
PeaZip
is a free crossplatform archiver and encryption utility that provides
an unified
portable GUI for many Open Source technologies like 7Zip, FreeArc,
PAQ, UPX... free alternative to WinRar, WinZip and
similar
proprietary software.
 Create 7Z, ARC, BZ2, GZ, *PAQ, PEA, QUAD/BALZ, TAR, UPX, WIM, XZ, ZIP
files
 Open and extract ACE, ARJ, CAB, DMG, ISO, LHA,
RAR, UDF, ZIPX files and more, over 180 archive types
supported
Features of PeaZip includes: archives
opener and extractor, batch creation and extraction
of multiple
archives at once, convert files, create
selfextracting archives, strong encryption (AES, Tworfish, Serpent
ciphers) with two factor authentication, encrypted password
manager, secure deletion, find
duplicate files, calculate hash and checksum,
export job definition as script.



Postquantum computing
cryptography analysis


Security of encryption and hashing algorithm rely on computational
unfeasibility of solving some classes of hard mathematical problems in
reasonable time and with finite / cost effective computation resources.
Quantum computing, based on quantum bits (qbits) which can exist in
superpositions of states, provides breakthrough performances in
solving some classes of hard mathematical problems over classic
computing methods, based on binary digital electronic architecture;
the impact of this performance improvement must be carefully evaluated
to assess
security of existing cipher and hash functions in a scenario where
quantum computers will be available.

Under
current understandings, the impact of increasingly more powerful
quantum computers with increasingly larger number of qbits has very
different degrees of impact on feasibility to reduce / break security
of algorithms commonly employed in symmetrickey
or publickey cryptography. 

Quantum
computing and symmetrickey encryption algorithms
To
preserve data secrecy, symmetrickey cryptography rely on a shared
secret element (password / passphrase, keyfile, biometric data, or
combinations of more factors as in twofactor authentication) between
two or more parties.
The need to share this element, needed by receiver for decryption, is
the main
disadvantage of (secret) symmetrickey cryptography solutions over
publickey cryptography solutions.
PeaZip currently supports only symmetickey
encryption mechanisms, using password / passphrase and optionally
twofactor authentication (password / passphrase + key file), which
under current understandings are quite
secure against attacks by
arbitrarily sized quantum computers.
Grover's quantum algorithm is the bestpossible known attack for most
of current generation symmetric encryption algorithms (and hash
functions), providing  for NPcomplete problems  a quadratic speedup
over a classic computing based bruteforce search.

Consequently,
as a general rule, doubling the size of a symmetric key
can
effectively make up for the increase of efficiency of Grover's
algorithm over classic bruteforcing, and defeat the purpose of
these attacks. 

In example, under those premises
AES 256 bit could be considered equivalent in security (when
arbitrarily large quantum computers are available, using Grover
algorithm over the 256 bit key space) to AES 128 bit (for
classic computers, using classic computing bruteforce over the 128 bit
key space).
Same holds true for other symmetric key ciphers like DES, Blowfish,
Twofish, and Serpent.
While a quadratic speedup (providing a sufficiently powerful quantum
computer is available) is an huge performance improvement, it is
nowhere near a complete breakthrough as polynomial time solution
provided by Shor's algorithm is for publickey encryption systems, so
postquantum symmetric
cryptography is thought to not need to differ significantly from the
current generation.
Learn more: Grover's
algorithm
Quantum
computing and publickey encryption algorithms
Publickey
encryption systems are currently extremely popular, as they
simplify key exchange task: anyone can encrypt a message using a public
key released by a receiver, but only receiver's private key can decrypt
messages protected by its public key.
Unfortunately, most ones of currently popular publickey algorithms are
susceptible of being efficiently broken by a large enough quantum
computer.

Shor's quantum algorithm runs in
polynomial time to solve hard
mathematical problems used in most common publickey encryption
(integer
factorization problem, discrete logarithm problem, ellipticcurve
discrete logarithm problem), rather than in exponential or
subexponential time as the best, most efficient classic algorithms. 

Experimenting publickey algorithms relying on problems not efficiently
simplified by Shor's algorithm or other quantum algorithms, being both
reasonably safe under classic computing and quantum computing based
attacks, is currently an active research topic in cryptography.
PeaZip currently does not
support publickey encryption methods, only
symmetric (secret) key encryption  keys (passwords, keyfiles) needs
to be privately, securely shared with receiver for decryption to take
place.
Learn more: Shor's
algorithm
.

Please note quantum
cryptography is a
separate topic, studying how to
apply quantum phenomena to cryptography in order to achieve
secrecy and detect
eavesdropping, rather than analyzing how
quantum computers
characteristics affects safety (in terms of computational
feasibility
of attacks or bruteforcing) of encryption / hashing algorithms  the
topic discussed in this page and properly named postquantum
cryptography 
Read more about symmetickey encryption algorithms supported by PeaZip:
Rijndael/AES
(implemented as AES128 and AES256 in 7Z, ARC, PEA, and ZIP standards),
and Twofish and Serpent ciphers
(implemented for ARC and PEA standards).
Read more about cryptographically
secure hash function

FAQ
> Security > Postquantum computing
cryptanalysis
Topics and search suggestions about effects of quantum computing on
PeaZip cryptography, security of AES, Twofish, Serpent algorithms,
impact of quantumbased attacks to try to break symmetrickey and
publickey encryption algorithms:
breaking
symmetickey encryption with quantum
computing,
break NPcomplete problems,
quadratic improvement,
impact of quantum computing,
quantum encryption attacks,
Grover's algorithm attack,
how encryption software works
breaking cryptography,
what is quantum cryptography,

breaking
publickey encryption with quantum
computing,
polynomial time,
Shor's algorithm attack,
postquantum cryptanalysis,
break cryptographic software,
attacking cryptography,
impact of quantum computing attacks on encryption,
how quantum cryptography works, 
quantum
computing,
aes256 algorithm,
quantum encryption,
exponential time solution,
brute forcing,
attack file encryption,
break encryption algorithm,
impact of quantum computers on cryptography,
classic cryptography,

NPhard
problem,
breaking encryption with quantum computers,
decrypt with quantum machine,
encryption security,
attack encryption algorithm,
break encryption with quantum machines,
quantum cryptanalysis,
classic vs quantum encryption


