A Serious Concern About Post-Quantum Cryptography and Strength Targets

I have been writing a number of articles about the state of the NIST post-quantum cryptography competition, with short summaries on the projects and what they are all about. What I haven’t talked about is the structure of the competition, and my concerns about the inclusion of relative “strength targets” for the new algorithms to … Continue reading “A Serious Concern About Post-Quantum Cryptography and Strength Targets”

0

NIST Round 2 and Post-Quantum Cryptography – The New Asymmetric Algorithms (part 3)

In the first article of this series, I wrote about the NIST Post-Quantum Competition and which ciphers advanced to the second round, meaning that they passed through basic scrutiny and were advanced based on having strong fundamental design and good documentation. Round 3 will see significant narrowing again, based on the relative strength of the … Continue reading “NIST Round 2 and Post-Quantum Cryptography – The New Asymmetric Algorithms (part 3)”

0

NIST Round 2 and Post-Quantum Cryptography – The New Asymmetric Algorithms (part 2)

In the previous article, I wrote about the NIST Post-Quantum Competition and which ciphers advanced to the second round, meaning that they passed through basic scrutiny and were advanced based on having strong fundamental design and good documentation. Round 3 will see significant narrowing again, based on the relative strength of the algorithms against one … Continue reading “NIST Round 2 and Post-Quantum Cryptography – The New Asymmetric Algorithms (part 2)”

0

NIST Round 2 and Post-Quantum Cryptography (part 1)

The National Institute for Standards and Technology (NIST) has announced the round 2 candidates for post-quantum cryptography. What is post quantum cryptography? Post Quantum Cryptography is encryption that can resist cracking by quantum computers. There has been a slow advance in the development of quantum computers, which are particularly good at the math that protects … Continue reading “NIST Round 2 and Post-Quantum Cryptography (part 1)”

0