Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

This doesn't make sense:

- i think encryption at rest would probably just use symmeyric encryption which is unaffected by shor

- how does the attacker get into your network in this scenario. Stuff encrypted at rest by definition is not flying around the network.

- what sort of scenario would be involved where the attacker knows how to get one db but not the others? The hard part is figuring out the first db

> Drawbacks of course include “performance degradation”, “increasingly complex app”.

On the contrary, sharding is a super common performance technique.



Minor nit, symmetric encryption is “impacted” by QC, see Grover’s algorithm. The speed up isn’t as fast, though.


it is also trivial to work around by just doubling the key length. But even without that the speed up is slow enough that we will be well within the quantum age before this matters. The article talks about this a bit.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: