#postquantum — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #postquantum, aggregated by home.social.
-
3/14 · Post-Quantum Audit for Critical National Infrastructure
An operator-side playbook for the NCSC 2031 and 2035 migration deadlines. 22 pages.
https://mickai.co.uk/ebooks/post-quantum-audit-for-critical-national-infrastructure
-
NCSC Post-Quantum Cryptography pilot opens. Late spring 2026 to 31 March 2027 delivery window. UK PQC migration timeline: 2028 discovery, 2031 high-priority migration, 2035 full migration.
The Mickai SIOS audit ledger is FIPS 204 ML-DSA-65 from inception. Not retrofitted. ML-DSA-87 migration is a parameter change, not a redesign.
-
NCSC named the AI patch wave on 1 May 2026. The operators that hold ground through the forced correction will be the ones with a cryptographic position on what they patched, in what order, under whose key.
The Mickai audit substrate is that position at the primitive layer: FIPS 204 ML-DSA-65, SHA-3-512 hash chain, browser-resident offline verifier.
https://mickai.co.uk/articles/ncsc-named-the-ai-patch-wave-the-audit-substrate-is-what-survives-it
-
Today at the #PQCSA workshop on Post-Quantum Cryptographic Protocols in Rome (#Eurocrypt 2026 affiliated event): Leonard Schild (COSIC, KU Leuven) discussing "PQ Private Information Retrieval".
https://esat.kuleuven.be/cosic/events/pqcsa-workshop-cryptographic-protocols/program/
#pqc #postquantum #quantum -
Arnab Roy (University of Innsbruck, Austria) talking about "The Versatile LWE Problem" at the #PQCSA workshop on Post-Quantum Cryptographic Protocols in Rome today (#Eurocrypt 2026 affiliated event).
https://esat.kuleuven.be/cosic/events/pqcsa-workshop-cryptographic-protocols/program/
#pqc #postquantum #quantum -
Thom Wiggers (PQ Shield, UK) talked about "Migrating Protocols to PQ: the good, the bad, and the ugly" at the #PQCSA workshop on Post-Quantum Cryptographic Protocols in Rome today (#Eurocrypt 2026 affiliated event).
https://esat.kuleuven.be/cosic/events/pqcsa-workshop-cryptographic-protocols/program/
#pqc #postquantum #quantum -
Proton Mail introduce la crittografia post-quantum per proteggere le email del futuro
Proton Mail introduce la crittografia post-quantum come opzione per tutti gli utenti. Scopri come attivarla e perché è importante proteggere le email anche dalle minacce future. -
Proton is stepping into the future of cybersecurity with the introduction of post-quantum encryption in Proton Mail. The new feature helps users safeguard their emails today against the potential threats of tomorrow’s quantum computing era.
Read More: https://www.security.land/proton-mail-post-quantum-encryption/
#SecurityLand #Proton #News #ProtonMail #PostQuantum #Encryption #EmailSecurity
-
Proton is stepping into the future of cybersecurity with the introduction of post-quantum encryption in Proton Mail. The new feature helps users safeguard their emails today against the potential threats of tomorrow’s quantum computing era.
Read More: https://www.security.land/proton-mail-post-quantum-encryption/
#SecurityLand #Proton #News #ProtonMail #PostQuantum #Encryption #EmailSecurity
-
Not altogether sure how I feel about this. That said, it's a good post and it offers some solid food for thought.
https://sequoia-pgp.org/blog/2025/11/15/202511-post-quantum-cryptography/
-
Linux 7.0 non è una rivoluzione rumorosa.
È il contrario: il "software lento" è quello che tiene in piedi il mondo.
Ne parlo qui:
https://marcoferrigno.net/linux-kernel-7-0-the-quiet-revolution-that-changes-everything/#alpha #amd #epyc #infrastructure #kernel #kvm #linux #mldsa #opensource #postquantum #rust #security #sparc #xfs #zen5
-
Linux 7.0 non è una rivoluzione rumorosa.
È il contrario: il "software lento" è quello che tiene in piedi il mondo.
Ne parlo qui:
https://marcoferrigno.net/linux-kernel-7-0-the-quiet-revolution-that-changes-everything/#alpha #amd #epyc #infrastructure #kernel #kvm #linux #mldsa #opensource #postquantum #rust #security #sparc #xfs #zen5
-
Linux 7.0 non è una rivoluzione rumorosa.
È il contrario: il "software lento" è quello che tiene in piedi il mondo.
Ne parlo qui:
https://marcoferrigno.net/linux-kernel-7-0-the-quiet-revolution-that-changes-everything/#alpha #amd #epyc #infrastructure #kernel #kvm #linux #mldsa #opensource #postquantum #rust #security #sparc #xfs #zen5
-
Linux 7.0 non è una rivoluzione rumorosa.
È il contrario: il "software lento" è quello che tiene in piedi il mondo.
Ne parlo qui:
https://marcoferrigno.net/linux-kernel-7-0-the-quiet-revolution-that-changes-everything/#alpha #amd #epyc #infrastructure #kernel #kvm #linux #mldsa #opensource #postquantum #rust #security #sparc #xfs #zen5
-
MOSS Season 2 continues next week.
🎙️ Benjamin Wesolowski (CNRS & ENS Lyon, France)
Talk title: Random walks in number-theoretic cryptology
🗓️ Thursday, 7 May 2026 • 🕓 4:00 PM CEST • Online
Abstract: Cryptography met number theory in 1976, when Diffie and Hellman achieved what had long been considered impossible: a protocol for two people to exchange secret information on a public channel, even if they had never met before to establish some kind of password, a pre-shared key. Diffie and Hellman designed the protocol such that a spy attempting to find the secret would need to solve a presumably hard computational problem: the discrete logarithm problem in the multiplicative group of a finite field.
Since then, number theory has consistently met the challenges of cryptography, offering a variety of difficult algorithmic problems and powerful tools for their analysis. In this talk, we will explore this “mathematical cryptology”, with a focus on euclidean lattices (designed to resist against quantum computers), the use of random walks, and how spectral methods in number theory apply to cryptology.
----------------------------------------------
Scan the QR code in the image to join the mailing list and receive the online access link.
#Mathematics #NumberTheory #Cryptography #Lattices #PostQuantum #MOSS #EMS
-
MOSS Season 2 continues next week.
🎙️ Benjamin Wesolowski (CNRS & ENS Lyon, France)
Talk title: Random walks in number-theoretic cryptology
🗓️ Thursday, 7 May 2026 • 🕓 4:00 PM CEST • Online
Abstract: Cryptography met number theory in 1976, when Diffie and Hellman achieved what had long been considered impossible: a protocol for two people to exchange secret information on a public channel, even if they had never met before to establish some kind of password, a pre-shared key. Diffie and Hellman designed the protocol such that a spy attempting to find the secret would need to solve a presumably hard computational problem: the discrete logarithm problem in the multiplicative group of a finite field.
Since then, number theory has consistently met the challenges of cryptography, offering a variety of difficult algorithmic problems and powerful tools for their analysis. In this talk, we will explore this “mathematical cryptology”, with a focus on euclidean lattices (designed to resist against quantum computers), the use of random walks, and how spectral methods in number theory apply to cryptology.
----------------------------------------------
Scan the QR code in the image to join the mailing list and receive the online access link.
#Mathematics #NumberTheory #Cryptography #Lattices #PostQuantum #MOSS #EMS
-
MOSS Season 2 continues next week.
🎙️ Benjamin Wesolowski (CNRS & ENS Lyon, France)
Talk title: Random walks in number-theoretic cryptology
🗓️ Thursday, 7 May 2026 • 🕓 4:00 PM CEST • Online
Abstract: Cryptography met number theory in 1976, when Diffie and Hellman achieved what had long been considered impossible: a protocol for two people to exchange secret information on a public channel, even if they had never met before to establish some kind of password, a pre-shared key. Diffie and Hellman designed the protocol such that a spy attempting to find the secret would need to solve a presumably hard computational problem: the discrete logarithm problem in the multiplicative group of a finite field.
Since then, number theory has consistently met the challenges of cryptography, offering a variety of difficult algorithmic problems and powerful tools for their analysis. In this talk, we will explore this “mathematical cryptology”, with a focus on euclidean lattices (designed to resist against quantum computers), the use of random walks, and how spectral methods in number theory apply to cryptology.
----------------------------------------------
Scan the QR code in the image to join the mailing list and receive the online access link.
#Mathematics #NumberTheory #Cryptography #Lattices #PostQuantum #MOSS #EMS
-
MOSS Season 2 continues next week.
🎙️ Benjamin Wesolowski (CNRS & ENS Lyon, France)
Talk title: Random walks in number-theoretic cryptology
🗓️ Thursday, 7 May 2026 • 🕓 4:00 PM CEST • Online
Abstract: Cryptography met number theory in 1976, when Diffie and Hellman achieved what had long been considered impossible: a protocol for two people to exchange secret information on a public channel, even if they had never met before to establish some kind of password, a pre-shared key. Diffie and Hellman designed the protocol such that a spy attempting to find the secret would need to solve a presumably hard computational problem: the discrete logarithm problem in the multiplicative group of a finite field.
Since then, number theory has consistently met the challenges of cryptography, offering a variety of difficult algorithmic problems and powerful tools for their analysis. In this talk, we will explore this “mathematical cryptology”, with a focus on euclidean lattices (designed to resist against quantum computers), the use of random walks, and how spectral methods in number theory apply to cryptology.
----------------------------------------------
Scan the QR code in the image to join the mailing list and receive the online access link.
#Mathematics #NumberTheory #Cryptography #Lattices #PostQuantum #MOSS #EMS
-
MOSS Season 2 continues next week.
🎙️ Benjamin Wesolowski (CNRS & ENS Lyon, France)
Talk title: Random walks in number-theoretic cryptology
🗓️ Thursday, 7 May 2026 • 🕓 4:00 PM CEST • Online
Abstract: Cryptography met number theory in 1976, when Diffie and Hellman achieved what had long been considered impossible: a protocol for two people to exchange secret information on a public channel, even if they had never met before to establish some kind of password, a pre-shared key. Diffie and Hellman designed the protocol such that a spy attempting to find the secret would need to solve a presumably hard computational problem: the discrete logarithm problem in the multiplicative group of a finite field.
Since then, number theory has consistently met the challenges of cryptography, offering a variety of difficult algorithmic problems and powerful tools for their analysis. In this talk, we will explore this “mathematical cryptology”, with a focus on euclidean lattices (designed to resist against quantum computers), the use of random walks, and how spectral methods in number theory apply to cryptology.
----------------------------------------------
Scan the QR code in the image to join the mailing list and receive the online access link.
#Mathematics #NumberTheory #Cryptography #Lattices #PostQuantum #MOSS #EMS
-
OpenSSL 4.0 Strengthens Privacy and Removes Legacy Protocols
OpenSSL 4.0.0 adds Encrypted Client Hello to protect browsing privacy, removes obsolete protocols, and introduces post-quantum cryptography.https://yoota.it/en/openssl-4-0-strengthens-privacy-and-removes-legacy-protocols/
-
OpenSSL 4.0 Strengthens Privacy and Removes Legacy Protocols
OpenSSL 4.0.0 adds Encrypted Client Hello to protect browsing privacy, removes obsolete protocols, and introduces post-quantum cryptography.https://yoota.it/en/openssl-4-0-strengthens-privacy-and-removes-legacy-protocols/
-
OpenSSL 4.0: privacy rafforzata e addio ai protocolli vecchi
OpenSSL 4.0.0 arriva con il supporto a Encrypted Client Hello per proteggere la privacy nella navigazione, rimuove protocolli obsoleti e introduce crittografia post-quantum.https://yoota.it/openssl-4-0-privacy-rafforzata-e-addio-ai-protocolli-vecchi/
-
OpenSSL 4.0: privacy rafforzata e addio ai protocolli vecchi
OpenSSL 4.0.0 arriva con il supporto a Encrypted Client Hello per proteggere la privacy nella navigazione, rimuove protocolli obsoleti e introduce crittografia post-quantum.https://yoota.it/openssl-4-0-privacy-rafforzata-e-addio-ai-protocolli-vecchi/
-
OpenSSL 4.0: privacy rafforzata e addio ai protocolli vecchi
OpenSSL 4.0.0 arriva con il supporto a Encrypted Client Hello per proteggere la privacy nella navigazione, rimuove protocolli obsoleti e introduce crittografia post-quantum.https://yoota.it/openssl-4-0-privacy-rafforzata-e-addio-ai-protocolli-vecchi/
-
OpenSSL 4.0: privacy rafforzata e addio ai protocolli vecchi
OpenSSL 4.0.0 arriva con il supporto a Encrypted Client Hello per proteggere la privacy nella navigazione, rimuove protocolli obsoleti e introduce crittografia post-quantum.https://yoota.it/openssl-4-0-privacy-rafforzata-e-addio-ai-protocolli-vecchi/
-
Industrial systems face structural gap as quantum risks drive urgency for crypto-agility and post-quantum readiness https://www.byteseu.com/1933504/ #AI #Algorithms #claroty #CriticalInfrastructure #Crypto #CryptoAgility #CryptoCurrency #cryptography #CyberResilience #CyberRisks #Dragos #EmbeddedDevices #encryption #IIoT #industrial #IndustrialSystems #Industry40 #NIST #NozomiNetworks #OTEnvironments #PLCs #PostQuantum #QuantumComputer #QuantumComputing #QuantumRisks #SafetySystems
-
📌 April-26:
The official bets are in: #Lattices vs #X25519 the #cryptographers 📈 #polymarket is open.
👉 My money would be on team @djb and @matthew_d_green
Any new #postquantum hard assumption will fail before #quantumcomputers deliver.
If @filippo pq apocalyptic timeframe is correct, only expensive, well understood, hash tree based signatures like #SPHINCS will save our ass (again).
-
Is this a #secure #MessagingApp? Maybe not yet, but it’s time to think about #DigitalPrivacy.
Imagine a #Messaging platform that’s as #secure as #Signal but requires #NoRegistration and #NoInstallation. By leveraging #WebRTC for direct #BrowserToBrowser communication, this #OpenSource project eliminates the #Middleman entirely. Simply share a unique #URL to establish an #Encrypted #PrivateChannel. It is a #Lightweight, #Disposable method to bypass #DataHarvesting and reclaim #DigitalSovereignty.
This project introduces a new #Paradigm in #ClientSide managed #Encryption. Send #Secure messages with #NoSetup, #NoCloud, and #NoTrace.
Experience the #Features:
* #PWA (#ProgressiveWebApp) for instant access
* #P2P (#PeerToPeer) connectivity
* #EndToEndEncryption (#E2EE)
* #SignalProtocol & #PostQuantum #Cryptography
* #Multimedia, #FileTransfer, & #VideoCalls
* #NoDatabase & #Stateless architecture
* #TURN server support for reliable connectionsWhile not yet a direct replacement for #Simplex or #WhatsApp, this introduces a unique approach to #SecureCommunication.
Try the #LiveDemo now:
https://p2p.positive-intentions.com/iframe.html?globals=&id=demo-p2p-messaging--p-2-p-messaging&viewMode=storyExplore the #Technical roadmap:
https://positive-intentions.com/docs/technical/p2p-messaging-technical-breakdownRead the full #Documentation:
https://positive-intentions.com/docs/technical#PrivacyTech #Privacy #CyberSecurity #Infosec #WebDev #JavaScript #Decentralized #EncryptionProtocol #QuantumResistant #Tech #FOSS #SoftwareEngineering #DataPrivacy #SecureChat #NoLog #P2PChat #WebRTCProtocol #Coding #DevCommunity #DigitalPrivacy #InternetFreedom #SecureMessaging #WebTech #AppDevelopment #CryptographyResearch #PrivateMessaging #WebPlatform #ZeroTrust #Innovation
-
Is this a #secure #MessagingApp? Maybe not yet, but it’s time to think about #DigitalPrivacy.
Imagine a #Messaging platform that’s as #secure as #Signal but requires #NoRegistration and #NoInstallation. By leveraging #WebRTC for direct #BrowserToBrowser communication, this #OpenSource project eliminates the #Middleman entirely. Simply share a unique #URL to establish an #Encrypted #PrivateChannel. It is a #Lightweight, #Disposable method to bypass #DataHarvesting and reclaim #DigitalSovereignty.
This project introduces a new #Paradigm in #ClientSide managed #Encryption. Send #Secure messages with #NoSetup, #NoCloud, and #NoTrace.
Experience the #Features:
* #PWA (#ProgressiveWebApp) for instant access
* #P2P (#PeerToPeer) connectivity
* #EndToEndEncryption (#E2EE)
* #SignalProtocol & #PostQuantum #Cryptography
* #Multimedia, #FileTransfer, & #VideoCalls
* #NoDatabase & #Stateless architecture
* #TURN server support for reliable connectionsWhile not yet a direct replacement for #Simplex or #WhatsApp, this introduces a unique approach to #SecureCommunication.
Try the #LiveDemo now:
https://p2p.positive-intentions.com/iframe.html?globals=&id=demo-p2p-messaging--p-2-p-messaging&viewMode=storyExplore the #Technical roadmap:
https://positive-intentions.com/docs/technical/p2p-messaging-technical-breakdownRead the full #Documentation:
https://positive-intentions.com/docs/technical#PrivacyTech #Privacy #CyberSecurity #Infosec #WebDev #JavaScript #Decentralized #EncryptionProtocol #QuantumResistant #Tech #FOSS #SoftwareEngineering #DataPrivacy #SecureChat #NoLog #P2PChat #WebRTCProtocol #Coding #DevCommunity #DigitalPrivacy #InternetFreedom #SecureMessaging #WebTech #AppDevelopment #CryptographyResearch #PrivateMessaging #WebPlatform #ZeroTrust #Innovation
-
Is this a #secure #MessagingApp? Maybe not yet, but it’s time to think about #DigitalPrivacy.
Imagine a #Messaging platform that’s as #secure as #Signal but requires #NoRegistration and #NoInstallation. By leveraging #WebRTC for direct #BrowserToBrowser communication, this #OpenSource project eliminates the #Middleman entirely. Simply share a unique #URL to establish an #Encrypted #PrivateChannel. It is a #Lightweight, #Disposable method to bypass #DataHarvesting and reclaim #DigitalSovereignty.
This project introduces a new #Paradigm in #ClientSide managed #Encryption. Send #Secure messages with #NoSetup, #NoCloud, and #NoTrace.
Experience the #Features:
* #PWA (#ProgressiveWebApp) for instant access
* #P2P (#PeerToPeer) connectivity
* #EndToEndEncryption (#E2EE)
* #SignalProtocol & #PostQuantum #Cryptography
* #Multimedia, #FileTransfer, & #VideoCalls
* #NoDatabase & #Stateless architecture
* #TURN server support for reliable connectionsWhile not yet a direct replacement for #Simplex or #WhatsApp, this introduces a unique approach to #SecureCommunication.
Try the #LiveDemo now:
https://p2p.positive-intentions.com/iframe.html?globals=&id=demo-p2p-messaging--p-2-p-messaging&viewMode=storyExplore the #Technical roadmap:
https://positive-intentions.com/docs/technical/p2p-messaging-technical-breakdownRead the full #Documentation:
https://positive-intentions.com/docs/technical#PrivacyTech #Privacy #CyberSecurity #Infosec #WebDev #JavaScript #Decentralized #EncryptionProtocol #QuantumResistant #Tech #FOSS #SoftwareEngineering #DataPrivacy #SecureChat #NoLog #P2PChat #WebRTCProtocol #Coding #DevCommunity #DigitalPrivacy #InternetFreedom #SecureMessaging #WebTech #AppDevelopment #CryptographyResearch #PrivateMessaging #WebPlatform #ZeroTrust #Innovation
-
Is this a #secure #MessagingApp? Maybe not yet, but it’s time to think about #DigitalPrivacy.
Imagine a #Messaging platform that’s as #secure as #Signal but requires #NoRegistration and #NoInstallation. By leveraging #WebRTC for direct #BrowserToBrowser communication, this #OpenSource project eliminates the #Middleman entirely. Simply share a unique #URL to establish an #Encrypted #PrivateChannel. It is a #Lightweight, #Disposable method to bypass #DataHarvesting and reclaim #DigitalSovereignty.
This project introduces a new #Paradigm in #ClientSide managed #Encryption. Send #Secure messages with #NoSetup, #NoCloud, and #NoTrace.
Experience the #Features:
* #PWA (#ProgressiveWebApp) for instant access
* #P2P (#PeerToPeer) connectivity
* #EndToEndEncryption (#E2EE)
* #SignalProtocol & #PostQuantum #Cryptography
* #Multimedia, #FileTransfer, & #VideoCalls
* #NoDatabase & #Stateless architecture
* #TURN server support for reliable connectionsWhile not yet a direct replacement for #Simplex or #WhatsApp, this introduces a unique approach to #SecureCommunication.
Try the #LiveDemo now:
https://p2p.positive-intentions.com/iframe.html?globals=&id=demo-p2p-messaging--p-2-p-messaging&viewMode=storyExplore the #Technical roadmap:
https://positive-intentions.com/docs/technical/p2p-messaging-technical-breakdownRead the full #Documentation:
https://positive-intentions.com/docs/technical#PrivacyTech #Privacy #CyberSecurity #Infosec #WebDev #JavaScript #Decentralized #EncryptionProtocol #QuantumResistant #Tech #FOSS #SoftwareEngineering #DataPrivacy #SecureChat #NoLog #P2PChat #WebRTCProtocol #Coding #DevCommunity #DigitalPrivacy #InternetFreedom #SecureMessaging #WebTech #AppDevelopment #CryptographyResearch #PrivateMessaging #WebPlatform #ZeroTrust #Innovation
-
Is this a #secure #MessagingApp? Maybe not yet, but it’s time to think about #DigitalPrivacy.
Imagine a #Messaging platform that’s as #secure as #Signal but requires #NoRegistration and #NoInstallation. By leveraging #WebRTC for direct #BrowserToBrowser communication, this #OpenSource project eliminates the #Middleman entirely. Simply share a unique #URL to establish an #Encrypted #PrivateChannel. It is a #Lightweight, #Disposable method to bypass #DataHarvesting and reclaim #DigitalSovereignty.
This project introduces a new #Paradigm in #ClientSide managed #Encryption. Send #Secure messages with #NoSetup, #NoCloud, and #NoTrace.
Experience the #Features:
* #PWA (#ProgressiveWebApp) for instant access
* #P2P (#PeerToPeer) connectivity
* #EndToEndEncryption (#E2EE)
* #SignalProtocol & #PostQuantum #Cryptography
* #Multimedia, #FileTransfer, & #VideoCalls
* #NoDatabase & #Stateless architecture
* #TURN server support for reliable connectionsWhile not yet a direct replacement for #Simplex or #WhatsApp, this introduces a unique approach to #SecureCommunication.
Try the #LiveDemo now:
https://p2p.positive-intentions.com/iframe.html?globals=&id=demo-p2p-messaging--p-2-p-messaging&viewMode=storyExplore the #Technical roadmap:
https://positive-intentions.com/docs/technical/p2p-messaging-technical-breakdownRead the full #Documentation:
https://positive-intentions.com/docs/technical#PrivacyTech #Privacy #CyberSecurity #Infosec #WebDev #JavaScript #Decentralized #EncryptionProtocol #QuantumResistant #Tech #FOSS #SoftwareEngineering #DataPrivacy #SecureChat #NoLog #P2PChat #WebRTCProtocol #Coding #DevCommunity #DigitalPrivacy #InternetFreedom #SecureMessaging #WebTech #AppDevelopment #CryptographyResearch #PrivateMessaging #WebPlatform #ZeroTrust #Innovation
-
In our latest Computing research we look at developments in quantum computing and cryptography, whether UK IT leaders believe the risk is real and what actions they are taking.
-
Called it.
In Nov I wrote that ECC was the easier quantum target: postquantum.com/post-quantum/shor-rsa-ecc-diffie-hellman/
In March I argued Bitcoin's quantum risk was underestimated because everyone used RSA benchmarks: postquantum.com/post-quantum/bitcoin-quantum-risk-closer-ecc/
EUROCRYPT 2026 just confirmed both.
Chevignard, Fouque & Schrottenloher halved ECDLP qubit counts:
P-256: 2,124 → 1,193 (42% less than RSA-3072!)
P-224: 1,098 (21.5% less than RSA-2048)
Full writeup: https://postquantum.com/security-pqc/algorithm-quantum-ecc/
-
https://www.europesays.com/ch/34649/ SEALSQ and IC’Alps Unify Expertise to Deliver Integrated Post-Quantum Cybersecurity and Functional Safety for Autonomous Vehicles #Alps #AutomotiveIndustry #AutonomousVehicles #Cybersecurity #FunctionalSafety #IC #PostQuantum #QuantumComputer #SEALSQ #SEALSQCorp #semiconductors
-
This Wed I am teaching SANS SEC529: Quantum Security Readiness for Executives.
1 day, virtual, 3 hands-on labs.
Not a quantum hype session. This is the operational, practical course. Myth-busing, what you really have to do, how to build a practical migration plan, how to put together a budget.
Built for CISOs and security leaders who need to start moving now (i.e. everyone).
Register: https://www.sans.org/cyber-security-courses/quantum-security-readiness-executives
#infosec #quantumcomputing #pqc #postquantum #cybersecurity #SANS
-
@orva @mttaggart
(I realise this is an aside to the issue described by the researchers)Could a decryption key be hardwired into an anti-fuse #FPGA ?
Am I right to say that would be resistant to bit flips? Or would three be required so they can vote on the true decryption key?
I can come up with other ways to solve this, and I'm sure if it's the only thing holding back encrypted control of satellites, other more erudite minds could come up with elegant solutions.Obviously this is a one-time thing unless you're willing to send unprogrammed anti-fuse FPGAs up there to store new keys. I have read in the lay-press that flash FPGAs are also SEU resistant, but this stuff is really outside my wheelhouse.
Not to say it won't take a few decades to fix the problem; I only mean to suggest it can probably be fixed.
#space #SEU #bitFlip #FPGA #encryption #satellites #cryptography #postquantum
-
@orva @mttaggart
(I realise this is an aside to the issue described by the researchers)Could a decryption key be hardwired into an anti-fuse #FPGA ?
Am I right to say that would be resistant to bit flips? Or would three be required so they can vote on the true decryption key?
I can come up with other ways to solve this, and I'm sure if it's the only thing holding back encrypted control of satellites, other more erudite minds could come up with elegant solutions.Obviously this is a one-time thing unless you're willing to send unprogrammed anti-fuse FPGAs up there to store new keys. I have read in the lay-press that flash FPGAs are also SEU resistant, but this stuff is really outside my wheelhouse.
Not to say it won't take a few decades to fix the problem; I only mean to suggest it can probably be fixed.
#space #SEU #bitFlip #FPGA #encryption #satellites #cryptography #postquantum
-
@orva @mttaggart
(I realise this is an aside to the issue described by the researchers)Could a decryption key be hardwired into an anti-fuse #FPGA ?
Am I right to say that would be resistant to bit flips? Or would three be required so they can vote on the true decryption key?
I can come up with other ways to solve this, and I'm sure if it's the only thing holding back encrypted control of satellites, other more erudite minds could come up with elegant solutions.Obviously this is a one-time thing unless you're willing to send unprogrammed anti-fuse FPGAs up there to store new keys. I have read in the lay-press that flash FPGAs are also SEU resistant, but this stuff is really outside my wheelhouse.
Not to say it won't take a few decades to fix the problem; I only mean to suggest it can probably be fixed.
#space #SEU #bitFlip #FPGA #encryption #satellites #cryptography #postquantum
-
@orva @mttaggart
(I realise this is an aside to the issue described by the researchers)Could a decryption key be hardwired into an anti-fuse #FPGA ?
Am I right to say that would be resistant to bit flips? Or would three be required so they can vote on the true decryption key?
I can come up with other ways to solve this, and I'm sure if it's the only thing holding back encrypted control of satellites, other more erudite minds could come up with elegant solutions.Obviously this is a one-time thing unless you're willing to send unprogrammed anti-fuse FPGAs up there to store new keys. I have read in the lay-press that flash FPGAs are also SEU resistant, but this stuff is really outside my wheelhouse.
Not to say it won't take a few decades to fix the problem; I only mean to suggest it can probably be fixed.
#space #SEU #bitFlip #FPGA #encryption #satellites #cryptography #postquantum
-
@orva @mttaggart
(I realise this is an aside to the issue described by the researchers)Could a decryption key be hardwired into an anti-fuse #FPGA ?
Am I right to say that would be resistant to bit flips? Or would three be required so they can vote on the true decryption key?
I can come up with other ways to solve this, and I'm sure if it's the only thing holding back encrypted control of satellites, other more erudite minds could come up with elegant solutions.Obviously this is a one-time thing unless you're willing to send unprogrammed anti-fuse FPGAs up there to store new keys. I have read in the lay-press that flash FPGAs are also SEU resistant, but this stuff is really outside my wheelhouse.
Not to say it won't take a few decades to fix the problem; I only mean to suggest it can probably be fixed.
#space #SEU #bitFlip #FPGA #encryption #satellites #cryptography #postquantum
-
A single day with 4 breakthrough quantum tech developments - each with the potential to accelerate the arrival of Q-Day.
That’s exactly what happened on Sept 24–25.
I break it all down in the first issue of The Quantum Observer: https://quantumobserver.com/p/quantums-wild-week#QuantumComputing #PQC #QDay #PostQuantum #QuantumReadiness #QuantumResilience
-
»NIST standardisiert ein leichtgewichtiges Kryptografieverfahren für IoT-Geräte:
Ascon ist ein leichtgewichtiges Kryptografieverfahren, das insbesondere für IoT-Geräte wie RFID-Tags gedacht ist. NIST hat das Verfahren nun standardisiert.«Ich habe absolut keine Ahnung von IoT aber spannend. Es sind leider sehr viele IoT-Tools, die im allgemeinen erhältlich sind, sehr unsicher im Web.
#iota #nist #pqc #pqcrypto #rfid #tools #web #internet #postquantum #kryptografie
-
Cryspen is heading to RWC in Sofia next week! 🚀 We'll be presenting "Using Formally Verified Post-Quantum Algorithms at Scale" and our team will be on hand to discuss all things high assurance software and crypto. Oh, and we're sponsoring too!
-
Returning to pre-pandemic participation at the #IETF115 hackathon: #IETFHackathon co-chair @eckelcu writes about the 39 projects with 450 registered participants covering a broad range of tech including #DNS #IOT #SRv6 & #postquantum https://www.ietf.org/blog/ietf115-hackathon/