[Cryptography] It's probably kleptography.
Ray Dillinger
bear at sonic.net
Tue Mar 31 18:48:36 EDT 2026
In what may be related news, Bennett and Brassard have been awarded this
year's Turing prize for their discovery of Quantum Cryptography.
Quantum Cryptography is more viable than Quantum Cryptanalysis, but
that's not really saying much. I don't want to denigrate their
theoretical work. It is real and apparently true.
However, I have an additional theory, which is that the decision to give
them that award was likely influenced by people who have no interest in
protecting people from Quantum Cryptanalysis.
We've been hearing a whole lot about Quantum Cryptography lately. And
considering the state of play in terms of actual quantum computers, it's
hard to justify how much fear, uncertainty, and doubt there is.
I am a suspicious, half-paranoid guy, but hear me out:
This standard (SKEIN, KYBER, KEM) is promulgated by NIST, the same
people who brought us the Dual-EC DRBG standard. So... they aren't above
suspicion of facilitating a Kleptographic Standards attack.
The committee awarding the Turing Prize seem likely to have consulted
various people associated with three-letter agencies in assessing the
importance of Bennett and Brassard's contribution. Those agencies, in
turn, seem like the agencies most likely to carry out a Kleptographic
Standards attack, again given the prior precedent.
Meanwhile, there are fiddly delicate machines demonstrating basic
principles that vaguely indicate a possibility that one day actual
quantum computers could be constructed. But they are in practice
useless. Further, in the estimation of a fair number of people they are
not all that promising. There is good reason to think the methodology
may never scale to the point of finding factors whose values were not
already known and used to set up the factoring program.
The mismatch between perceived threat and demonstrated threat is so
spectacular that it looks like a FUD campaign. Which is a necessary step
in a Kleptographic Standards attack. Kleptographic Standards are
promulgated addressing fear of some threat, so that the fear can be used
as a lever to get people to do something stupid.
That brings my suspicious mind back to the likelihood that the
attackers, affiliated with the agencies consulted about the value of
Bennett & Brassard's work, may have deliberately influenced the Turing
Prize committee to promote the awareness and perceived legitimacy of a
Quantum Cryptanalysis threat. Even though the threat is, a far as we
can tell, entirely bogus.
And the algorithms (SKEIN, KYBER, KEM) are too new for a standard,
haven't been studied enough to trust on the same level of evidence as
existing non-quantum algorithms, and NIST is advocating their use alone,
specifically telling people to avoid usage layered with established and
trusted algorithms. As people here have noted, that seems like bad
advice. That seems a whole lot like trying to get those established and
trusted algorithms out of the way. And getting them out of the way
would be the most likely motivator for making a Kleptographic Standards
attack.
So.... I know I'm being a bit paranoiac and may be inferring too much
cause and too many connections based on not very much evidence. So I
thought about it for a moment. I decided I needed to know more about
these new algorithms. Maybe they have been studied enough (while I
wasn't looking) for a standard, and I face the possibility that I'm just
shadow-boxing. Or maybe they have been studied, the way Bernstein
studied Dual-EC DRBG, and found lacking, and my paranoia would seem more
justified. So let's check the literature!
And I found these:
https://eprint.iacr.org/2022/1681.pdf
https://link.springer.com/chapter/10.1007/978-3-031-82852-2_11
Oh look, algorithms in this class may have backdoors structurally built
into them! Isn't that special.
God damn it. I hate it every time I'm a paranoid suspicious bastard
assuming the worst of people and turn out to be right again.
These papers are not reassuring. These remind me of Bernstein's paper
when the Dual-EC DRBG was being standardized. Sure, that paper caused
some suspicion, but only for suspicious, half-paranoid guys. We didn't
know for sure until the Snowden leaks blew the lid off it, but those
suspicious, half-paranoid guys were right.
So... to make a long story short:
Quantum Cryptography, while intellectually neat, does not present a
practical attack that we need protection against at this time.
Kleptographic Standards on the other hand are very much a practical
attack that we need to protect against at this time.
When a standards body tells you that you should cast aside well-studied
cryptographic algorithms which have earned their trust through dozens of
years of examination, testing, and motivated attackers, for the sake of
protection against Quantum Crypto? The attack you should be protecting
against isn’t Quantum Crypto.
Bear
Who is a suspicious, half-paranoid bastard, apparently.
More information about the cryptography
mailing list