Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Question: Post Quantum Crypto #42

Closed
wland32 opened this issue Jun 21, 2019 · 1 comment
Closed

Question: Post Quantum Crypto #42

wland32 opened this issue Jun 21, 2019 · 1 comment

Comments

@wland32
Copy link

wland32 commented Jun 21, 2019

Am I correct in assuming that this implementation of post quantum crypto only affects the key exchange?
https://github.com/janmojzis/tinyssh/blob/master/PROTOCOL.sntrup4591761x25519-sha512

If so, wouldn't this be only an experiment without adding security since the authentication of the server is still done using rsa (or other non post quanten algorithms)?

Meaning if someone has a quantum computer with the nessessary sice to break e.g. rsa 3072 that someone could circumvent the current use of post quanten crypto key exchange by a man in the middle attack and forging the then broken rsa Key of the server.

Is this assumtion correct?
If so what is the use case of the current implementation?

@janmojzis
Copy link
Owner

Am I correct in assuming that this implementation of post quantum crypto only affects the key exchange?
https://github.com/janmojzis/tinyssh/blob/master/PROTOCOL.sntrup4591761x25519-sha512

YES

If so what is the use case of the current implementation?

Without post quantum KEX attacker can record SSH session and later with quantum computer can decrypt everything. PQ KEX solves this problem.

And of course we also need post quantum signature algorithm before the attacker has quantum computers.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants