Secure Domain Name System (DNS) Deployment 2026 Guide [pdf] (nvlpubs.nist.gov)

by XzetaU8 11 comments 108 points
Read article View on HN

11 comments

[−] bob1029 53d ago

> ECC algorithms with smaller key sizes would be more vulnerable to a quantum attack, as it would require a currently theoretical quantum computer with fewer qubits than would be required for an RSA key with the same cryptographic strength [25].

This is what keeps me skeptical about ECC. RSA is really chunky, and maybe that's a fundamental advantage from an information theory perspective. Compromising on the crypto scheme because we can't fit inside UDP seems like a cursed path.

[25]: https://arxiv.org/abs/1706.06752

[−] phicoh 53d ago
If we are looking at the RSA factoring challenge (https://en.wikipedia.org/wiki/RSA_Factoring_Challenge) then 768 bits is done. Breaking RSA 1024 is assumed to be possible but has not been demonstrated in public.

So maybe quantum computers should first complete some of these RSA challenges with less compute resources than done classically before considering any claims about qubits needs as practical.

All of this in the context of DNSSEC or other system using signatures. For encryption the story is different.

[−] follie 51d ago
I find it silly to throw huge amounts of resources away worrying about quantum attacks that won't get burned on something as silly as this week's DNS if it happens to be protected at all. If you are making a 30 year root and/or document signing then worry.
[−] tptacek 53d ago
A CRQC makes both RSA and ECDLP practically irrelevant. The qubit thresholds between available ECC and RSA-2048 don't look meaningful. If you're worried about QC, get comfortable with lattices.

Of course, this part of the NIST recommendation doesn't matter, because DNSSEC is moribund. If we want post-quantum record authenticity, we should go back to the drawing board and come up with something that doesn't depend on UDP (and that doesn't carry DNSSEC's 1994-vintage offline-signer compromise and all-or-nothing zone signature compromise).

[−] progbits 53d ago

> 864000 seconds (1 day)

Could use some proofreading.

[−] antonyh 53d ago
I do wish these types of document were published as HTML and not just as PDF.