Reply to post: @Milton Re: @ Mark 65 Possible deadly flaw - compromised software

Let's harden Internet crypto so quantum computers can't crack it

Ian Michael Gumby
Boffin

@Milton Re: @ Mark 65 Possible deadly flaw - compromised software

Using your army training.

The concept is to generate a single use pub/pri key as the initial wrapper for the counter party to send you a random secret.

Then you can further use the shared secret...

Simple concept.

The issue being raised was that the random secret wasn't so random.

But if you have a random noise file, changing the offset in to the file will increase the randomness instead of sharing the same file each time. If you were to then change the length of the seed and hash it using a strong algo (e.g. SHA-2) you will have a fairly unique number of a fixed length that is well ... more random and harder to find over time.

Note: If I use the same secret over and over and only generate a new pub/pri key, then its possible to break it w a powerful enough quantum computer. If the secret is not the same... then you will have a bit harder time, now wouldn't you?

Does that make sense?

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon