Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: ECC and SHA 256 vs quantum computing
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Hi all

new here.. I want to know more about quantum computing breaking ECC and SHA 256. Can you point me to some useful links/discussion about that?

thank you!
Hashing algorithms are usually not vulnerable to quantum computer attacks. Attacks against cryptographic algorithms mostly rely on being able to solve a very small but important set of mathematical problems used in most public key systems. There's some nice overview on wikipedia.

https://en.wikipedia.org/wiki/Elliptic_c...ng_attacks
https://en.wikipedia.org/wiki/Post-quantum_cryptography
(09-10-2017, 06:08 PM)undeath Wrote: [ -> ]Hashing algorithms are usually not vulnerable to quantum computer attacks. Attacks against cryptographic algorithms mostly rely on being able to solve a very small but important set of mathematical problems used in most public key systems. There's some nice overview on wikipedia.

https://en.wikipedia.org/wiki/Elliptic_c...ng_attacks
https://en.wikipedia.org/wiki/Post-quantum_cryptography

thanks, i am aware of the post quantum wiki page. I was asking about qubit units and whether they were able to break ECC, SHA256 and SHA512? Someone that is into cryptography told me SHA512 was cracked in several ms
I can't find any source for that
According to this paper it would require 1000 qubits to break ECC-160.

As I said in my previous post, hashing algorithms are usually not vulnerable to quantum computer attacks, which includes the SHA-2 familiy. I'm not aware of any such attacks for SHA-2. The fact that your "someone that is into cryptography" was even able to come up with some timing makes the claim even more ridiculous because we definitely do not have any kind of computation device available that can break the SHA-2 algorithm. That would be big news.
Thanks for all the information! As stupid as it may sound, I haven't read those Wikipedia articles yet. Gonna catch up! Smile