home.social

#pqc — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #pqc, aggregated by home.social.

  1. Today at the #PQCSA workshop on Post-Quantum Cryptographic Protocols in Rome (#Eurocrypt 2026 affiliated event): Leonard Schild (COSIC, KU Leuven) discussing "PQ Private Information Retrieval".
    esat.kuleuven.be/cosic/events/
    #pqc #postquantum #quantum

  2. Arnab Roy (University of Innsbruck, Austria) talking about "The Versatile LWE Problem" at the #PQCSA workshop on Post-Quantum Cryptographic Protocols in Rome today (#Eurocrypt 2026 affiliated event).
    esat.kuleuven.be/cosic/events/
    #pqc #postquantum #quantum

  3. Thom Wiggers (PQ Shield, UK) talked about "Migrating Protocols to PQ: the good, the bad, and the ugly" at the #PQCSA workshop on Post-Quantum Cryptographic Protocols in Rome today (#Eurocrypt 2026 affiliated event).
    esat.kuleuven.be/cosic/events/
    #pqc #postquantum #quantum

  4. Weekend Reading from TechAptitude!

    Get to know new Cryptography Standards (FIPS 20-3, FIPS 204, FIPS 205, FIPS 206) developed by NIST to withstand quantum attacks and prevent the so-called “Q-Day”. Q-Day is an estimate of the point in time when quantum computers will be able to reliably break existing RSA-2048 cryptography. techaptitude.substack.com/p/qu #PQC #NIST #Cryptography #Q_Day #PostQuantumCryptography #Quantum #Encryption #CryptographyAlgorithms #TechAptitude

  5. Weekend Reading from TechAptitude!

    Get to know new Cryptography Standards (FIPS 20-3, FIPS 204, FIPS 205, FIPS 206) developed by NIST to withstand quantum attacks and prevent the so-called “Q-Day”. Q-Day is an estimate of the point in time when quantum computers will be able to reliably break existing RSA-2048 cryptography. techaptitude.substack.com/p/qu #PQC #NIST #Cryptography #Q_Day #PostQuantumCryptography #Quantum #Encryption #CryptographyAlgorithms #TechAptitude

  6. Weekend Reading from TechAptitude!

    Get to know new Cryptography Standards (FIPS 20-3, FIPS 204, FIPS 205, FIPS 206) developed by NIST to withstand quantum attacks and prevent the so-called “Q-Day”. Q-Day is an estimate of the point in time when quantum computers will be able to reliably break existing RSA-2048 cryptography. techaptitude.substack.com/p/qu #PQC #NIST #Cryptography #Q_Day #PostQuantumCryptography #Quantum #Encryption #CryptographyAlgorithms #TechAptitude

  7. Weekend Reading from TechAptitude!

    Get to know new Cryptography Standards (FIPS 20-3, FIPS 204, FIPS 205, FIPS 206) developed by NIST to withstand quantum attacks and prevent the so-called “Q-Day”. Q-Day is an estimate of the point in time when quantum computers will be able to reliably break existing RSA-2048 cryptography. techaptitude.substack.com/p/qu #PQC #NIST #Cryptography #Q_Day #PostQuantumCryptography #Quantum #Encryption #CryptographyAlgorithms #TechAptitude

  8. Weekend Reading from TechAptitude!

    Get to know new Cryptography Standards (FIPS 20-3, FIPS 204, FIPS 205, FIPS 206) developed by NIST to withstand quantum attacks and prevent the so-called “Q-Day”. Q-Day is an estimate of the point in time when quantum computers will be able to reliably break existing RSA-2048 cryptography. techaptitude.substack.com/p/qu

  9. RE: infosec.exchange/@pgpkeys/1165

    @pgpkeys

    thanks for the update! So what does that mean for people running WKD's with existing keys? What changes do we need to make?

    #WKD #WebKeyDirectory #PGP #PGPPQC #PQC

  10. «Kyber Ransomware — Post-Quanten-Kryptografie:
    Die Ransomware Kyber nutzt als erste ihrer Art Post-Quanten-Verschlüsselung. Doch Experten entlarven die Technik als psychologischen Marketing-Trick.»

    IT-Sicherheit ist einiges mehr als nur gewisse Stichworte und PQC ist auch nur so sicher wie es im ganzen eingesetzt wird. IT-Betrüger setzen immer auf Trends um die Menschen zu verunsichern und abzufangen.

    🔏 it-daily.net/shortnews/kyber-r

    #kyber #mlkem #PQCryptography #pqc #itsec #ransomeware #betrug #it

  11. A lot can be achieved 3 years. Famously the Empire State Building rose to its full 102 stories in less than 2 years; the Berlin Wall fell and Germany was officially reunified in less than three; and in a similar timeframe Wikipedia went from zero to a million articles.

    Astonishingly, three years is about the time it takes a company to discover and replace its vulnerable cryptographic algorithms. Why?

    computing.co.uk/research/2026/

    #quantum #pqc #cryptography #technews #google #qday

  12. apparently tomcat's strategy for enabling pqc is to use two different ssl keys, a normal one (only rsa is mentioned in the documentation page, but i guess ec would work as well?), and an enormous ml-dsa-65 one for a hybrid pqc configuration: tomcat.apache.org/tomcat-10.1-

    openssl 3.5 and higher can be used to generate mldsa65 keys and stuff them and the certificate into a pkcs12 pfx file for use with tomcat, but i'm not certain which cert authorities will sign a mldsa65 certificate, if any of them support it yet

    #apache #tomcat #pqc #openssl

  13. The counter-argument to this seems to be that the IETF has "not seen" any coercion from the NSA in their org, so that makes their intentions pure in ratifying a riskier form of post-quantum crypto signatures. But DJB is saying that the IETF ignored the majority of their membership who were against ratifying a similar (non-hybrid) tech which turned out to be flawed. So barreling ahead with a new non-hybrid proposal (this time for signatures) looks suspicious, possibly the result of US corporate interests that tend to give the NSA what it wants.

    mastodon.cr.yp.to/@djb/1163822

    #pqc #crypto #ietf

  14. The road to post-quantum cryptography (PQC) has been long, but the end is nigh.

    For the past nine months we’ve been working on technical debt issues in hockeypuck, resulting in the 2.3.x series of releases. This has included a major postgres schema redesign, in-place reloading, reindexing threads, configurable keyword search, and significant refactoring of hockeypuck’s internals. v2.3.3 is in final testing with the last of these improvements, and will be released soon.

    But this is all just prep.

    The goal is version 2.4, which will distribute v6 PGP keys, which support post-quantum algorithms for both encryption and signing. 2026 is the year of PQC in PGP, and the hockeypuck keyservers will be ready.

    To enable the safe distribution of v6/PQC keys without breaking legacy software, we have developed an updated version of the venerable HKP API (for which HocKeyPuck is named). v1 and v2 HKP will be supported in parallel, but v6/PQC keys will only be distributed over v2.

    HKPv2 is specified in datatracker.ietf.org/doc/html/ and server implementation is underway in github.com/hockeypuck/hockeypu .

    If you maintain PGP client software and wish to be PQC ready, now is the time to check out HKPv2 and what it means for your users. Join the discussion at groups.google.com/g/hockeypuck

    Hockeypuck v2.4 development is kindly supported by @NGIZero Core.

    #openpgp #pgp #gnupg #pqc

  15. #Google is setting a 2029 timeline for migrating to #postquantumcryptography (#PQC) to secure against future #quantumcomputer threats. This includes prioritising #PQCmigration for authentication services and integrating PQC digital signature protection in Android 17. blog.google/innovation-and-ai/ #tech #media #news

  16. #Google is setting a 2029 timeline for migrating to #postquantumcryptography (#PQC) to secure against future #quantumcomputer threats. This includes prioritising #PQCmigration for authentication services and integrating PQC digital signature protection in Android 17. blog.google/innovation-and-ai/ #tech #media #news

  17. #Google is setting a 2029 timeline for migrating to #postquantumcryptography (#PQC) to secure against future #quantumcomputer threats. This includes prioritising #PQCmigration for authentication services and integrating PQC digital signature protection in Android 17. blog.google/innovation-and-ai/ #tech #media #news

  18. #Google is setting a 2029 timeline for migrating to #postquantumcryptography (#PQC) to secure against future #quantumcomputer threats. This includes prioritising #PQCmigration for authentication services and integrating PQC digital signature protection in Android 17. blog.google/innovation-and-ai/ #tech #media #news

  19. #Google is setting a 2029 timeline for migrating to #postquantumcryptography (#PQC) to secure against future #quantumcomputer threats. This includes prioritising #PQCmigration for authentication services and integrating PQC digital signature protection in Android 17. blog.google/innovation-and-ai/ #tech #media #news

  20. This Wed I am teaching SANS SEC529: Quantum Security Readiness for Executives.

    1 day, virtual, 3 hands-on labs.

    Not a quantum hype session. This is the operational, practical course. Myth-busing, what you really have to do, how to build a practical migration plan, how to put together a budget.

    Built for CISOs and security leaders who need to start moving now (i.e. everyone).

    Register: sans.org/cyber-security-course

    #infosec #quantumcomputing #pqc #postquantum #cybersecurity #SANS

  21. «Decentralized P2P Chat & File Transfer - Secure Messaging Without Central Servers:
    Creating decentralized P2P technology. Aiming to provide industry-grade cryptographic capabilities encapsulated into a webapp.»

    Do any of you regularly use @xoron with several people at the same time or even professionally and what is your impression about it?

    🐟 positive-intentions.com

    #chat #p2p #e2ee #filetransfer #security #decentralization #webtools #webapp #pqc #pqcrypto #cryptography #noserver

  22. It is a matter of time before Quantum Computing gains the ability to crack today’s core public key encryption methods.

    Our latest post on TechAptitude outlines the efforts by NIST to generate new cryptography standards to help withstand future quantum powered cyber attacks. Check it out!

    techaptitude.substack.com/p/qu #Cryptography #Quantum #QuantumTechnology #QuantumComputing #NIST #FIPS #CodeBreaker #Encryption #QDay #PQC #PostQuantumCryptography #Passwords #Ciphers #Algorithm #TechAptitude

  23. La bonne nouvelle : les solutions existent déjà. En 2024, le #NIST ( #National #Institute of #Standards and #Technology) a finalisé ses trois premières normes #post- #quantiques ( #PQC) : #ML- #KEM pour encapsulation de clés, #ML- #DSA et #SLH- #DSA pour les #signatures.

  24. Too many Q-Day predictions are “by vibes.” I’ve updated my CRQC Capability Framework - the evidence-based method used by national security analysts for years.

    If you want to track Q-Day properly - QEC, connectivity, magic states, decoders, manufacturability - not hype, start here: postquantum.com/post-quantum/c

    #QDay #Y2Q #QuantumSecurity #PQC #CRQC

  25. Re: Post Quantum Cryptography

    I expected this. It is why you should not chase the PQC ghost thru the swamp. You can get injured badly.

    m.slashdot.org/story/447772

    #ECC #PQC

  26. I'm trying to make sense of what "ML-DSA support in Python" looks like as of September 2025. So far cryptography.io, my favorite Python cryptography library, doesn't yet have a roadmap to exposing OpenSSL's ML-DSA support. While they're working that out I've been looking at dilithium-py (pypi.org/project/dilithium-py/) and liboqs-python (pypi.org/project/liboqs-python). Are there any other projects worth looking out for?

    #python #pqc #mldsa

  27. A single day with 4 breakthrough quantum tech developments - each with the potential to accelerate the arrival of Q-Day.

    That’s exactly what happened on Sept 24–25.
    I break it all down in the first issue of The Quantum Observer: quantumobserver.com/p/quantums

    #QuantumComputing #PQC #QDay #PostQuantum #QuantumReadiness #QuantumResilience

  28. »NIST standardisiert ein leichtgewichtiges Kryptografieverfahren für IoT-Geräte:
    Ascon ist ein leichtgewichtiges Kryptografieverfahren, das insbesondere für IoT-Geräte wie RFID-Tags gedacht ist. NIST hat das Verfahren nun standardisiert.«

    Ich habe absolut keine Ahnung von IoT aber spannend. Es sind leider sehr viele IoT-Tools, die im allgemeinen erhältlich sind, sehr unsicher im Web.

    ✔️ heise.de/news/NIST-standardisi

    #iota #nist #pqc #pqcrypto #rfid #tools #web #internet #postquantum #kryptografie