What ssh-keygen algorithm, or solutions, may be short-term future-proof effective for quantum computing attacks?

This thread is for how ssh-keygen relates to quantum computing attacks.
What are the strengths and weaknesses of the ssh-keygen algorithms as related to quantum computing, which from my understanding will be able to potentially crack them … Continue reading What ssh-keygen algorithm, or solutions, may be short-term future-proof effective for quantum computing attacks?

some security laws [on hold]

  • Moore’s law

    hardware growth

  • Gates’ law

    software growth (Software grows to use all processing power)

  • Neumann’s law

    vulnerability (Number of vulnerabilities is proportional to the square of software size)

  • Metcalfe’s law

    network value (proportional to the square to number of Network users)

  • Evan’s Law

    Security Risk (product of vulnerability and network value)

Can I get the explanation about the above laws and how are they related to calculate the increasing of the security risk. And the reason why in reality the increasing is not so fast in contrast to the result of calculation.

Continue reading some security laws [on hold]