Stories
Slash Boxes
Comments

SoylentNews is people

posted by hubie on Thursday July 07 2022, @07:09PM   Printer-friendly
from the details-of-algorithms dept.

Decision will be binding on many companies and change the way they protect your data:

In the not-too-distant future—as little as a decade, perhaps, nobody knows exactly how long—the cryptography protecting your bank transactions, chat messages, and medical records from prying eyes is going to break spectacularly with the advent of quantum computing. On Tuesday, a US government agency named four replacement encryption schemes to head off this cryptopocalypse.

Some of the most widely used public-key encryption systems—including those using the RSA, Diffie-Hellman, and elliptic curve Diffie-Hellman algorithms—rely on mathematics to protect sensitive data. [...]

Researchers have known for decades these algorithms are vulnerable and have been cautioning the world to prepare for the day when all data that has been encrypted using them can be unscrambled. Chief among the proponents is the US Department of Commerce's National Institute of Standards and Technology (NIST), which is leading a drive for post-quantum cryptography (PQC).

On Tuesday, NIST said it selected four candidate PQC algorithms to replace those that are expected to be felled by quantum computing. They are: CRYSTALS-Kyber, CRYSTALS-Dilithium, FALCON, and SPHINCS+.

[...] While no one knows exactly when quantum computers will be available, there is considerable urgency in moving to PQC as soon as possible. Many researchers say it's likely that criminals and nation-state spies are recording massive amounts of encrypted communications and stockpiling them for the day they can be decrypted.

See also: NIST announcement, particularly if you have any digital signature algorithms you want to enter for consideration.

[Ed's Comment: AC Friendly withdrawn. You can blame you-know-who for the spamming]


Original Submission

 
This discussion was created by hubie (1068) for logged-in users only, but now has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by MrGuy on Friday July 08 2022, @03:03AM (1 child)

    by MrGuy (1007) on Friday July 08 2022, @03:03AM (#1258808)

    Exactly. I trust NIST as far as I can throw them. You don't get to shill for the NSA one day and then claim to be protecting us the next.

    https://miracl.com/blog/backdoors-in-nist-elliptic-curves/ [miracl.com]

    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2  
  • (Score: 0) by Anonymous Coward on Friday July 08 2022, @05:36AM

    by Anonymous Coward on Friday July 08 2022, @05:36AM (#1258823)
    NIST doesn't do any of the analysis. That is left to all and sundry to try and break stuff. Now after the elliptic curve issue, they should be hesitant to recommend anything the NSA had touched.