@
zaizaizai2333 @
nulIptr @
x86 跟量子计算、量子通信没有关系,并不是通过量子物理进行了加密。
而是一种升级了的传统密码学加密方式,可以一定程度上抵御潜在的/未来的量子计算机对传统加密方式的破解。
机翻:使用 PQ3 ,iMessage 继续依靠经典的加密算法来验证发件人并验证联系人密钥验证帐户密钥,因为这些机制无法与未来的量子计算机追溯攻击。要试图将自己插入 iMessage 对话中,对手需要一台量子计算机,能够在通信之前或进行时破坏其中一个身份验证密钥。换句话说,这些攻击不能在 Harvest Now ,Decrypt Later 场景中执行——它们需要存在能够与被攻击的通信同时执行攻击的量子计算机。我们认为任何此类能力还需要很多年,但随着量子计算机威胁的发展,我们将继续评估是否需要后量子认证来阻止此类攻击。
With PQ3, iMessage continues to rely on classical cryptographic algorithms to authenticate the sender and verify the Contact Key Verification account key, because these mechanisms can’t be attacked retroactively with future quantum computers. To attempt to insert themselves in the middle of an iMessage conversation, an adversary would require a quantum computer capable of breaking one of the authentication keys before or at the time the communication takes place. In other words, these attacks cannot be performed in a Harvest Now, Decrypt Later scenario — they require the existence of a quantum computer capable of performing the attacks contemporaneously with the communication being attacked. We believe any such capability is still many years away, but as the threat of quantum computers evolves, we will continue to assess the need for post-quantum authentication to thwart such attacks.
https://security.apple.com/blog/imessage-pq3/