A Serious Concern About Post-Quantum Cryptography and Strength Targets

I have been writing a number of articles about the state of the NIST post-quantum cryptography competition, with short summaries on the projects and what they are all about. What I haven’t talked about is the structure of the competition, and my concerns about the inclusion of relative “strength targets” for the new algorithms to … Continue reading “A Serious Concern About Post-Quantum Cryptography and Strength Targets”

0

NIST Round 2 and Post-Quantum Cryptography – The New Digital Signature Algorithms

We have been talking about the National Institute of Standards and Technologies’ contest to find the most attractive new algorithms for quantum resistance. (Part 1) (Part 2) (Part 3) In this final part, we talk about the candidates for a new standard Digital Signature Algorithm. (DSA) The core component of a secure digital signature lies … Continue reading “NIST Round 2 and Post-Quantum Cryptography – The New Digital Signature Algorithms”

0

NIST Round 2 and Post-Quantum Cryptography – The New Asymmetric Algorithms (part 3)

In the first article of this series, I wrote about the NIST Post-Quantum Competition and which ciphers advanced to the second round, meaning that they passed through basic scrutiny and were advanced based on having strong fundamental design and good documentation. Round 3 will see significant narrowing again, based on the relative strength of the … Continue reading “NIST Round 2 and Post-Quantum Cryptography – The New Asymmetric Algorithms (part 3)”

0

NIST Round 2 and Post-Quantum Cryptography – The New Asymmetric Algorithms (part 2)

In the previous article, I wrote about the NIST Post-Quantum Competition and which ciphers advanced to the second round, meaning that they passed through basic scrutiny and were advanced based on having strong fundamental design and good documentation. Round 3 will see significant narrowing again, based on the relative strength of the algorithms against one … Continue reading “NIST Round 2 and Post-Quantum Cryptography – The New Asymmetric Algorithms (part 2)”

0

NIST Round 2 and Post-Quantum Cryptography (part 1)

The National Institute for Standards and Technology (NIST) has announced the round 2 candidates for post-quantum cryptography. What is post quantum cryptography? Post Quantum Cryptography is encryption that can resist cracking by quantum computers. There has been a slow advance in the development of quantum computers, which are particularly good at the math that protects … Continue reading “NIST Round 2 and Post-Quantum Cryptography (part 1)”

0

  • Dec 5, 2018
  • Derek Zimmer
  • Governments, News, Open Source, Privacy, Security,

Split Key Cryptography is Back… Again – Why Government Back Doors Don’t Work

Governments in the 5 eyes surveillance alliance have been relentlessly lobbying for the power to force companies to back door their encrypted data. Every year, a new proposal comes through which is a slight revision to the same-old argument. “We need to unrestricted access to X in order to protect Y.” Sometimes it is “because … Continue reading “Split Key Cryptography is Back… Again – Why Government Back Doors Don’t Work”

0