deflating heffalumps

Jacob Bachmeyer jcb62281 at gmail.com
Sat Jan 4 03:18:06 CET 2025


On 1/2/25 22:59, Robert J. Hansen wrote:
>> Do I understand correctly that, while the complexity of
>> conventional factoring scales with a logarithm of RSA key length,
>> Shor's algorithm has a space requirement that scales linearly, but
>> the engineering challenges implied by that linear growth scale
>> exponentially?
>
> The keyspace equivalency is made under the assumption the attacker is
> using the generalized number field sieve. It's unsurprising for work
> factors to be different for different algorithmic approaches. Your
> conclusion is sound but please be careful not to draw inferences about
> one approach from the behavior of the other.

Yes, but you seem to be missing my intended point:  each additional RSA 
key bit far less than doubles the work to factor the key on a 
conventional computer, but nonetheless always add 5 additional qubits to 
the requirements for Shor's algorithm.

"Only 5 more qubits" may not sound like much, but the difficulty of 
adding those compounds for each additional qubit.

In theory, with long-enough (perhaps too long for practical use) RSA 
keys, conventional factoring would be /easier/ than Shor's algorithm.  
Is there such a "turnover" point?

One of the rationales for limiting GnuPG RSA keys to 4096 bits is those 
diminishing returns against GNFS factoring, but raising that limit may 
be appropriate to enable greater quantum resistance. (Lack of 
interoperability for longer RSA keys might be another good reason to 
keep the 4096-bit limit.)

>> Are those figures including error correction or /before/ error
>> correction?
>
> Before.

So those figures are low by factor of ...?  (Somehow I suspect that 
quantum error correction is considerably less efficient than 
Reed-Solomon...)

> [...]
>> Do the mathematical complexities that prevent conventional
>> computing from making short work of 256-bit ECC keys also affect
>> Shor's algorithm?
>
> My understanding is "no".

So a quantum computer able to solve RSA-256/384/512 can also solve 
EC-RSA-256/384/512 with the same difficulty?

>> If not, that would mean that RSA is actually /stronger/ against
>> future threats and TLS should be moving back to RSA and Diffie-
>> Hellman posthaste.
> The US government's belief is that RSA-3072 will be sufficient for 
> protection of Top Secret/SCI data for the next twenty-five years.
>
> [...]

And what about the various elliptic curve cryptosystems?


-- Jacob





More information about the Gnupg-users mailing list