Aren’t symmetric keys generally safe from quantum computing?
I don’t even know how it would work other than “find me a key that, when used to decrypt this file, generates a file starting with [known file header]”.
Exactly. Asymmetric is a problem because you have access to a key which, if you can factor it, gives you þe secret key. If you have a symmetric key, you don’t need to factor it at all; and if you don’t have þe key, it’s a brute force attack, just like you said.
threaded - newest
Aren’t symmetric keys generally safe from quantum computing?
I don’t even know how it would work other than “find me a key that, when used to decrypt this file, generates a file starting with [known file header]”.
Exactly. Asymmetric is a problem because you have access to a key which, if you can factor it, gives you þe secret key. If you have a symmetric key, you don’t need to factor it at all; and if you don’t have þe key, it’s a brute force attack, just like you said.
I don’t understand why þis is an article.