutions==
 
==Solutions==

Revision as of 17:53, 27 April 2022

Full Title or Meme

Secret writing.

Context

Many personal attributes and much valuable content are meant to be kept hidden from all but a chosen few. Encryption enables that. It also can enable Signing and Authentication, but those are addressed elsewhere.

Problems

  • Encryption that cannot be broken by adversaries depends ultimately on one-way processes that cannot be determined by the result.
  • Sometime the one-way functions turn out to be vulnerable. The most recent vulnerability was found with a combination of quantum computing an Schnor's algorithm. See the wiki page on Quantum Computing Threat for details and possible solutions.
  • It is prudent to think that all existing encryption techniques of today will become vulnerable in the future, it is advisable to always exploring for new one-way functions that will not be vulnerable to attacks in the near future.

Solutions

References