mstdn.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A general-purpose Mastodon server with a 500 character limit. All languages are welcome.

Administered by:

Server stats:

12K
active users

#postquantumcrypto

0 posts0 participants0 posts today
Fiona :transbian: :autism: 🔜 WHY2025 DECT: 3591<p>The paper I co-authored (“A Critical Analysis of Deployed Use Cases for Quantum Key Distribution and Comparison with Post-Quantum Cryptography”) was accepted for publication by “EPJ Quantum Technology” today. 😊<span><br><br></span><a href="https://eprint.iacr.org/2025/173" rel="nofollow noopener" target="_blank">You can find the preprint here</a><span>, Nick will eventually update it with the final changes.<br><br>In short: We looked into existing use-cases for </span><a href="https://blahaj.zone/tags/QuantumKeyDistribution" rel="nofollow noopener" target="_blank">#QuantumKeyDistribution</a><span> and whether they make any sense and did so as a joint team between people with a QKD-background and cryptographers who started out very critical of QKD. (I’m firmly in the latter camp.)<br><br>My personal summary (though some of my co-authors won’t share it to this extend): </span><a href="https://blahaj.zone/tags/QKD" rel="nofollow noopener" target="_blank">#QKD</a><span> is bullshit and not useful for practical purposes as it stands.<br><br></span><a href="https://blahaj.zone/tags/crypto" rel="nofollow noopener" target="_blank">#crypto</a> <a href="https://blahaj.zone/tags/cryptography" rel="nofollow noopener" target="_blank">#cryptography</a> <a href="https://blahaj.zone/tags/cryptology" rel="nofollow noopener" target="_blank">#cryptology</a> <a href="https://blahaj.zone/tags/postquantumcrypto" rel="nofollow noopener" target="_blank">#postquantumcrypto</a> <a href="https://blahaj.zone/tags/PQC" rel="nofollow noopener" target="_blank">#PQC</a></p>
Cyberagentur<p>SCA4PQC – die <span class="h-card" translate="no"><a href="https://social.bund.de/@Cyberagentur" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Cyberagentur</span></a></span> startet ein Forschungsprogramm zur Entwicklung seitenkanalresistenter Post-Quanten-Kryptographie. Ziel: Schutz vor Quantenangriffen und physischen Seitenkanalangriffen. Fokus: Cloud/Desktops, IoT und Smartcards. Forschung und Wirtschaft sind eingeladen.<br>Mehr Informationen: <a href="https://t1p.de/b52np" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">t1p.de/b52np</span><span class="invisible"></span></a><br><a href="https://social.bund.de/tags/PostQuantum" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PostQuantum</span></a> <a href="https://social.bund.de/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.bund.de/tags/SCA4PQC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SCA4PQC</span></a> <a href="https://social.bund.de/tags/PostQuantumCrypto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PostQuantumCrypto</span></a> <a href="https://social.bund.de/tags/SideChannel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SideChannel</span></a> <a href="https://social.bund.de/tags/ITSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITSecurity</span></a> <a href="https://social.bund.de/tags/OpenScience" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenScience</span></a></p>
Cryspen<p>Are you ready for the post-quantum era?</p><p>Test your PQC readiness now! Our new website, featuring our formally verified libcrux crypto library, makes it easy to see if your browser is future-proof. </p><p>Head over to <a href="https://buff.ly/4ak1LB6" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">buff.ly/4ak1LB6</span><span class="invisible"></span></a> to test your browser and learn more about post-quantum cryptography.</p><p><a href="https://ioc.exchange/tags/postquantumcrypto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>postquantumcrypto</span></a> <a href="https://ioc.exchange/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a> <a href="https://ioc.exchange/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://ioc.exchange/tags/libcrux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>libcrux</span></a> <a href="https://ioc.exchange/tags/mlkem" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mlkem</span></a></p>
xyhhx 🔻 (plz hire me)<p>huh, that's neat. just discovered <span class="h-card" translate="no"><a href="https://ioc.exchange/@cryspen" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>cryspen</span></a></span>'s libcrux: <a href="https://github.com/cryspen/libcrux" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/cryspen/libcrux</span><span class="invisible"></span></a></p><p>i found it while looking for implementations of ml-kem</p><p><a href="https://nso.group/tags/rust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rust</span></a> <a href="https://nso.group/tags/postQuantumCrypto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>postQuantumCrypto</span></a> <a href="https://nso.group/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a> <a href="https://nso.group/tags/pqc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pqc</span></a> <a href="https://nso.group/tags/mlkem" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mlkem</span></a> <a href="https://nso.group/tags/kyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kyber</span></a></p>
Omkhar<p>I am really proud to have been part of the cryptography working group at <span class="h-card" translate="no"><a href="https://bird.makeup/users/fsisac" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>fsisac</span></a></span> and to have contributed to a paper on cryptographic agility and post quantum cryptography.</p><p>More here: <a href="https://www.fsisac.com/newsroom/fsisac-guidance-urges-financial-firms-to-implement-crypto-agility-as-a-key-defense-against-quantum-computing-threats" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">fsisac.com/newsroom/fsisac-gui</span><span class="invisible">dance-urges-financial-firms-to-implement-crypto-agility-as-a-key-defense-against-quantum-computing-threats</span></a></p><p><a href="https://infosec.exchange/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a> <a href="https://infosec.exchange/tags/postquantumcrypto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>postquantumcrypto</span></a> <a href="https://infosec.exchange/tags/cryptographicagility" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptographicagility</span></a></p>
🏳️‍⚧️ Fiona :flag_lesbian:<p>One of the most infuriating things about <a href="https://tech.lgbt/tags/QuantumComputing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>QuantumComputing</span></a> related stuff is that <a href="https://tech.lgbt/tags/QuantumComputers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>QuantumComputers</span></a> being theoretically able to break factoring and DLog (aka: most asymmetric crypto in current use) using Shor’s algorithm is used as a selling point for <a href="https://tech.lgbt/tags/QuantumCryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>QuantumCryptography</span></a> (QC) or <a href="https://tech.lgbt/tags/QuantumKeyDistribution" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>QuantumKeyDistribution</span></a> (<a href="https://tech.lgbt/tags/QKD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>QKD</span></a>).</p><p>The two topics really have nothing to do with each other, the solution for dealing with the broken schemes is to replace them with non-broken ones.</p><p>If we want QKD, there has to be a DIFFERENT motivation for it, that has nothing to do with Shor’s algorithm. </p><p>Somehow we have allowed the presentation to become “after classical crypto choose <a href="https://tech.lgbt/tags/PostQuantumCrypto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PostQuantumCrypto</span></a> (<a href="https://tech.lgbt/tags/PQC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PQC</span></a>) or QKD”, instead of “keep using classical crypto that is secure against known attacks or switch to QKD”.</p><p>In line with that we should also increasingly move to stop talking about PQC, and just talk about secure <a href="https://tech.lgbt/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a>, because that is really all it is.</p><p><a href="https://tech.lgbt/tags/crypto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>crypto</span></a> <a href="https://tech.lgbt/tags/itsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>itsecurity</span></a></p>
Timo Ollech<p>Das <a href="https://social.anoxinon.de/tags/NIST" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NIST</span></a> hat die ersten <a href="https://social.anoxinon.de/tags/PostQuantumCrypto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PostQuantumCrypto</span></a>-Standards veröffentlicht:</p><p><a href="https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">nist.gov/news-events/news/2024</span><span class="invisible">/08/nist-releases-first-3-finalized-post-quantum-encryption-standards</span></a></p>
Stefan Gast<p>I had the pleasure to contribute to the <a href="https://infosec.exchange/tags/USENIX2024" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>USENIX2024</span></a> paper "Divide and Surrender", recovering the full secret key from the reference implementation of the HQC Key Encapsulation Mechanism, exploiting a timing side channel arising from non-constant-time modulo operations.<br>Thanks to Robin Leander Schröder and Qian Guo for this opportunity and congratulations to Robin Leander Schröder for getting his first paper accepted at USENIX Security!</p><p>You can read the full paper here: <a href="https://stefangast.eu/papers/divide_and_surrender.pdf" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">stefangast.eu/papers/divide_an</span><span class="invisible">d_surrender.pdf</span></a></p><p><a href="https://infosec.exchange/tags/divideandsurrender" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>divideandsurrender</span></a> <a href="https://infosec.exchange/tags/hqc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hqc</span></a> <a href="https://infosec.exchange/tags/sidechannel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sidechannel</span></a> <a href="https://infosec.exchange/tags/postquantumcrypto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>postquantumcrypto</span></a> <a href="https://infosec.exchange/tags/usenixsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>usenixsecurity</span></a></p>
nemo™ 🇺🇦<p>Exciting progress on Post-Quantum Cryptography in OpenPGP! 🔐🔓 Check out the latest draft: <br><a href="https://www.ietf.org/archive/id/draft-wussler-openpgp-pqc-01.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">ietf.org/archive/id/draft-wuss</span><span class="invisible">ler-openpgp-pqc-01.html</span></a> </p><p><a href="https://mas.to/tags/PostQuantumCrypto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PostQuantumCrypto</span></a> <a href="https://mas.to/tags/FutureProofSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FutureProofSecurity</span></a> 🚀<br><a href="https://mas.to/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a></p>
Omkhar<p>“This novel approach holds promise in providing robust defense against potential adversaries aiming to intercept and decrypt encrypted traffic in the future.”</p><p>I spoke to TechTarget about Apple’s PQ3 protocol; read more here:<br><a href="https://www.techtarget.com/searchsecurity/news/366570658/Apple-unveils-PQ3-post-quantum-encryption-for-iMessage" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">techtarget.com/searchsecurity/</span><span class="invisible">news/366570658/Apple-unveils-PQ3-post-quantum-encryption-for-iMessage</span></a></p><p><a href="https://infosec.exchange/tags/postquantumcrypto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>postquantumcrypto</span></a> <a href="https://infosec.exchange/tags/opensourcesoftware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensourcesoftware</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>