Post-Quantum Cryptography (PQC)

Lattice-Based Amalgamated Algorithms, Quantum Secure, Round5

The U.S. National Institute of Standards and Technology Post-Quantum Computing project has been examining the pros and cons of nearly 70 proposed quantum secure algorithms. One proposed solution, Round5 (round5.org), boasts of “shortest key and ciphertext sizes” and holds a lead in performance and implementation. From a bandwidth, processing, and generally “size-matters” standpoint, Round5 may be the leader in NIST’s quest for a PQC algorithm solution.

Read More »

Double-Encryption Mitigates Quantum Threat?

Quantum is coming. When is up for debate. If tomorrow a nation-state announced it had a quantum computer breaking encryption in mere minutes or seconds, would your data be secure? There are ways to mitigate the threat now, before it actually arrives. Crypto-agility is a relatively new term which implies the ability to rapidly change the encryption algorithm being used to encrypt data, be it the data is in motion or at rest. Double-encryption is another method. Employing post-quantum cryptographic algorithms is still, another. 

Read More »

Finland Approves PQC-ready Device

Finland’s National Cyber Security Authority has approved a firewall and virtual private network appliance which claims compatibility for post-quantum cryptographic algorithms. The approval and considerations for cryptographic resilience in a quantum computer world lend strength to the growing international concern over quantum supremacy’s arrival. It’s just a matter of when…because quantum is coming. 

Read More »

Microsoft, OpenVPN, Post-Quantum Computing

Recently, Microsoft made virtual private networks (VPNs) and post-quantum cryptography (PQC) cryptosystem experimentation available for public study. Making use of the widely acclaimed OpenVPN software, MS combined OpenVPN with a PQC kit. The present iteration only protects data tunneling between the client and the VPN server with purportedly PQC-safe encryption algorithms. As data exits this trusted network onto the internet (public), classical cryptography takes over the encryption, increasing risk to the data’s confidentiality. The MS project complements the Open Quantum Safe project and NIST’s Post-Quantum Cryptography endeavors. Read on for further detail. 

Read More »

TLS 2.0

Forward Secrecy’s use as a layer of security during encrypted sessions may be threatened. Simply, Forward Secrecy permits only the end-points in a secure session to decrypt traffic. The problem is surveillance of encrypted traffic in high-security environments demands the ability to break open and inspect content.

Read More »