Why Quantum Cryptanalysis is Bollocks [pdf]
Tone and Scope of the Critique
- Some readers see the slides as sharp but largely numerical and data-driven; others see them as emotionally charged, cynical, or “wishcasting” against QC.
- Several argue that the talk conflates justified skepticism of hype/grift with dismissing the underlying science and theoretical value of quantum cryptanalysis.
Progress in Quantum Computing
- One camp: QC has had ~40 years of claims and very little externally visible impact; effective qubit counts and ability to factor non‑toy integers remain poor, suggesting stalled or overpromised progress.
- Counterpoint: progress shouldn’t be judged by “largest integer factored” but by error rates, decoherence, and gate fidelity; error-correction experiments have seen dramatic improvements over the past decade.
- Disagreement over timescales: some think we’re 1–2 orders of magnitude from “cryptographically relevant” error rates and thus decades away; others warn nonlinear or EUV-like breakthroughs could compress timelines.
Hype, Grifters, and Opportunity Cost
- Multiple comments stress real opportunity cost: money, talent, and PhDs going into speculative QC while more impactful areas are neglected.
- Others argue that the core research questions (quantum‑superior attacks, new hardness assumptions) are inherently valuable regardless of engineering outcomes.
PQC Standardization and Deployment
- Several note that, regardless of QC feasibility, major governments and standards bodies have already committed to PQC and are in “full transition mode.”
- Observed “sudden” urgency around 2022–2023 is linked partly to the NIST competition converging on specific algorithms.
- Concern: PQC schemes are young, complex, and may hide unforeseen weaknesses; historical failures (e.g., broken PQC candidates) are cited as warnings.
- Debate over hybrid vs PQC‑only: open protocols and big vendors lean hybrid; some government roadmaps appear to favor pure PQC, which critics call risky.
Threat Models: QC vs Everyday Attacks
- Many agree with the presentation’s emphasis that OWASP-style bugs vastly dominate real-world compromises; cryptographic breaks are rare by comparison.
- Others push back that “small leaks” (timing, nonce, microarchitectural issues) can and do matter, and are heavily mitigated precisely because they’re serious.
- For state-level SIGINT, passive capture and “store now, decrypt later” are considered a distinct threat class where long‑term cryptographic strength—including against potential QC—can matter over decades.