Comment by b112

8 months ago

I'll concede your point re: current status of some encryption. However there are loads that were comprised.

How do you tell which will fall, and which will succeed in 30 years?

All this said, I just think proper mental framing helps. Considering the value of encrypted data, in 30 years, if it is broken.

In many cases... who cares. In others, it could be unpleasant.

> However there are loads that were comprised.

There are a lot of interactive systems that have attacks on their key exchange or authentication. And there are hashes that have collision attacks.

But compromises that let you figure out a key that's no longer in use have not been common for a while. And even md5 can't be reversed.

I agree with you about being wary, but I think encryption itself can be one of the stronger links in the chain, even going out 30 years.

30 years ago we had a good idea. Anything considered good 30 years ago - 3DES- still is. Anything not considered good has turned out not to be. We don't know what the future will hold so it is always possible someone will find a major flaw in AES, but as I write this nobody has indicated they are even close.