Author

Topic: [XMR] Monero - A secure, private, untraceable cryptocurrency - page 767. (Read 4671575 times)

legendary
Activity: 3836
Merit: 4969
Doomed to see the future and unable to prevent it

So really not to worrisome. Quantum is the real danger.


Quantum is no danger.

Quote
Is the encryption used by VeraCrypt vulnerable to Quantum attacks?

VeraCrypt uses block ciphers (AES, Serpent, Twofish) for its encryption. Quantum attacks against these block ciphers are just a faster brute-force since the best know attack against these algorithms is exhaustive search (related keys attacks are irrelevant to our case because all keys are random and independent from each other).
Since VeraCrypt always uses 256-bit random and independent keys, we are assured of a 128-bit security
level against quantum algorithms which makes VeraCrypt encryption immune to such attacks.

I think the algorithms used in Monero are even stronger than in VeraCrypt.

Quantum attacks are potentially a danger to Monero. The distinction is that symmetric encryption like AES, etc. are much less vulnerable than signatures. All widely-used signature algorithms including those in Monero and Bitcoin are potentially vulnerable. It will be something that cryptocurrency will need to deal with in time but no one is panicking quite yet.


then its a good thing Monero has a hardfork schedule in place, I assume it could be invoked in emergencies such as an indentified quantum attack is in place and a known remedy can be implemented.

https://en.wikipedia.org/wiki/Post-quantum_cryptography
sr. member
Activity: 350
Merit: 250

Quantum attacks are potentially a danger to Monero. The distinction is that symmetric encryption like AES, etc. are much less vulnerable than signatures. All widely-used signature algorithms including those in Monero and Bitcoin are potentially vulnerable. It will be something that cryptocurrency will need to deal with in time but no one is panicking quite yet.


then its a good thing Monero has a hardfork schedule in place, I assume it could be invoked in emergencies such as an indentified quantum attack is in place and a known remedy can be implemented.
legendary
Activity: 2968
Merit: 1198

So really not to worrisome. Quantum is the real danger.


Quantum is no danger.

Quote
Is the encryption used by VeraCrypt vulnerable to Quantum attacks?

VeraCrypt uses block ciphers (AES, Serpent, Twofish) for its encryption. Quantum attacks against these block ciphers are just a faster brute-force since the best know attack against these algorithms is exhaustive search (related keys attacks are irrelevant to our case because all keys are random and independent from each other).
Since VeraCrypt always uses 256-bit random and independent keys, we are assured of a 128-bit security
level against quantum algorithms which makes VeraCrypt encryption immune to such attacks.

I think the algorithms used in Monero are even stronger than in VeraCrypt.

Quantum attacks are potentially a danger to Monero. The distinction is that symmetric encryption like AES, etc. are much less vulnerable than signatures. All widely-used signature algorithms including those in Monero and Bitcoin are potentially vulnerable. It will be something that cryptocurrency will need to deal with in time but no one is panicking quite yet.
sr. member
Activity: 350
Merit: 250

So really not to worrisome. Quantum is the real danger.


edit: Quantum is no danger.

Quote
Is the encryption used by VeraCrypt vulnerable to Quantum attacks?

VeraCrypt uses block ciphers (AES, Serpent, Twofish) for its encryption. Quantum attacks against these block ciphers are just a faster brute-force since the best know attack against these algorithms is exhaustive search (related keys attacks are irrelevant to our case because all keys are random and independent from each other).
Since VeraCrypt always uses 256-bit random and independent keys, we are assured of a 128-bit security
level against quantum algorithms which makes VeraCrypt encryption immune to such attacks.

I think the algorithms used in Monero are even stronger than in VeraCrypt.
legendary
Activity: 3836
Merit: 4969
Doomed to see the future and unable to prevent it

Does not apply to Monero. We use ECDH not DH. Same principle, but different math.

Within the "recommendations" section of the paper:

Quote
Transition to elliptic curves. Transitioning to elliptic curve Diffie-Hellman (ECDH) key exchange with appropriate parameters avoids all known feasible cryptanalytic attacks.

I tend to drop all crypto related papers in this thread. I think anyone interested in this coin is interested in privacy in general. But thanks for clarifying that.

Also after some research I've come across this.

Quote
For the most common strength of Diffie-Hellman (1024 bits), it would cost a few hundred million dollars to build a machine, based on special purpose hardware, that would be able to crack one Diffie-Hellman prime every year.

So really not to worrisome. Quantum is the real danger.

ADDED:

This is a great read, I had no Idea there are recruited student groups spying on each other on campuses. Sounds eerily familiar, wonder where I remember that happening before? Am I weird that that is the only thing that really bothered me in this narrative?

https://webcache.googleusercontent.com/search?q=cache:J2gV7Dc3zDkJ:www.tcf.org/blog/detail/scholarship-security-and-spillage-on-campus+&cd=1&hl=en&ct=clnk&gl=us
legendary
Activity: 2968
Merit: 1198

Does not apply to Monero. We use ECDH not DH. Same principle, but different math.

Within the "recommendations" section of the paper:

Quote
Transition to elliptic curves. Transitioning to elliptic curve Diffie-Hellman (ECDH) key exchange with appropriate parameters avoids all known feasible cryptanalytic attacks.
legendary
Activity: 3836
Merit: 4969
Doomed to see the future and unable to prevent it
legendary
Activity: 2268
Merit: 1141
Monero 0.9beta Windows 7, RAM 6 GB, free disk: 3 GB/90GB, free CPU:70%, free memory: 1.5GB

> Prepare blocks took: 5342ms

What really happened at "Prepare blocks"? Any idea why it was so slow

If I recall correctly, it prepares a set of blocks (don't know precisely how much), that's why it takes that long. Also, 5s isn't that slow in my opinion :-P After syncing the blockchain RAM usage should also be somewhere around 100 MB or lower. The syncing speed also depends on the kind of hard drive, an SSD will sync way faster than a HDD.
hero member
Activity: 1874
Merit: 840
Keep what's important, and know who's your friend
How many forks can we post until the hardfork?




lets be productive!!

Ughh... all I have is this spork...

legendary
Activity: 1260
Merit: 1008
How many forks can we post until the hardfork?




lets be productive!!
legendary
Activity: 930
Merit: 1010
More exciting news from our pro coder moneromooo!

Quote
Now at 180 hours, with the following since last update:

    more work on the hard fork code (functional changes (mixin/dust recommendations), and speedups on the initial scan)
    a check_tx command (to complement the get_tx_key command)
    blockchain_export can now export the blockchain's block hashes in a format that can be used by NoodleDoodle's fast sync code
    improvements to existing tx/block query RPC to return JSON representations, and fixing print_block
    misc other tweaks and fixes

https://github.com/monero-project/bitmonero/commits/master

https://forum.getmonero.org/9/work-in-progress/334/fund-a-developer-moneromoo-will-work-part-time-on-monero-for-260-hours-over-approx-6-months?page=&noscroll=1#post-4229

Very nice! I hope he'll continue later on for another round of funding
legendary
Activity: 2156
Merit: 1072
Crypto is the separation of Power and State.
More exciting news from our pro coder moneromooo!

Quote
Now at 180 hours, with the following since last update:

    more work on the hard fork code (functional changes (mixin/dust recommendations), and speedups on the initial scan)
    a check_tx command (to complement the get_tx_key command)
    blockchain_export can now export the blockchain's block hashes in a format that can be used by NoodleDoodle's fast sync code
    improvements to existing tx/block query RPC to return JSON representations, and fixing print_block
    misc other tweaks and fixes

https://github.com/monero-project/bitmonero/commits/master

https://forum.getmonero.org/9/work-in-progress/334/fund-a-developer-moneromoo-will-work-part-time-on-monero-for-260-hours-over-approx-6-months?page=&noscroll=1#post-4229
legendary
Activity: 1106
Merit: 1000
Monero 0.9beta Windows 7, RAM 6 GB, free disk: 3 GB/90GB, free CPU:70%, free memory: 1.5GB

> Prepare blocks took: 5342ms

What really happened at "Prepare blocks"? Any idea why it was so slow
legendary
Activity: 1105
Merit: 1000

Great stuff! Monero just gets better and better.


Re block time - if it is changed to 2 minutes, will the block reward be doubled to keep the emission curve the same?

You're correct.

Yes of course, it's not some trick to change the social contract.  Grin
legendary
Activity: 2268
Merit: 1141

Great stuff! Monero just gets better and better.


Re block time - if it is changed to 2 minutes, will the block reward be doubled to keep the emission curve the same?

You're correct.
sr. member
Activity: 450
Merit: 250

Great stuff! Monero just gets better and better.


Re block time - if it is changed to 2 minutes, will the block reward be doubled to keep the emission curve the same?
hero member
Activity: 896
Merit: 1000
Maybe we can set the block time to be 10 min now,then reduce it 1% every certain period (month), until it becomes 30s, which is suitable in the future.
legendary
Activity: 1154
Merit: 1001
Custom board would be better.

Agree! But this one is quite cheap, has a sizable support community, and is readily available.
Just saying, custom boards tend to introduce a whole bunch of other problems (accessibility, hardware issues, availability, price, etc...). Avoiding all those obstacles, then absolutely, a custom board would be awesome!
legendary
Activity: 2702
Merit: 2053
Free spirit
hmmmmmm interesting
Jump to: