Interesting article and discussion.
The way Signal is addressing post-quantum encryption is by layering Crystals-KYBER over their current encryption. I initially thought it was overkill, but it’s a great decision.
Submitted 1 year ago by RobotToaster@mander.xyz to technology@lemmy.world
Interesting article and discussion.
The way Signal is addressing post-quantum encryption is by layering Crystals-KYBER over their current encryption. I initially thought it was overkill, but it’s a great decision.
My phone has a Kyber crystal?! Awesome!
There is np such thing as overkill while some governments actively funding quantum computing projects for the sole purpose of code cracking
Before, elliptical curve encryption has been hailed as the new golden standard, only too bad there is a serious weakness where if you know the seed you can crack the code. And guess who has the seed? Starts with N and ends with SA.
Goddamn NASA and their meddling!
And here I thought it was the National Emergency Services Academy.
Curve25519 should be fine.
Without paywall
How do you remove the paywall from the article? Just copy the URL of the article and provide it to archive.today, and that website just bypassed the paywall? How do they manage to bypass it? O.o
They need the content to be available for Google indexing reasons, it can only really be blocked through the client.
A smart enough backend system can access/crawl/index it, just like Google can. And then make it available to the public without the front end annoyance.
I assume the archive doesn’t run the Javascript portion of the site. You can often bypass pay walls with plug-ins that disable JS as well.
I dont think anyone will come to share this knowledge with us since it could be used by newspapers website to block the archiving.
Yeah you can observe this with letsencrypt failing to generate a certificate if you change the elliptic curve from an NSA generated curve to a generic/known safe one. Forces all signed certificates to use curves that are known to have issues, deliberate or otherwise.
Can you elaborate on this? Which curves does it happen with? Is there some source that you’ve seen?
You can’t use arbitrary curves with certificates, only those which are standardized because the CA will not implement anything which isn’t unambiguously defined in a standard with support by clients.
My point is that there is a documented listed of supported curves for ECDSA but attempting to use any other safe curve in the list results in a failure. I am not trying to use some arbitrary curve.
If your point is that no safe curve is permitted because the powers that be don’t permit it, TLS is doomed.
eff-certbot.readthedocs.io/en/latest/using.html#u…
The default is a curve widely believed to be unsafe, p256, with no functioning safe alternative.
That’s Bernstein’s website if anyone was wondering
I know someone in this field and sent him this article. He said the “NIST isn’t being transparent” claim isn’t true
tsapps.nist.gov/publication/get_pdf.cfm?pub_id=92… nvlpubs.nist.gov/nistpubs/ir/…/NIST.IR.8309.pdf tsapps.nist.gov/publication/get_pdf.cfm?pub_id=93…
He also responded with “of course the NSA would try and mess with it, but if it’s peer reviewed properly I don’t see how they would be successful”
We know for a fact that they have done it in the last and managed to hide it until it was too late, what makes you think they can’t do it again?
peer reviewed properly
Is the important bit here. The timeline from that Wikipedia article shows it was published in 2005 and work disproving it’s claim came around in 2006.
If a scientists work is retracted it really kills any more funding they receive. They use examples like the DRBG one as what not to be.
Looking at the history of the any of the Clandestine US orgs should probably reminds us these people will do loterally anything that they can, like give people LSD in an attempt to control the mind and put microphones in Russian cats.
but if it’s peer reviewed properly
Is it?
Did you send him Bernstein’s original blog post?
blog.cr.yp.to/20231003-countcorrectly.html
Unless he’s just making all of this up, it does seem pretty damning.
otter@lemmy.ca 1 year ago
Relevant bit for those that don’t click through:
Also, is this the same Daniel Bernstein from the 95’ ruling?
source; en.wikipedia.org/wiki/Daniel_J._Bernstein
NightLily@lemmy.basedcount.com 1 year ago
So highly reputable source with skin in the game thanks for the explanation.
WhatAmLemmy@lemmy.world 1 year ago
What the fuck? This guys a stone cold fuckin gangster!
At 24 he took the largest surveillance apparatus in history to court… and won! He even raw dogged it — representing himself for a portion of the trial.
He’s my hero!
steventhedev@lemmy.world 1 year ago
It is indeed one and the same. This is the post that triggered this article (warning: it’s long and not well organized): blog.cr.yp.to/20231003-countcorrectly.html
Credit where credit is due, DJB is usually correct even if he could communicate it better.
dack@lemmy.world 1 year ago
Honestly, I think his communication here is fine. He’s probably going to offend some people at NIST, but it seems like he’s already tried the cooperative route and is now willing to burn some bridges to bring things to light.
It reads like he’s playing mathematics and not politics, which is exactly what you want from a cryptography researcher.
spaxxor@lemmy.world 1 year ago
Sadly not new. The USA considers encryption to be a weapon of war (thanks Germany), so they do whatever they can to interfere with it. If you are making a new encryption scheme it will be illegal if the government doesn’t have an easy way to break it.
Touching_Grass@lemmy.world 1 year ago
I have a pet theory that a lot of our passionate “movements” that get us all angry and upset are only those movements that benefit someone powerful.
Its stuff like this that end up being just another coin that jar.
Like this should piss so many people off. Its something enough people know about. It’s something that you would think would have all kinds of groups up in arms about. Like ask any self respecting 2A enthusiasts if the government should keep skeleton key to every lock in their house.
Yet there’s fucking nothing but Daniel Bernstein
otter@lemmy.ca 1 year ago
Aren’t there a lot of existing standards already can’t be broken easily (by anyone)? That’s why we have all these recent attempts to force backdoors into encrypted apps
Blackmist@feddit.uk 1 year ago
They seem to have calmed that down in recent years, and rely on the dumb public to store all their secrets on readily accessible corporate servers.
The maths war is hard to win (bigger keys handle most of that), and I honestly doubt most current encryption can be beaten reliably even with quantum computing.
RangerAndTheCat@lemmy.world 1 year ago
Didn’t the same thing happen with TrueCrypt?
ryannathans@aussie.zone 1 year ago
Bernstein’s website safecurves.cr.yp.to/index.html
possiblylinux127@lemmy.zip 1 year ago
Cool guy