shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

264
active users

#postquantumcryptography

0 posts0 participants0 posts today

More talk about quantum computers breaking encryption in the near future... and of course there's that thing about nation states, and possibly other bad actors, already hoovering up packet logs to later decrypt.

So, given the Post Quantum Cryptography that's coming online, I'd really love a browser feature/extension to alert me to when a site is using PQC.

Why? Becaus then I can change my password, secure in the knowledge that it can't be fished out of past packet logs and potentially cracked.

There's no use a login being PQC protected if it's the same password as before then !

So, anyone doing that ?

Edit: Of *course* we should all be using strong TOTP 2FA, or a physical key, but not all places we want to login to support that.

Daniel J. Bernstein (#djb, to those who know and love him [1]) has a new blog entry about the NIST post-quantum #cryptography standardization process that's been ongoing for some years. Also, follow him @djb .

If you're not aware of some of the controversy about how NIST is running this process, it's a must-read.

blog.cr.yp.to/20250423-mceliec

My $0.02: it sure looks like NIST is backstopping an attempt by the NSA to get everyone to standardize on cryptography #standards that the #NSA knows how to break.

Again.

Yes, they did it before. If you read up on the Dual_EC calamity and its fallout, and how this time it was supposed to be different - open, transparent, secure - then prepare to be disappointed. NIST is playing #Calvinball with their rules for this contest, yanking the rug out from under contenders that appear to be more #secure and better understood, while pushing alternatives that are objectively worse (#weaker encryption, less studied, poorer #performance).

Frankly, I think organizations outside of the #USA would be foolish to trust anything that comes out of #NIST's current work. Well, those inside the USA too, but some of those may be forced by law to use whatever NIST certifies.

[1] Some people think djb is "prickly", not lovable. Oddly, it seems that the only people who say this are those who are wildly incorrect about code/algorithms and are being gently but publicly corrected about by djb at the time

blog.cr.yp.tocr.yp.to: 2025.04.23: McEliece standardization

Go ahead and start implementing these, folks. Maybe get some help from a friendly neighborhood cryptographer, though, so you don't set them up incorrectly; we've seen this a lot with the current batch of algorithms.

theregister.com/2024/08/14/nis

The Register · NIST finalizes trio of post-quantum encryption standardsBy Jessica Lyons

The Tuta Team is composed of dedicated privacy activists who are working hard to protect your online data!💪

With a wide array of backgrounds and expertise we are committed to providing you with the world's most secure end-to-end encrypted email experience!🔒

This is privacy done right.🎉

Check out our new additions and get to know the crew who is fighting to make the internet a better place! 👉 tuta.com/team

🎉Exciting news! 📚Our #ResearchPaper just hit the ACM TQC! Delving into the world of #QuantumCryptanalysis, we conducted a practical, comprehensive study of the quantum attacks to code-based #PostQuantumCryptography proposals, outperforming the SoA by 2^19-2^30.
It was an incredible and challenging journey, and I am deeply proud and humbled by my first-ever paper accepted to such a prestigious journal. Thanks to all the people involved! #QuantumComputing#Cryptography#PQC

perriello.faculty.polimi.it/as