Quantum computing

Robert J. Hansen rjh at sixdemonbag.org
Wed Apr 18 16:05:22 CEST 2007


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

> On 200704172359, Robert J. Hansen wrote:
>> 1.  We are unlikely to ever be able to brute-force a 256-bit
>> keyspace.  Ever.  Not until computers are made of something other
>> than matter, occupy something other than space, run on something
>> other than energy, according to rules other than physics.
>
> I was under the impression that quantum computers were about to  
> provide
> a break in factorization. From quick grep on Wikipedia, I find that:

They've been "about to provide" a break in factorization for the last  
30 years.

> However, I assume you know what you talk about, when you say that we
> aren't likely to factor 256-bit-numbers ever. So please restate  
> that --
> even in the face of quantum computers -- we won't ever factor 256 bit
> numbers.

We're already factoring 256-bit numbers.  Fortunately, I didn't claim  
256-bit composites would forever be secure.  I claimed 256-bit  
keyspace searches would be secure.

Keyspace search is a different set of problems than factorization.   
For a brute-force search the best we can do is Grover's quantum  
database algorithm, which reduces it down to an equivalent 128-bit  
keyspace.  From there we use quantum thermodynamics--namely the  
Margolus-Levitin theorem--to get some reasonable bounds on how much  
time, energy, etc., are required to do it.




-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (Darwin)

iQEcBAEBCgAGBQJGJiWiAAoJELcA9IL+r4EJCTcH/RUOxI6RNuuu2WaCpAeJLfHs
0u+KzJ6MALtonHQOkAbhDTw8zTC+OTHEuN/t2+dwli6E8r7F61RIMpLyPiZpfS0y
rQjHMqJPMdr7Xerhn1haGdov2MzbvtloqHBEP9T65fstTEYBXoYMDSNhYVRV1Fpz
g+is39fVr6D3LZ5W50VQhtTwmcpGM7ZKl4XSgqtv2UwwPM7dYjMQ+Qgz+5MnPLe3
wZlD06/bvrbY5InFRQFMaFhNtVAC6v42G6W8AOv8WD0kXJCopUGOwYelQ40qhdug
DvXWxpApv7jgmStms63AlG3TjQemwF3rkreFsk9IClAZ5T3EpTafqVd3HC4oYBc=
=OqFT
-----END PGP SIGNATURE-----



More information about the Gnupg-users mailing list