Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 18 submissions in the queue.

Submission Preview

Link to Story

NIST Round 2 and Post-Quantum Cryptography, Parts 1-3

Accepted submission by canopic jug at 2019-02-26 08:17:36
Software

Cryptographer Derek Zimmer at Private Internet Access' blog has a three-part series on the National Institute for Standards and Technology (NIST) and its second round of review for candidate algorithms for post-quantum cryptography. After a general audience introduction to what post-quantum cryptography is, he writes about the selection process used by NIST to eventually settle on a pair of algoritms. After several rounds, there will be only two algorithms selected. One will be for asymmetric public-key encryption, and the other will be for digital signatures. Parts 2 and 3 of his posts summarize each candidate algorithm individually.

NIST Round 2 and Post-Quantum Cryptography (part 1) [privateinternetaccess.com]
NIST Round 2 and Post-Quantum Cryptography – The New Asymmetric Algorithms (part 2) [privateinternetaccess.com]
NIST Round 2 and Post-Quantum Cryptography – The New Asymmetric Algorithms (part 3) [privateinternetaccess.com]


Original Submission