
May 30, 2018, 01:48:02 AM Last edit: May 30, 2018, 04:04:35 AM by jvanname 

In the future, we will not want to use SHA2, SHA3, the AES or any other current symmetric cryptosystem. For the nottoodistant future, we will need to produce new symmetric cryptosystems.
In the future, we will have reversible computers and reversible computers will be much more energy efficient than conventional computers. Reversible computers however can only run reversible algorithms. Today's symmetric cryptosystems are designed to be computed using conventional computers and not reversible computers, so we will need new symmetric cryptosystems which are designed to be run on reversible computers (I have checked, and currently there is no symmetric cryptosystem which is designed for reversible computers even though such a cryptosystem should be easy to create). It turns out that symmetric cryptography will be the first use of energy efficient reversible computation. After all, reversible computation improves the efficiency of symmetric cryptography and also the security since reversible computers are not as vulnerable to sidechannel attacks.
This means that first, mathematicians and cryptographers need to research and develop new symmetric cryptosystems which are compatible with reversible computation. Afterwards, the cryptanalysts need to review these symmetric cryptosystems for security weaknesses. After such cryptosystems are proposed and reviewed, an organization needs to select and standardize one of these cryptosystems in the same way that the DES,AES,SHA2,SHA3 algorithms were standardized.
I propose that one should use a cryptocurrency to help evaluate and standardize these symmetric cryptosystems for several reasons.
1. The token used for evaluating these symmetric cryptosystems can be designed in such a way to reward the development of a secure and efficient symmetric cryptosystem as well as a solid cryptanalysis against these cryptosystems.
2. The token gives one an objective measurement of the security, efficiency, and possibly other aspects of these cryptosystems.
3. The token can be used to directly fund the research and development of these cryptosystems.
Of course, using a token to standardization of symmetric cryptosystems does have its limitations and difficulties. In order for a token to take into consideration theoretical attacks against these symmetric cryptosystems, the token must have access to an automated theorem verification system. Furthermore, a token cannot take into consideration a cryptographer's 'gut feeling' about the security of a symmetric cryptosystem or one's educated guess about its security based upon observations about similar cryptosystems.
In the past, governmental organizations have standardized the use of cryptosystems, but with the advent of cryptocurrencies, it seems like the next wave of symmetric cryptosystems would be standardized by private organizations.
