[Cryptography] Quillon Graph: A private, post-quantum electronic cash system

Peter Fairbrother peter at tsto.co.uk
Thu Jan 8 13:26:03 EST 2026


On 08/01/2026 04:34, Peter Gutmann via cryptography wrote:
> Peter Fairbrother <peter at tsto.co.uk> writes:
> 
>> Ummm, (ignoring that they can't be decrypted) signatures aren't really
>> subject to HNDL
> 
> Nothing is subject to HNDL.  

While I agree completely with the rest of your post, I have to interject 
a caveat here: HNDL need not solely refer to quantum cryptography, it 
could just as easily refer to a classical break, or an improvement in 
classical computer systems, sometime in the future.


As to my comment about signatures, they are often used to prevent MITM 
attacks, where any possibility of future forging is irrelevant. Also, in 
blockchains, pre-forgability signatures are also still secure as long as 
the blockchain is secure.

So HNDL (or HNFL) of signatures has limited targets, especially in the 
type of constructions under discussion, where protection now against the 
possibility of future quantum attacks is often simply unnecessary.


> Have you noticed how all the claimed quantum
> factorisation records are for just that, factorisation?  It's because it's
> easier to cheat with that.  No-one has ever claimed to have achieved any
> quantum result against (EC)DH, which would be needed for HNDL against TLS,
> SSH, IPsec, OpenVPN, Wireguard, Signal, WhatsApp, Facebook Messenger, ...,
> because it's much harder to cheat with the (EC)DLP than with factorisation.

Yep.

I like 1536-bit DH myself, can't see any classical attacks happening to 
that in the foreseeable future. Or 1536-bit RSA, for that matter. Is 
1536 bit overkill? Yes, except in the most extreme cases - but we don't 
know where those extreme cases will be, so let's do everything in 1536 bits.



Quantum? Shmauntum. When/if I see it coming...

When we first stared using RSA and discrete logs there was no proof that 
they weren't subject to a clever classical attack. Still isn't, but we 
have had some of Schneier's years of analysis by both cryptographers and 
mathematicians on that, and we accept that they are likely difficult 
problems. Likely enough that we rely on that assumption in our cryptography.


For Quantum Cryptography, we don't just rely on factorisation records by 
quantum cryptographers, but also on progress by physicists and 
mathematicians (though the main potential use of quantum computers, the 
one which brings in the funding, is obviously in cryptography).

After quite a few years research it looks like cryptographically useful 
quantum computers may forever be impractical due to noise, errors, and 
the difficulty of keeping a large array coherent. [1]

Can we rely on that assumption? Probably not yet, but we can for sure 
consider it.



Peter Fairbrother


[1] Not to mention the huge numbers of qubits and gates required - the 
entire superposition and coherence has to go through each of the gates 
too, not just be stored in the array of qubits. Ouch.


More information about the cryptography mailing list