It is it that makes it possible to generate encryption keys for symmetric cryptography.
Transmission, encryption of information is carried out (in most cases) by symmetric cryptographic systems. Because they are much more reliable, less for a key, less load on computing power and the like. But the main thing is reliability.
But in this reliable system, there is an unreliable element, the most important element, an asymmetric system.
Everyone calmed down. No problems. Everything is reliable. But why then the specialized organizations responsible for the “reliability of cryptography” are looking for something, obviously, they are not happy with something.
Why do recognized authorities of cryptographic science give such ambiguous definitions as “conditionally reliable cryptography”.
It is interesting to talk about the known facts of the rejection of some asymmetric systems and the intensified search for new ones.
Mathematicians know that all modern asymmetric cryptography is based on unproven mathematical statements. Simply put, from a scientific point of view, only on hypotheses. On unsubstantiated assumptions. It’s good that we know which ones.
And cryptography on elliptic curves, which is part of blockchain technology (digital signature), has overgrown with obscure facts. On the one hand, we recommend it for domestic use, on the other hand, it is forbidden to use it in serious matters.
There is an opinion of cryptographers that any system with a public and private key will be hacked sooner or later, and then all your secrets will become known. You save them now (they recommend cryptography on elliptic curves!), And then they will open everything. Well, not a fact.
This is just a danger. And it’s not about the progress of quantum computing and (the main nuisance) the provision of these services to anyone, for money, over the network.
But it’s not that. Brute-force attack is the fate of the monkey. We are all a little monkeys, we are all afraid of a quantum computer and a complete search. This is not the worst, the keys can be increased and generally go into even larger numerical fields.
But the main danger is cryptanalysis. He is developing.
The life of a cryptanalyst is like that of a secret agent. Even his family does not know about his real job.
I wonder why such a conspiracy.
The author is committed to the idea that if such “researchers” of asymmetric systems find something, then they will never tell us about it. Or didn’t they already say?
I would like to talk about this and much more in this topic directly relating to our security.