quantum computing aes256
file encryption utility
   DOWNLOAD PEAZIP FREE RAR AND ZIP UTILITY
ONLINE SUPPORT SOFTWARE'S FAQ
LEARN MORE
quantum computing serpent
quantum computing twofish post-quantum cryptanalysis
effects of quantum computers on ciphers symmetric-key encryption public-key encryption
public and private key

file encryption utility

PeaZip is a free cross-platform file archiver and encryption / decryption tool that provides an unified portable GUI for many Open Source technologies like 7-Zip, FreeArc, PAQ, UPX...
Create 7Z, ARC, BZ2, GZ, *PAQ, PEA, QUAD/BALZ, TAR, UPX, WIM, XZ, ZIP files
Open and extract over 180 archive types: ACE, ARJ, CAB, DMG, ISO, LHA, RAR, UDF, ZIPX files and more...
Features of PeaZip includes extract, create and convert multiple archives at once, create self-extracting archives, split/join files, strong encryption with two factor authentication, encrypted password manager, secure deletion, find duplicate files, calculate hashes, export job definition as script.

aes encryption software

grover algorithm on aes
FAQ / DATA SECURITY > POST-QUANTUM CRYPTANALYSIS OF PEAZIP
shor algorithm

Post-quantum computing cryptography analysis



POST-QUANTUM CRYPTANALYSIS OF PEAZIP ENCRYPTION METHODS

effects of quantum computing on encryption



Security of encryption and hashing algorithm rely on computational unfeasibility of solving some classes of hard mathematical problems in reasonable time and with finite / cost effective computation resources.
Quantum computing, based on quantum bits (qbits) which can exist in superpositions of states, provides breakthrough performances in solving some classes of hard mathematical problems over classic computing methods, based on binary digital electronic architecture; the impact of this performance improvement must be carefully evaluated to assess security of existing cipher and hash functions in a scenario where quantum computers will be available.
Under current understandings, the impact of increasingly more powerful quantum computers with increasingly larger number of qbits has very different degrees of impact on feasibility to reduce / break security of algorithms commonly employed in symmetric-key or public-key cryptography.


Quantum computing and symmetric-key encryption algorithms


To preserve data secrecy, symmetric-key cryptography rely on a shared secret element (password / passphrase, keyfile, biometric data, or combinations of more factors as in two-factor authentication) between two or more parties.
The need to share this element, needed by receiver for decryption, is the main disadvantage of (secret) symmetric-key cryptography solutions over public-key cryptography solutions.
PeaZip currently supports only symmetic-key encryption mechanisms, using password / passphrase and optionally two-factor authentication (password / passphrase + key file), which under current understandings are quite secure against attacks by arbitrarily sized quantum computers.
Grover's quantum algorithm is the best-possible known attack for most of current generation symmetric encryption algorithms (and hash functions), providing - for NP-complete problems - a quadratic speed-up over a classic computing based brute-force search.
Consequently, as a general rule, doubling the size of a symmetric key can effectively make up for the increase of efficiency of Grover's algorithm over classic brute-forcing, and block these attacks.
In example, under those premises AES 256 bit could be considered equivalent in security (when arbitrarily large quantum computers are available, using Grover algorithm over the 256 bit key space) to AES 128 bit (for classic computers, using classic computing brute-force over the 128 bit key space).
While a quadratic speed-up (providing a sufficiently powerful quantum computer is available) is an huge performance improvement, it is nowhere near a complete breakthrough as polynomial time solution provided by Shor's algorithm is for public-key encryption systems, so post-quantum symmetric cryptography is thought to not need to differ significantly from the current generation.
Learn more: Grover's algorithmbreaking symmetric key encryption


Quantum computing and public-key encryption algorithms


Public-key encryption systems are currently extremely popular, as they simplify key exchange task: anyone can encrypt a message using a public key released by a receiver, but only receiver's private key can decrypt messages protected by its public key.
Unfortunately, most ones of currently popular public-key algorithms are susceptible of being efficiently broken by a large enough quantum computer.
Shor's quantum algorithm runs in polynomial time to solve hard mathematical problems used in most common public-key encryption (integer factorization problem, discrete logarithm problem, elliptic-curve discrete logarithm problem), rather than in exponential or sub-exponential time as the best, most efficient classic algorithms.
Experimenting public-key algorithms relying on problems not efficiently simplified by Shor's algorithm or other quantum algorithms, being both reasonably safe under classic computing and quantum computing -based attacks, is currently an active research topic in cryptography.
PeaZip currently does not support public-key encryption methods, only symmetric (secret) -key encryption - keys (passwords, keyfiles) needs to be privately, securely shared with receiver for decryption to take place.
Learn more: Shor's algorithmbreaking public key encryption .

quantum cryptography

Please note quantum cryptographyquantum cryptography is a separate topic, studying how to apply quantum phenomena to cryptography in order to achieve secrecy and detect eavesdropping, rather than analyzing how quantum computers characteristics affects safety (in terms of computational feasibility of attacks or brute-forcing) of encryption / hashing algorithms - the topic discussed in this page and properly named post-quantum cryptographypost-quantum cryptography

impact of quantum computers on symmetric-key encryption



Read more about symmetic-key encryption algorithms supported by PeaZip: Rijndael/AESaes256 (implemented as AES128 and AES256 in 7Z, ARC, PEA, and ZIP standards), and Twofishtwofish 256 bit and SerpentSerpent 256 bit ciphers (implemented for ARC and PEA standards).
Read more about cryptographically secure hash functioncryptographically secure hash algorithms


RELATED & SIMILAR PAGES
CHANGE ENCRYPTION PASSWORD

ENCRYPT 7Z ARC ZIP FILES

FILE PROTECTED BY MULTIPLE PASSWORDS
 
OPEN ENCRYPTED ARCHIVES
PEA FORMAT AUTHENTICATED ENCRYPTION

PROTECT FILES FROM UNAUTHORIZED ACCESS
Tag Cloud
post-quantum cryptography quantum computing quantum cryptanalysis AES256 Serpent cipher Twofish cipher what is encryption checksum hash tool convert encrypted files download file encryption utility extract ACE archives extract CAB file extract encrypted file extract RAR TAR ZIP files file encryption software how to encrypt files how to split files open 7Z archives open RAR files open ZIP files portable encryption software RAR file format secure delete TAR file extraction what is ZIP format ZIP files utility ZIPX file extraction





qbit
DOWNLOADS
breaking encryption with quantum computiung
All PeaZip downloads
PeaZip for Windows 32 bit
PeaZip for Windows 64 bit
PeaZip Portable
PeaZip Linux/BSD
quantum computiung impact on aes
SUPPORT
quantum computiung impact on public-key encryption
Online help
Frequently Asked Questions
More information





quantum computiung impact on symmetric-key encryption
DONATE
quantum cryptography
Support PeaZip project, or donate to FAO, UNICEF and UNESCO from donation page

© PeaZip srl: TOS, Privacy
OSDN software repository
free rar downloads
SourceForge software repository
free rar
Releases Feed zipx files
PeaZip Wiki rar files
Developer email download rar software
Search knowledge-base
rar archiver