mirror of
https://codeberg.org/openpgp/notes.git
synced 2024-11-27 10:02:06 +01:00
clarify and question the benefits and downsides section
This commit is contained in:
parent
ce6d28020c
commit
3fb0179a77
1 changed files with 8 additions and 2 deletions
|
@ -31,13 +31,19 @@ Participants in symmetric-key operations need to exchange the shared secret over
|
||||||
|
|
||||||
### Benefits and downsides
|
### Benefits and downsides
|
||||||
|
|
||||||
Symmetric-key cryptography has major benefits: it is much faster than public-key cryptography (see below). Also, most current symmetric cryptographic algorithms are considered quantum-resistant[^postquantum].
|
Symmetric-key cryptography has major benefits: It is much faster than public-key cryptography (see below). Also, most current symmetric cryptographic algorithms are considered quantum-resistant[^postquantum].
|
||||||
|
|
||||||
|
```{admonition}
|
||||||
|
:class: warning
|
||||||
|
|
||||||
|
I am not convinced that this information is helpful but, if it remains, perhaps we need this additional statement: "That is, symmetric-key cryptographic mechanisms are currently considered to be resilient against known computer threats, providing a measure of assurance in the evolving landscape of cryptography and quantum computing."
|
||||||
|
|
||||||
[^postquantum]: Daniel J. Bernstein (2009). ["Introduction to post-quantum cryptography" (PDF)](http://www.pqcrypto.org/www.springer.com/cda/content/document/cda_downloaddocument/9783540887010-c1.pdf) states that: "many important classes of cryptographic systems", including secret-key cryptographic mechanisms like AES "[..] are believed to resist classical computers and quantum computers." (pages 1, 2).
|
[^postquantum]: Daniel J. Bernstein (2009). ["Introduction to post-quantum cryptography" (PDF)](http://www.pqcrypto.org/www.springer.com/cda/content/document/cda_downloaddocument/9783540887010-c1.pdf) states that: "many important classes of cryptographic systems", including secret-key cryptographic mechanisms like AES "[..] are believed to resist classical computers and quantum computers." (pages 1, 2).
|
||||||
|
```
|
||||||
|
|
||||||
However, exchanging the required shared secret is a problem that needs to be solved separately.
|
However, exchanging the required shared secret is a problem that needs to be solved separately.
|
||||||
|
|
||||||
[Hybrid cryptosystems](hybrid_cryptosystems) (see below) are one common approach to leverage the benefits of symmetric-key cryptography, while handling the shared secret with a separate mechanism (using public-key cryptography).
|
[Hybrid cryptosystems](hybrid_cryptosystems) combine the advantages of symmetric-key cryptography with a separate mechanism for managing the shared secret, using public-key cryptography.
|
||||||
|
|
||||||
### Symmetric-key cryptography in OpenPGP
|
### Symmetric-key cryptography in OpenPGP
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue