Skip to content

Commit 7f2fa7a

Browse files
committed
explain DNS cache poisoning
1 parent 0d6e44b commit 7f2fa7a

File tree

3 files changed

+200
-53
lines changed

3 files changed

+200
-53
lines changed

crypto.rst

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -402,9 +402,9 @@ slower than secret-key ciphers. Consequently, secret-key ciphers are
402402
used for the vast majority of encryption, while public-key ciphers are
403403
reserved for use in authentication and session key establishment.
404404

405-
.. admonition:: Post-Quantum Cryptography
405+
.. sidebar:: Post-Quantum Cryptography
406406

407-
As we have seen, a lot of cryptography depends on the difficulty of
407+
*As we have seen, a lot of cryptography depends on the difficulty of
408408
solving certain mathematical problems, such as factoring prime
409409
numbers or computing discrete logarithms. When the efforts of
410410
mathematicians over decades to solve a problem have proven
@@ -417,9 +417,9 @@ reserved for use in authentication and session key establishment.
417417
progress is made towards ever larger quantum computers, measured by
418418
the number of quantum bits (qubits), there is a real
419419
risk that many current cryptographic algorithms will at some point
420-
become breakable.
420+
become breakable.*
421421

422-
There is plenty of debate about whether quantum computing will ever
422+
*There is plenty of debate about whether quantum computing will ever
423423
progress to the point that the risks to conventional cryptography
424424
materialize. Current quantum computers are much too small and lack
425425
the error-correcting capabilities necessary to solve the
@@ -434,23 +434,23 @@ reserved for use in authentication and session key establishment.
434434
considering the possibility that some data that is well protected
435435
today could be stored for a decade or two and then decrypted by a
436436
future quantum computer, so even data produced today could be at
437-
risk.
437+
risk.*
438438

439-
The response to this uncertain threat has been to develop suites of
439+
*The response to this uncertain threat has been to develop suites of
440440
cryptographic algorithms for which no quantum solution is
441441
known. This is the field of "Post-Quantum Cryptography". Note the
442442
use of the phrase "no solution is known". It is hard to prove that
443443
no algorithm exists—once again we are in the territory of trying to
444444
prove a negative. But NIST is running a process to evaluate and
445445
standardize a set of quantum-resistant algorithms, and there is
446446
plenty of focus on the candidate algorithms to establish their
447-
suitability over the long term.
447+
suitability over the long term.*
448448

449-
There is a general, if not universal, sense that at some point
449+
*There is a general, if not universal, sense that at some point
450450
post-quantum cryptographic algorithms will be needed. While the
451451
timeframe is uncertain and the exact algorithms to be used may
452452
change, the requirement for *crypto-agility*—the ability to swap
453-
out one set of algorithms for another—is now well established.
453+
out one set of algorithms for another—is now well established.*
454454

455455
3.4 Message Authentication
456456
---------------------------------

figures/SecurityFigs.odp

43.4 KB
Binary file not shown.

0 commit comments

Comments
 (0)