ETSI GR QSC 006-2017 Quantum-Safe Cryptography (QSC) Limits to Quantum Computing applied to symmetric key sizes (V1 1 1)《量子安全密码 (QSC) 适用于对称密钥大小的量子计算的限制(V1 1 1)》.pdf
《ETSI GR QSC 006-2017 Quantum-Safe Cryptography (QSC) Limits to Quantum Computing applied to symmetric key sizes (V1 1 1)《量子安全密码 (QSC) 适用于对称密钥大小的量子计算的限制(V1 1 1)》.pdf》由会员分享,可在线阅读,更多相关《ETSI GR QSC 006-2017 Quantum-Safe Cryptography (QSC) Limits to Quantum Computing applied to symmetric key sizes (V1 1 1)《量子安全密码 (QSC) 适用于对称密钥大小的量子计算的限制(V1 1 1)》.pdf(14页珍藏版)》请在麦多课文档分享上搜索。
1、 ETSI GR QSC 006 V1.1.1 (2017-02) Quantum-Safe Cryptography (QSC); Limits to Quantum Computing applied to symmetric key sizes Disclaimer The present document has been produced and approved by the Quantum-Safe Cryptography (QSC) ETSI Industry Specification Group (ISG) and represents the views of thos
2、e members who participated in this ISG. It does not necessarily represent the views of the entire ETSI membership. GROUP REPORT ETSI ETSI GR QSC 006 V1.1.1 (2017-02) 2 Reference DGR/QSC-006 Keywords cyber security, quantum cryptography, security ETSI 650 Route des Lucioles F-06921 Sophia Antipolis C
3、edex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice The present document can be downloaded from: http:/www.etsi.org/standards-search The present document
4、 may be made available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/or i
5、n print, the only prevailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status
6、 of this and other ETSI documents is available at https:/portal.etsi.org/TB/ETSIDeliverableStatus.aspx If you find errors in the present document, please send your comment to one of the following services: https:/portal.etsi.org/People/CommiteeSupportStaff.aspx Copyright Notification No part may be
7、reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI. The content of the PDF version shall not be modified without the written authorization of ETSI. The copyright and the foregoing restr
8、iction extend to reproduction in all media. European Telecommunications Standards Institute 2017. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTMand the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GPPTM and LTE are Trade Marks of ETSI registered for the benefit of
9、its Members and of the 3GPP Organizational Partners. GSM and the GSM logo are Trade Marks registered and owned by the GSM Association. ETSI ETSI GR QSC 006 V1.1.1 (2017-02) 3 Contents Intellectual Property Rights 4g3Foreword . 4g3Modal verbs terminology 4g3Executive summary 4g3Introduction 4g31 Scop
10、e 6g32 References 6g32.1 Normative references . 6g32.2 Informative references 6g33 Symbols and abbreviations . 7g33.1 Symbols 7g33.2 Abbreviations . 7g34 Background 8g34.1 Asymmetric cryptography and quantum computing 8g34.2 Symmetric cryptography and quantum computers . 8g34.3 Number of qubits 8g34
11、.4 Outline of the present document . 9g35 Quantum computers in 2050 9g35.1 Approach 9g35.2 Moores Law . 9g35.3 Commercial quantum computers 10g35.4 Worst case quantum computers 10g35.5 An upper bound for quantum computing budgets 11g36 Key and parameter sizes . 11g36.1 Approach 11g36.2 Symmetric key
12、s 12g36.3 Hash output lengths 12g37 Conclusions 13g3History 14g3ETSI ETSI GR QSC 006 V1.1.1 (2017-02) 4 Intellectual Property Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly
13、 available for ETSI members and non-members, and can be found in ETSI SR 000 314: “Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web
14、 server (https:/ipr.etsi.org/). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may
15、become, essential to the present document. Foreword This Group Report (GR) has been produced by ETSI Industry Specification Group (ISG) Quantum-Safe Cryptography (QSC). Modal verbs terminology In the present document “should“, “should not“, “may“, “need not“, “will“, “will not“, “can“ and “cannot“ a
16、re to be interpreted as described in clause 3.2 of the ETSI Drafting Rules (Verbal forms for the expression of provisions). “must“ and “must not“ are NOT allowed in ETSI deliverables except when used in direct citation. Executive summary The present document analyses the impact of a quantum computer
17、 on symmetric cryptographic primitives. A worst-case estimate is derived for the maximum available quantum computing power in 2050. This leads to the conclusion that 256-bit symmetric ciphers and hash functions will still be unbroken in 2050. Introduction A quantum computer will require an enormous
18、change in the cryptographic landscape i.7. This is why research and standardization effort is put into finding quantum-safe asymmetric alternatives for RSA, (EC) Diffie-Hellman, and (EC)DSA. Significant effort from industry will be put into preparing for the necessary transition to these new asymmet
19、ric primitives. However, symmetric primitives like AES, SHA-2, and SHA-3 are equally integrated into the numerous information security solutions that exist worldwide. Since a quantum computer can also speed up attacks on symmetric primitives i.6, it is important to analyse how long these symmetric p
20、rimitives - and their most-used key sizes - will remain secure. The present document studies the long-term security of symmetric primitives such as AES-256, SHA-2, and SHA-3. A scientific approach shows that attacks cannot continue to improve at an exponential rate forever. Moores Law may assert tha
21、t transistors become twice as small roughly every 1,5 years, but this trend cannot continue and in fact has already stopped. While it is unknown whether a similar trend will appear for quantum computers, it is possible to put an upper bound on the quantum computing power that could be developed in t
22、he foreseeable future. The analysis in the present document is based on conservative assumptions and estimates. This does not result in exact dates on when each primitive will be broken, but it does assert their security for at least a certain period of time. The present document concludes that ther
23、e are existing and widely used symmetric (AES-256) and hash primitives (SHA-2 and SHA-3 with an output length of at least 256 bits) that will withstand quantum computer attacks until way after 2050. It is reassuring to know that for these symmetric primitives there is no need to find and heavily scr
24、utinize alternatives within the next few years, like is done for the asymmetric primitives. ETSI ETSI GR QSC 006 V1.1.1 (2017-02) 5 Note that this does not mean that there is no need to look into symmetric algorithms when it comes to the threat of a quantum computer. On the contrary, industry does h
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ETSIGRQSC0062017QUANTUMSAFECRYPTOGRAPHYQSCLIMITSTOQUANTUMCOMPUTINGAPPLIEDTOSYMMETRICKEYSIZESV111 量子 安全

链接地址:http://www.mydoc123.com/p-733235.html