home.social

#post-quantum-cryptography — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #post-quantum-cryptography, aggregated by home.social.

fetched live
  1. Weekend Reading from TechAptitude!

    Get to know new Cryptography Standards (FIPS 20-3, FIPS 204, FIPS 205, FIPS 206) developed by NIST to withstand quantum attacks and prevent the so-called “Q-Day”. Q-Day is an estimate of the point in time when quantum computers will be able to reliably break existing RSA-2048 cryptography. techaptitude.substack.com/p/qu #PQC #NIST #Cryptography #Q_Day #PostQuantumCryptography #Quantum #Encryption #CryptographyAlgorithms #TechAptitude

  2. RE: partychickens.net/@mason/11651

    'some governments will require the tools that they use to support post-quantum cryptography in the near future. This means that a lot of companies want post-quantum cryptography, and people will begin to expect it from serious projects'

    #cryptography #publicPolicy #quantumComputing #postQuantumCryptography

  3. Hast anyone Seen #postquantumcryptography life in Action?
    What so you think of IT?
    This company offers secure Quantum Key Distribution by sending Photons over Fiber. *impossible of eavesdropping*.... They say

    Here is the Link to the comapny:
    Quantum Security, Now and Forever. | zerothird
    zerothird.com/

    #security

  4. Vendor PQC marketing sells urgency before discovery. NIST, NCSC, and CISA say the opposite: start with cryptographic inventory, not an algorithm platform. hackernoon.com/post-quantum-cr #postquantumcryptography

  5. Europe Mandates 2030 Deadline for Post-Quantum Cryptography Rollout

    The French National Cybersecurity Agency is urging a proactive approach to post-quantum cryptography, warning that the transition to quantum-resistant algorithms is a long-term effort that must be initiated now. France has set a 2030 deadline for ministries to deploy post-quantum encryption for sensitive systems.

    osintsights.com/europe-mandate

    #PostquantumCryptography #Europe #France #NationalSecurity #EmergingThreats

  6. Any good #encryption people on here that can tell me what I should be looking to do with Yubikey and PGP for post quantum readiness?

    #postquantumcryptography

  7. Well, it’s good that someone is drawing a line in the Crypto sand.

    Google accelerates its readiness timeline to prepare for “Q-day” with post-quantum cryptography (PQC) migration to 2029. Reminder: Q-day = the date when quantum computing becomes operational and is powerful enough to break the digital signatures that secure the Internet, crypto (blockchain + Ethereum), and just about every other Information system in use today.

    The Bitcoin crypto network relies on ECDSA elliptic curve signatures. techaptitude.substack.com/p/ec With an exposed crypto signature public key, a quantum computer could derive the private key. And then, the crypto assets would be freely available to a hacker.

    Android 17 will integrate ML-DSA, an algorithm standardized by the NIST to secure digital signatures. security.googleblog.com/2026/0

    blog.google/innovation-and-ai/ #Crypto #PQC #PostQuantumCryptography #Cryptography #Google #Quantum #QuantumComputing #Q-Day #BlockChain #ECDSA #NIST #ML-DSA #Security #CryptoSecurity #Internet #TechAptitude

  8. #Google is setting a 2029 timeline for migrating to #postquantumcryptography (#PQC) to secure against future #quantumcomputer threats. This includes prioritising #PQCmigration for authentication services and integrating PQC digital signature protection in Android 17. blog.google/innovation-and-ai/ #tech #media #news

  9. PQC migration is a program, not a patch. I just updated my quantum readiness starting list - curated for security people who need actionable info.

    Takes you from threat understanding → prioritization → running a real migration program with owners, milestones, dependencies, and vendor timelines.

    postquantum.com/quantum-readin

    #PQC #PostQuantumCryptography #InfoSec #CryptoAgility #QuantumSecurity

  10. @mhoye it’s always good to err on the side of stronger rather than weaker crypto where feasible as you’re not only defending comms / data against today’s capabilities but also against future capabilities that can be applied against any captured & stored comms / data by an adversary. it’s already common for nation-state intelligence orgs to position themselves in core comms backbones to collect & store as much as they can that goes across the wire, whether encrypted or not

    the usual caveats about threat models still apply, but threat models can change over time & your #ThreatModel in 5-10 years may include people / orgs / countries that you’re not currently worried about – the adage is “the time for good #OpSec^ is before you know you need good OpSec” 🙃

    Aus gov advice (from #ASD⚹) for agencies is to have quantum-resistant #crypto in place by 2030 & they’re updating the Aus Gov Information Security Manual (#ISM) to reflect developments in post-quantum cryptographic algorithms – see the chapter Guidelines for cryptography at cyber.gov.au/business-governme

    they also have a good overview for smaller orgs – Planning for post-quantum #cryptography at cyber.gov.au/business-governme

    #PostQuantumCryptography
     
     
     
    ^ “operational security” – good security & privacy practices designed to keep you more secure

    ⚹ the Australian Signals Directorate

  11. Yesterday, I ran a scan of the available #TLS cipher suites in the #Tor production network:

    32.32% of our relays currently support the x25519/ML-KEM-768 hybrid #PQC key exchange group.

    Relay operators, let's get this number up! 🤩

    Big thanks to the #OpenSSL team for providing the PQC support here and making it available to all of us! 🎉😎

    More information in lists.torproject.org/mailman3/ and the individual relay results are available from ahf.me/tor-tls-pqc/2026-02-26/

    #crypto #postquantumcryptography

  12. If you are still designing and implementing cryptographic protocols that are insecure against attackers with quantum computers, what is wrong with you?

    Especially for companies there really is no excuse anymore and anyone who still uses pre-quantum crypto by the start of the next year should be fined. I’m sick and tired of the claims that it’s difficult, if you are not even working on it. (Which is evident from the lack of jobs in the field!)

    Maybe I should just start looking at projects, at least of companies and start filing CVEs…
    🤔

    #ITsec #postquantumcryptography #PQC

  13. It is a matter of time before Quantum Computing gains the ability to crack today’s core public key encryption methods.

    Our latest post on TechAptitude outlines the efforts by NIST to generate new cryptography standards to help withstand future quantum powered cyber attacks. Check it out!

    techaptitude.substack.com/p/qu #Cryptography #Quantum #QuantumTechnology #QuantumComputing #NIST #FIPS #CodeBreaker #Encryption #QDay #PQC #PostQuantumCryptography #Passwords #Ciphers #Algorithm #TechAptitude

  14. El lado del mal - Cloudflare Radar 2025: ¿Qué país tiene el Internet más rápido? ¿Cuál es el tamaño de los ataques DDoS en Internet? ¿Cuando de Internet va con IPv6? ¿Y con Cifrado Post Cuántico? elladodelmal.com/2026/01/cloud #PostQuantumCryptography #IPv6 #DDoS #AI #Cloudflare #Internet #Conectividad

  15. How secure are our communications and secrets? Is our privacy at risk once quantum computers become commonplace?

    If you want to learn about data‑encryption in the post‑quantum era, explore the basics of quantum computing, and hear about today’s progress in mitigating these challenges, join us for a talk by Prof. Dr. Peter Schwabe at Hackerspace Nijmegen this Friday, 14 Nov, at 20:00.

    Free admission
    Language: English

    More info: hackerspacenijmegen.nl/The_Mig

    #PQC #postquantumcryptography #postquantum #Cryptography #hacking #science #Crypto #Privacy #Hackerspace #Nijmegen