Peter Gutmann - Why Quantum Cryptanalysis is Bollocks
By Kawaiicon NZ
Summary
Topics Covered
- Super guns and quantum crypto: headline-grabbing distractions
- Known security threats remain, but attention shifts to 'stunt cryptography'
- Quantum computing claims: physics experiments, not practical computers
- Quantum factorization is 'slight of hand,' not a real threat
- The 'churn' in crypto incentivizes hype over security
Full Transcript
So, bit of background history. Um, what
you see up there is something called Gustaf. It was proposed in 1935 to
Gustaf. It was proposed in 1935 to attack the Magino line, but like all government projects, it fell way behind schedule, so it wasn't ready in time.
Um, and this was the attention headline grabbing attack of about 80 odd years ago. This thing weighed 1,300 tons,
ago. This thing weighed 1,300 tons, could fire a 5-tonon shell to around 50 kilometers, and left a crater about enormously wide. And basically, this was
enormously wide. And basically, this was where all the action was. This was the cool attack of about 80 years ago and everyone who was anyone wanted to be associated with this thing.
So the the downside with this was it required a one and a half kilometer long train with 25 freight cars. Now that was just the gun and the supplies.
Everything else was separate. It took
depending on which reports you believe between 2,000 and 4 and a half thousand men to set this thing up.
Um it required twin sets of special railway tracks. So you couldn't just run
railway tracks. So you couldn't just run it down standard tracks. You had to build twin sets of tracks to run the thing. It had two entire flack
thing. It had two entire flack battalions to defend it. Um and it fired around 50 shells and again reports vary um on about five different days.
So one of these targets was for Maxim Guaki and they fired 13 shots at it.
Every one of them missed some by hundreds of meters. So the artillery geeks had actually said in advance, "This thing is not going to work. Don't
bother building it." But it was so cool that they just had to go ahead and do it anyway.
So this was actually a considerable loss for the war effort. It drew resources away from the main attack to this stupid thing which was just it was a headline grabbing attack but that was about it.
Um you could have achieved the same thing by just flying aircraft over it and bombing the thing. In fact, it had a squadron of spotter aircraft that could have been used to do a bombing that would have been more effective than the
super gun. So surely we're not still
super gun. So surely we're not still doing the same thing today.
So let's look at the threats. Um in the security field we've actually got pretty good data on what the problems are. So
that's the OOS POP 10 and they've been pretty much constant for the last 10 to 20 years. They've changed names a bit
20 years. They've changed names a bit and the classifications have changed a bit and so on, but they're pretty much the same threats. Meaning the things that attackers were doing 20 years ago that we didn't really know how to
mitigate are still the current threats.
And there's all sorts of different lists for this. For example, APIs. And again,
for this. For example, APIs. And again,
it's pretty much constant. Some things
have changed names, some have shuffled around a bit, but it's pretty much the same attacks.
and they're remarkably stable over time.
That's the 20-y year history um of some of these attacks. And again, if you really want to get geeky, that's the full breakdown of of how everything's gone. And this is widespread across lots
gone. And this is widespread across lots of different security measures. For
example, um the CRA grand challenges and trustworthy computing was 2003. These
are the things that we need to solve within the next 5 to 10 years. Grand
challenge one within a decade eradicate widespread viral spam and DOS attacks and similar ones. So, we've got 10 years starting 2003.
retrospective in 2023. So they went back and asked the people involved in these grand challenges um you know have we addressed any of these grand challenges and many participants said that a single challenge had actually been met meaning
we've got these known vulner known problems they're major problems and we still have managed to deal with them um and again just a random slide um of example threats so you've got the these
are the top the the things with the top number of CVE and most of them are complete operating systems but you look at two web browsers and these are like one single application a web browser that has more CVs than an entire
operating system. So we're really not
operating system. So we're really not doing a very good job. On the other hand, what gets all the attention in terms of attacks? If you consult the OOS top 100,000 and you look at the appendix to the addendum to the supplement to the
apocrypha volume 127, that's the stuff that gets the news. That's what you hear. That's what you hear the news
hear. That's what you hear the news stories about. And the thing they all
stories about. And the thing they all have in common is that no one ever uses them because there are about 17,000 easier attacks that everyone uses that generally don't get that much attention.
So these have been called stunt cryptography. So basically you've got a
cryptography. So basically you've got a 1,000th of a percent chance of measuring recovering two bits of plain text from a single message. On the other hand, the
single message. On the other hand, the reason why attackers use the OOS top 10 is you've got a 100% chance of recovering everything.
And people really like these headline grabbing attacks even if they're completely p practical. Um, I'm just going to do a quick survey. Does anyone
know of any cases of Roham or Poodle, anything like that? An actual attack, a legitimate attack by attackers who compromised a system using one of these stunt cryptography things.
Okay, zero hands. U, which is pretty much what's expected because it's just not worth using those attacks. So, my
argument is only once you fix the top 10 are you allowed to go for all the stunt cryptography stuff. So, there are other
cryptography stuff. So, there are other cases where we've got very good measurements. For example, this is RSA
measurements. For example, this is RSA key size factoring throughout the years.
So the first time it was sort of done seriously for crypto was around about 1990 and it's pretty much a straight line. Um so you know that if you've got
line. Um so you know that if you've got let's say a thousand bit key you go across on the graph it'll be secured till about 2040. Now the argument is okay you can break thousand bit keys today. And yes you can with something
today. And yes you can with something like that that's a supercomputer at Los Alamos. It takes around a year's work to
Alamos. It takes around a year's work to factor a thousand bit RSA key. So let's
explore this a bit. Let's say you're an NSA employee and you go to your boss and you say, "I've got this thousand bit key I'd like to factor." And the boss says, "Sure, tell me more." And you say, "Well, I need to shut down Los Alamos for an entire year just to recover this
single thousand bit key." At which point your boss looks at you like they expect a cookie to pop out of your forehead on a spring.
But, you know, to make it more applicable to individuals, um, let's say I've got a black box and it will, for example, the one on the film yesterday and it will factor a thousand bit key in one year. So, basically the same amount
one year. So, basically the same amount of effort. And to prove your dedication
of effort. And to prove your dedication to this, you have to agree to live on a desert island, no internet connection, nothing for one year while this box does its work. Um, so you get a monthly air
its work. Um, so you get a monthly air drop of baked beans, which is fine.
You're on the island by itself, so you can eat all the beans you want. Um, but
apart from that, you've got nothing to do except twiddle your thumbs for a year while this black box does its job. Would
anyone accept this offer? Does anyone
know of a thousand bit key that they'd want to break where they'd be willing to spend a year in isolation waiting for it to finish?
Okay, again, no, no hands. And that's a pretty standard response. So we don't really have any rational attacks. So
instead we've gone for numerology.
That's a table from NIST mapping a bunch of sort of imaginary numbers to other imaginary numbers. So the thing is where
imaginary numbers. So the thing is where do these figures come from? The
practical limits on achievable computation are around 2 to the 110 or so. And that's you're starting to use
so. And that's you're starting to use things like using the planetary core as a power source and can convert the entire Sahara desert worth of sand into silicon and so on. So it's pretty extreme. Um the Bitcoin hash rate at the
extreme. Um the Bitcoin hash rate at the moment is 2 to the 94 per year. So 2 to the 1 is a reasonably safe upper bound on human computation. That means the
keys for triple D's AES 128, AS 192, and AS 256 are all basically equivalent because they're all out of reach of any imaginable human computation. They pass
the 2 to the 11 event horizon. But we're
doing using numerology, so it requires that we treat them all as distinct. So
for symmetric crypto, each bit you add doubles the work factor. For asmmetric
crypto, it's not that simple. You need
these mappings into ridiculous key sizes. So to match each one of these
sizes. So to match each one of these basically irrelevant extra bits you add to a symmetric key, you need a vast number of extra bits added to the asymmetric keys. So for example, for I
asymmetric keys. So for example, for I think for AS 256, you need a 15,000 bit RSA key, even though it's no more breakable than AES 128.
But wait, there's a much better one. Um
the first quant factorization was done in 2001 and it factor the number 15.
That's not a 15-digit number. It's not
even a 15 bit number. It's 3 * 5. So you
could do the same with a dog train to bark three times. Um the next record was in 2012. This time it was 3 * 7 and you
in 2012. This time it was 3 * 7 and you can use the same dog to factor that. And
then there was another attempt in 2019 which was to factor 35 and it failed. Um
since then there have been no new factorization records using Shaw's algorithm which is the quantum algorithm you're supposed to use for this. There
have been records announced but it's I'll get into that in a minute.
So basically the scientific breakthrough in all of these cases was finding techniques to manufacture a number that you could then factor um and then claim a record on it. So the standard technique is you manufacture a small number that's relatively easy to factor
and then you figure out ways of adding more digits to it that you can factor using the same method but just you've now got much many more digits on it so you can claim a new record. Um it's been called they've been called stunt
factorizations. Uh there's a paper um
factorizations. Uh there's a paper um some of you may be familiar with replication of quantum factorization records with an 8bit at home computer an abacus and a dog um which shows yeah how to use an abacus to to do a a quantum
factorization.
So even the factorizations of 15 and 21 took advantage of special tricks. So you
know the factors in advance. So you
basically you know the factors and you work backwards and build an experiment that gives you the result you want which is the factors you already know in advance. This is not and it's called the
advance. This is not and it's called the compiled shores algorithm to mask the fact that you're basically cheating. Um
this is not a legitimate way of doing cryp analysis because the assumption is you don't know the encryption key in advance before you even start. However,
in any case, we've got two data points.
So the the factorization of those two values that we can put on a graph.
So if you extrapolate um by 4,000 AD given the current progress we can factor a thousand bit number that you can do already with a with a admittedly with Los Alamos but you know with a with a
large computer. So the thing is it makes
large computer. So the thing is it makes a highly optimistic assumption that these physics experiments scale linearly. We've got no evidence that
linearly. We've got no evidence that this is the case. We've got very little empirically evidence of of any of this stuff. In fact the evidence we have
stuff. In fact the evidence we have shown by the lack of progress is that this is not the case. Um, but in any case, possibly in 2000 years, a physics experiment can do what a standard
computer can do today. And if if you guys follow the, you know, announcements of quantum supremacy, which happen every couple of weeks, um, even though in theory it should only be a it's like it's a binary thing, but it keeps being
reannounced. And then typically what
reannounced. And then typically what happens is someone announces quantum supremacy, someone else comes along and says, "Well, actually a standard desktop PC can do that a lot better than your your quantum thing." Um, so it's it's kind of an established pattern. Now
notice I've been calling these things physics experiments. These are physics
physics experiments. These are physics experiments. They're not computers. Um
experiments. They're not computers. Um
claiming that it's a computer kind of misrepresents what we're really working with. So a computer takes input data, it
with. So a computer takes input data, it processes it, it produces output. An
experiment on the other hand, and this is a dictionary definition I found. Uh I
can't remember which dictionary it was.
A scientific procedure undertaken to make a discovery test hypothesis or demonstrate a known fact. And that's
what these experiments are doing. We've
got this known fact that we know in advance 3* 5. you construct an experiment to demonstrate that 3 * 5= 15.
Um, so these are physics experiments.
They're not computers.
Um, what this also means is that you can't pop out keys like a production line. Um, so each experiment requires a
line. Um, so each experiment requires a custom designed and assembled physics experiment to get the result you want.
So think sort of ENIAC from 1945, not a desktop PC. ENIAC took about two weeks
desktop PC. ENIAC took about two weeks by a six programmer team to set up the plugboards to wire this thing up for a particular to to calculate a particular result.
So I've never found any paper that mentions how long it takes to set up the experiment to get this result. We've got
zero data points to work from. Um the
fact that typically only a single result is produced indicates that it's a non-trivial amount of effort. Um and so you've got this, you know, the earlier problem is is there a key worth attacking? Well, if it takes a month to
attacking? Well, if it takes a month to set this thing up, you'd better be to be damn sure that key is actually worth, you know, spending a month with a physics experiment to to attack.
So, some examples of other physics based factorization techniques, something called twinkle. So, AD Shamir, who's the
called twinkle. So, AD Shamir, who's the sna and a very clever guy, um, proposed something called twinkle, which was later expanded to per to twirl, which was essentially a physics-based factoring device. Um, unfortunately, he
factoring device. Um, unfortunately, he forgot to use the word quantum in it.
does actually it's it uses LEDs so there's quantum effects but he forgot to use the word quantum in it so nobody really paid much attention to it so it's been suggested that it takes advantage of something called the
Heisenber shooting a credul effect um the word quantum sucks people's brains out and otherwise sensible people suffer from impaired reasoning although in honor of metaltorm I think it needs metal umls on it so we call it the
shooting a hazenberry credul effect so every time you see quantum computer think physics experiment which is actually what it is so here's an example of this effect in action. This is this is a news release, news story from a
couple of months ago. So, Finnish firm Blue Force, a maker of refrigerators, uh has signed a contract $300 million to purchase helium 3 from the moon. Um it's
not the script of an Iron Sky sequel.
That is a serious thing. And they're
going to they're going to um bring this stuff back between 2028 and 2037. I
assume it's a product by product of the green cheese mines, but you know, you just put quantum in it and people will just give you money for anything. So,
how does a physics experiment break crypto? Uh there's an example. Public
crypto? Uh there's an example. Public
key cryptography. You've got this sort of vague thing saying a working quantum factorization machine goes here and profit. You can apply this to lots of
profit. You can apply this to lots of things. Overpopul on earth working
things. Overpopul on earth working faster than light drive goes here profit. You want to kill Hitler, Stalin,
profit. You want to kill Hitler, Stalin, whatever. Working time machine goes here
whatever. Working time machine goes here profit.
So there was a a um quantum physics pioneer called Wolfgang Pi. Um and he would have loved this stuff. So at one point he was arguing with someone who had this very vague argument. Um and he drew this diagram. I don't know how legible the writing it is but this is to
show the world I can paint like only technical details are missing. Now if he was alive today he would say this is to show the world a quantum factorization machine only practical details are missing.
So evidence for this effect um when you say working time machine goes here as you know people laughed when I had the time machine slide then it's a joke. But
when you say working quantum factorization machine goes here it's dead serious.
So remember these records that I mentioned earlier. So they factored two
mentioned earlier. So they factored two carefully chosen numbers with the results known as advanced. These are
slight of hand numbers um and stunt factorizations which I've mentioned earlier. Uh there's never been a single
earlier. Uh there's never been a single physics experiment to date that hasn't used hasn't factored a slight of hand number. Um, for people who haven't been
number. Um, for people who haven't been exposed to the vict the 8bit computer and barking dog paper, who here knew that there's never been a single legitimate factorization of a number
with a physics experiment, very small number of hands. Yeah, but
that's okay. So now you know. Um, and
it's a stock and trade of stage magicians. So for example, you know,
magicians. So for example, you know, standard card trick, pick a card, any card. You have lots of smoke and mirrors
card. You have lots of smoke and mirrors to distract the audience. And then you ask, is it the five of spades? The
equivalent for this is pick an integer greater than 14 and less than 16. Lots
of smoke and mirrors to distract the audience. Is it 3* 5?
audience. Is it 3* 5?
And yeah, it's only ever factored slight of hand numbers. There's an extreme example. Um so D-Wave who have some very
example. Um so D-Wave who have some very contested claims about their their supposedly quantum stuff. Um they
advertised that they faced a 2,000 bit RSA number. So what they did is they
RSA number. So what they did is they chose something that differed only in a small number of bits. So you take the square root and then you guess one bit and then you've factored it. Now no RSA key ever has that form that you know the
specific they have to differ by at least 100 bits. Um so no key will ever have
100 bits. Um so no key will ever have that form. But if you're allowed to
that form. But if you're allowed to manufacture your own synthetic numbers that you can factor in in with an abacus in this case because you can do square roots on an abacus. Um then you can claim that you factored a 2000 bit RSA
number. This is the best one I've run
number. This is the best one I've run into. Um so what you do is um without
into. Um so what you do is um without sort of going into the details of how these things work but they have serious problems with errors and so typically a lot of the work involved is an error correction not in not in the maths itself. So what you do is you run the
itself. So what you do is you run the experiment and you ignore any errors and since you know the advancer in advance you keep rerunning it until eventually by random chance you get the result you want. Um and the quote with this is um
want. Um and the quote with this is um yeah to my knowledge no one's cheated at factoring in this way before. Given the
shenanigans pulled by past factoring experiments that's remarkable. Um this
is from the guy who who came up with this factoring technique.
So basically if you exclude the slight of hand factorizations, our earlier graph actually simplifies to that.
There's there is literally no data. Um
which coincidentally is the same number of data points we have for faster than light travel and Star Trek style teleporters and time travel and so on.
Now you know this is a valid result because it shows that we're not actually getting anywhere. We're not making any
getting anywhere. We're not making any progress. We have no empirical results.
progress. We have no empirical results.
So some counter arguments to this. We're
making incremental improvements on quantum factorization. So imagine you go
quantum factorization. So imagine you go to your boss and you say, "We've spent 20 years and burned through hund00 million and we haven't got anything, but we've made incremental improvements."
Which means you're now qualified to be a defense contractor.
Um, another example of these incremental improvements. So the Lio 9 Hispania,
improvements. So the Lio 9 Hispania, better known as the Ninth Legion, they vanished in about 120 AD. And we've been we've been making incremental improvements on figuring out what happened to them for about 2,000 years.
um in the same way that we've been making incremental improvements on on quantum cryp analysis for about 25 years and we've got just as far in either case. So we've got a long way to go if
case. So we've got a long way to go if we want to catch up with the ninth legion um incremental improvements.
Another thing you may have heard about is store now decrypt later or the SNDL boogeyman. So the idea behind this is
boogeyman. So the idea behind this is you store 10 xabytes of encrypted data on a USB key and then in 30 years you come along with a physics experiment and you you decrypt everything. So let's
look at this in a bit more detail. Um,
so it ignores the fact that you need to set up a fresh physics experiment for each new key used. So, um, for every new for every key exchange, you're negotiating a fresh key, which means to
recover, you know, one encrypted session or encrypted message or whatever, you need to set up a new physics experiment just for that particular exchange. So,
the last fig, latest figures I could find were 2017, there was 7 trillion symmetric keys a year used purely for web traffic alone, not for anything else that uses encryption. And that's a limiting factor. So the German
limiting factor. So the German government study estimated based on a imaginary device that doesn't exist, but they said if we had one of these, it would take about 100 days and 4 million euros in electricity to recover a single
448 bit key. So in that 100 days when you're running this physics experiment, another two trillion keys have turned up that you need to break. So we'll ignore this bit because everyone else does too.
Another problem is um everyone always claims these records for factorization, which is RSA encryption. The thing is what everything uses that you're interested in for storing decrypt later.
So TLS, CCSH, IPC, wire guard signal, just everything is not RSA. They don't
use that. They use something called the discrete logarithm problem or DLP, which no physics experiment has ever addressed because it's actually quite hard to cheat on this. So you can't claim a record on something where you can't manipulate the experiment. Um, but
again, we'llign. So they're attacking completely the wrong thing. That has
nothing to do with what you actually want to be attacking, but we'll ignore that too.
Um so the assumption is that that that you know big brother wants to read everything you've got. Well what
encrypted data from today will actually be useful in of interest in 30 years time. Pretty much everything that you
time. Pretty much everything that you encrypt today obviously there'll be state secrets and a few other things that that spooks are interested in. But
most things that are encrypted today are just not of any interest. You're not
going to spend 4 million euros to decrypt some online chat from last week.
So here's some new here's a new research topic. figure out some situations where
topic. figure out some situations where SNDL is actually a threat rather than just this phantom bogeyman that we can wave around. And it's complicated by the
wave around. And it's complicated by the fact we have no idea how to build these things. So we don't actually know what
things. So we don't actually know what we're going to use to implement this threat.
Another example is you're measuring it wrong. So apparently using the lack of
wrong. So apparently using the lack of progress in this stuff is not an accurate way to measure the lack of progress in this stuff. So one
suggestion was I should be using the claim cubit counts. But you want something where number go up and with cubit counts you can claim pretty much anything you want. Dwave being an example number go up so I should be
using that to measure progress. Um so
yeah that does fill the requirement. So
my counter suggestion was use the number of conference papers and news stories with the word quantum in the title as your metric because number go up and it measures the it's a good metric for evaluating the success of quantum and at
that point the conversation ended. Um
what if you're wrong? Well wrong about what this is this it's you know there's this it's basically just a bunch of facts. It's a line on an Irish graph.
facts. It's a line on an Irish graph.
It's counting zero results. So far, it's the weight of Gustaf, whatever. This is
just known facts. There's actually um about 10 slides of references at the end if people want to look up all the details themselves.
Um so when should we start worrying?
Well, basically whenever that turns into that um we should start worrying and there's no sign that that will ever happen.
So you've got post physics experiment cryptography. Um one option which is
cryptography. Um one option which is quite popular is latter space cryptography was proposed about 30 years ago. So, it was never used because it
ago. So, it was never used because it really just wasn't that good. It was
incredibly inefficient, vaguely interesting mathematically, but and there were sporadic papers published, but it wasn't attacked nearly as heavily as the stuff that's actually used. Um,
maybe we could use the time machine from the previous slide to go back in time and uh see if it's still okay. We're
ahead in time. It's probably secure. We
think it's secure. Um, as of late 2023, 48%, so nearly half of all the NIST round one postquantum candidates have been broken. Of the ones that survived
been broken. Of the ones that survived that, another 25% were broken. Of the
ones that survived that process and went to round three, another 36% of those were broken. So this is really, really
were broken. So this is really, really shaky stuff. And that's the publicly
shaky stuff. And that's the publicly known breaks. We don't know if the NSA
known breaks. We don't know if the NSA is sitting on half a dozen breaks that they're not going to tell anyone about.
So basically, we've got very little operational experience with it. And if
the operational history of every other public key crypto system is anything to go by, there's going to be lots of problems discovered. Um so and you know
problems discovered. Um so and you know the argument is now we've got this quantum thing to worry about. Well what
if the next time the the cryptographers come along and say we now got biological computing and we need to worry about that and and reinvent the world yet again.
So some examples of of how these are supposed to be used. The governments
prefer pure postquantum. So postquantum
only nothing else. So in effect what they're saying is we're putting all our eggs in one basket and hoping that the dial stops spinning it not broken.
Everyone else wants hybrid. So it's a mixture of postquantum and not postquantum stuff which in effect is saying we trust this stuff so little that we're requiring that you use the crypto that we claim is broken alongside it.
So why are we fixated on this? I mean at the moment we've got a physics experiment that's no one's actually managed to manage to assemble yet that's faking a solution to a problem factorization that's totally unrelated
to the one we want to solve DLP which falls two trillion keys behind for every time that every key that it actually recovers.
So this is scribble and scribble can bark five times which makes him more powerful and more capable than the world's most powerful factorization experiment but nevertheless that's been our reaction so far.
So again an analogy let's look at subprime mortgages. So you had these
subprime mortgages. So you had these things where home buyers and investors were practically given um houses so called ninja mortgages. Mortgage brokers
were earning good commissions. Fanny May
and Freddy Mack, which is the US um agencies that are designed to get people into houses. Um got plots for assisting
into houses. Um got plots for assisting low-inccome um owners into housing. Um
retail banks made money selling mortgages to investment banks and they converted liability to cash assets.
Investment banks made um bought mortgages and then bundled them up into mortgage based securities. Um MBS
investors made money um from these things and insurance companies made money because they issued these bogus credit ratings based on these bo bogus um bundled mortgages. The thing is
everybody was making money. So nobody if you look at the entire food chain from the person getting given a house all the way through to the the auditors and so on at the other end of the chain everybody was making money. So nobody
had any incentive to push the emergency stop. All the data was there. Um you
stop. All the data was there. Um you
know I was working for a large bank in the US or did some work for a large bank at the US in the US at the time and they said look at these figures look at these defaults and so on. There's going to be a crash at this point and he was off by about a week. Um, but no one had any
motivation to push the emergency stop because everyone was making money. So,
pop quiz for security people. Which one
of these would you choose? If you're an academic, would you like to publish another paper on group key management that no one will ever read? Or would you like to publish a paper on some cool new physics experiment based thing? Um, if
you're standards groups, would you want to standardize away at at some other some new TLS extension that nobody will ever care about? Or would you want to fly from one exotic location to another um and argue over which post physics
experiment is the most chromulent? If
you're a developer, do you want to audit existing code for problems? Or do you want to implement some new post physics experiment thing that's really cool and hip and everybody's talking about it? If
you're a journalist, do you want to write about this week's PHP vulnerability or do you want to announce quantum supremacy or the quantocalypse for the 17th time in a row? [snorts]
and everybody chooses B because that's the fun bit. The A bit is the old grind that you don't want to get back to. And
as with subprime mortgages, um, nobody involved has any incentive to stop the merry-go round. If the merrygo round
merry-go round. If the merrygo round stops, then everyone has to go back to doing all the boring stuff because the OOS top 10 are still waiting and we'll still be waiting.
So in the 1990s, there was this claim that um, e-commerce needs PKI to succeed and that was the argument, you know, we absolutely need to have PKI for e-commerce. Now, if you look at
e-commerce. Now, if you look at e-commerce in the 1990s, you go to a website, you enter username, password, credit card. If you look at e-commerce
credit card. If you look at e-commerce today, you go to a website, enter your username, password, and credit card. So,
it hasn't really needed PKI. So, the
corrected form of that is actually PKI needs e-commerce to succeed. Without
e-commerce to justify it, there's not much point in in PKI. Okay. And
admittedly, in 2013, the NSA gave us a second reason why it's good to have PKI with with TLS. But basically, the e-commerce argument was the argument in reverse. Quantum computing also has the
reverse. Quantum computing also has the same problem. It needs cryp analysis to
same problem. It needs cryp analysis to succeed. If you look at almost every new
succeed. If you look at almost every new quantum computing announcement, um it's either just an announcement for the announcement's sake. We've done
announcement's sake. We've done something new with bits. Um or it'll mention cryp analysis because there's really not much other application for it. In other words, there's not much
it. In other words, there's not much reason why you want to give the quantum guys a pile of money. Um because it doesn't really solve any problems. At most you get a few invented for quantum computers to solve until someone else
comes along and says well actually a standard PC can do that just as well.
So here's an example of a new story as reported by quantum and non-quantum media. This is the same news story. So
media. This is the same news story. So
the quantum magazine new quantum algorithm factors numbers with a single bit. The non-quantum magazine the
bit. The non-quantum magazine the quantum factoring algorithm that requires the energy output of stars. A
77page monument to missing the point. So
that's exactly the same news story just reported differently.
So again, as with the super guns, what this is doing is it's drawing resources away from the actual problem and devoting it to something that that really is pretty much irrelevant. Um,
you know, if you imagine if the hundreds of millions of dollars and all the expertise that was being devoted to working on these physics experiments was actually devoted to SAS tools or scanner, you know, just something where it's actually useful and where it's
going to be addressing things that the attackers are doing.
Um and so the thing with this is you know this is this is a quote from a a conference paper. So future adapt
conference paper. So future adapt adoption of these algorithms is likely inevitable even if a quantum computer is never built opening the door to decades of new research in cryp analysis. So
that's cryptographers are saying this is brilliant. This is this is a whole
brilliant. This is this is a whole career path for us. We can keep working on this stuff even if the threat never eventuates.
And so yeah software security designers, standards people but you know again everyone involved in the food chain thrives on this stuff.
So this is something you'll never see in any security protocol or standards group discussion ever. Okay, we're done now.
discussion ever. Okay, we're done now.
Um these standards, there's standards groups that have been explicitly shut down in the ITF and they just continue.
For example, Pix has gone continues under another name. PGP just keeps going and going and going and going. Um SSH
carries on as like open SSH inventions that that that that backport boughted into the standard. So getting back to the stock market analogy, you can make money when the market's going up or going down. You can't make money when
going down. You can't make money when prices are constant. So the whole stock market system is built is designed to have churn because churn allows people to make money. In crypto, churn means academics can write papers, implementers
have something to hack away at. Um
vendors have something new to sell to their customers. So churn's good for
their customers. So churn's good for everybody except people primarily concerned about security and things like the OOS top 10. Okay, this is an old saw. Um and churn is basically
saw. Um and churn is basically complexity serialized standard complexity of everything up front. If
the thing is constantly changing, then you've got never- ending complexity because you you can never catch up to this. So, it turns the already bad
this. So, it turns the already bad enough complexity problem into a red queen complexity problem. Oops.
For example, the TLS product alone has 60 RFC's. That's not an error. 60 RFC's
60 RFC's. That's not an error. 60 RFC's
for TLS versions. There's 32 further drafts in progress. So, it's just under 2,000 pages of documents, which is that if you printed it out. Now, does anyone seriously think there aren't reams of vulnerabilities hidden in this
complexity? And that complexity is
complexity? And that complexity is caused by churn. That every couple of months a new IFC comes out that you're supposed to implement that nobody has time to assess properly for vulnerabilities. And that when they get
vulnerabilities. And that when they get implemented, inevitably there will be bugs in there. So, it is the the enemy enemy of security. The more complexity you have, okay, I'm preaching to the choir here. Um and the constant churn
choir here. Um and the constant churn just adds more complexity and unexpected emergent properties. So some of the most
emergent properties. So some of the most secure systems I've audited um were actually created by nonsecurity um geek embedded systems designers. They have
barebones TCP stack TLS with one single cipher suite, one single key exchange mechanism, one single cipher.
Certificate management is done by a meme copy because you don't really need an entire PKI in there. You just need to say here is the certificate. Does it
match or not? Um and you know some of these things were designed by embedded systems guys. They had no formal
systems guys. They had no formal education in security. They basically
taught themselves a bit of crypto and that was it. And these were really, really hard to break because there was nothing there to attack. The attack
surface was essentially zero.
So, oh wow, finished early. Um, so
something similar to quantum comput analysis has already happened in in um theoretical physics. If you're familiar
theoretical physics. If you're familiar with string theory, um it's basically it's non-falsifiable. It can't generate
it's non-falsifiable. It can't generate any testable predictions. Therefore,
there's no way to say it's wrong because it's not falsifiable. And what this did is it drew significant resources away from other physics research for at least two decades. So for a while if you
two decades. So for a while if you wanted to do theoretical physics you pretty much had to follow the string theory crowd because anything else wouldn't get funded or you couldn't find a supervisor to supervise you unless silver or renegade. Um comment there
from a mathematician. It's been
spectacularly successful on one front public relations.
Quantum crypto analysis is basically the string theory of security. It's never
generated a single test. String theory
has never generated a single testable prediction. quantum crypt analysis has
prediction. quantum crypt analysis has never factored a single non-slight of hand number and um for SNDL which is the threat that everyone likes to to site this um save now decrypt later it's
never managed anything at all there's never been a single result for the actual threat that people like to site as being the justification for this quantum stuff so basically magical thinking says it's
a serious threat empirical data says it's bollocks uh there's a great quote there from Sabini Hosenfellow who um is a physicist who did who did some of stuff before getting out. You know, the reason for doing this talk is ignoring
bad ideas doesn't make them go away.
They still eat up funding and killing ideas is a necessary part of science.
Think of it as a community service. So,
what I'm trying to do here is a community service.
>> Do you know a prime factorization for the number 15?
Good girl.
Thank you.
Loading video analysis...