|
You are here |
blog.trailofbits.com | ||
| | | | |
securityinaction.wordpress.com
|
|
| | | | | ==================== TL; DR With the recent publication of post quantum cryptography (PQC) algorithms from NIST, organisations of all size should begin the transition to PQC. Please refer to this PQC readiness publication from CISA as a starting point. ==================== To assist with the transition to PQC, I have provided advice below for government agencies and... | |
| | | | |
dadrian.io
|
|
| | | | | Large-scale quantum computers are capable of breaking all of the common forms of asymmetric cryptography used on the Internet today. Luckily, they don't exist yet. The Internet-wide transition to post-quantum cryptography began in 2022 when NIST announced their final candidates for key exchange and signatures in the NIST PQC competition. There is plenty written about the various algorithms and standardization processes that are underway. The conventional wisdom is that it will take a long time to transit... | |
| | | | |
hannes.robur.coop
|
|
| | | | | [AI summary] This article discusses updates to cryptographic libraries in OCaml and MirageOS, focusing on elliptic curve cryptography support through the fiat-crypto project, including new features like ECDSA/EdDSA, TLS 1.3 compatibility, and improved X.509 certificate handling. | |
| | | | |
www.schneier.com
|
|
| | | The U.S. National Institute of Standards and Technology is having a competition for a new cryptographic hash function. This matters. The phrase "one-way hash function" might sound arcane and geeky, but hash functions are the workhorses of modern cryptography. They provide web security in SSL. They help with key management in e-mail and voice encryption: PGP, Skype, all the others. They help make it harder to guess passwords. They're used in virtual private networks, help provide DNS security and ensure that your automatic software updates are legitimate. They provide all sorts of security functions in your operating system. Every time you do something with security on the internet, a hash function is involved somewhere... | ||