mathstodon.xyz is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Mastodon instance for maths people. We have LaTeX rendering in the web interface!

Server stats:

2.8K
active users

#pqc

4 posts4 participants0 posts today

Alors que l’ordinateur quantique est loin de voir le jour, l’informatique dite « postquantique » se déploie même sans lui : tous les professionnels de la cryptographie l’utilisent déjà pour sécuriser les échanges numériques. #Cryptographie #PQC lemonde.fr/sciences/article/20

Le Monde · Le chiffrement est entré dans l’ère postquantiqueBy David Larousserie
Continued thread

Great call to action by Robbie King on finding more useful quantum algorithms.

Billions of euros have been spent on research for advancing the development of quantum computers, but what are they useful for?

As the post-quantum transition progresses, the main incentive for quantum computers is going away.

Robbie claims "The bar for meaningful progress is lower than it might seem, and even incremental advances are valuable.”

quantumfrontiers.com/2025/04/2

About a third of the WWW #TLS traffic is using post-quantum encryption, which is protected against quantum factoring attacks such as Shor's algorithm. This has been achieved since Hybrid ML-KEM has been widely adopted by most web browsers and large service providers such as Cloudflare, Google, AWS, etc. There are no absolute figures available, but for example, Cloudflare has nice statistics about PQ encryption use on their services: radar.cloudflare.com/adoption-

The best part of this adoption is that users haven't had to do anything, or even know that this has been happening. As it should be.

The paper I co-authored (“A Critical Analysis of Deployed Use Cases for Quantum Key Distribution and Comparison with Post-Quantum Cryptography”) was accepted for publication by “EPJ Quantum Technology” today. 😊

You can find the preprint here, Nick will eventually update it with the final changes.

In short: We looked into existing use-cases for
#QuantumKeyDistribution and whether they make any sense and did so as a joint team between people with a QKD-background and cryptographers who started out very critical of QKD. (I’m firmly in the latter camp.)

My personal summary (though some of my co-authors won’t share it to this extend):
#QKD is bullshit and not useful for practical purposes as it stands.

#crypto #cryptography #cryptology #postquantumcrypto #PQC

IACR logo
IACR Cryptology ePrint Archive · A Critical Analysis of Deployed Use Cases for Quantum Key Distribution and Comparison with Post-Quantum CryptographyQuantum Key Distribution (QKD) is currently being discussed as a technology to safeguard communication in a future where quantum computers compromise traditional public-key cryptosystems. In this paper, we conduct a comprehensive security evaluation of QKD-based solutions, focusing on real-world use cases sourced from academic literature and industry reports. We analyze these use cases, assess their security and identify the possible advantages of deploying QKD-based solutions. We further compare QKD-based solutions with Post-Quantum Cryptography (PQC), the alternative approach to achieving security when quantum computers compromise traditional public-key cryptosystems, evaluating their respective suitability for each scenario. Based on this comparative analysis, we critically discuss and comment on which use cases QKD is suited for, considering factors such as implementation complexity, scalability, and long-term security. Our findings contribute to a better understanding of the role QKD could play in future cryptographic infrastructures and offer guidance to decision-makers considering the deployment of QKD.

OpenSSH 10.0 just landed, now completely removing DSA signature support (you've been warned, repeatedly :-) and finite-field diffie-hellman key exchange. It also enables mlkem768x25519-sha256 as the default kex! (#pqc)

The new version string ("OpenSSH_10.0") is also likely to confuse a bunch of stupid scanners that assume anything starting with "OpenSSH_1" is a 1.x version.

openssh.com/txt/release-10.0

OpenSSL is advancing into the quantum era with the upcoming release of OpenSSL 3.5, integrating post-quantum cryptographic algorithms such as ML-KEM (FIPS 203), ML-DSA (FIPS 204), and SLH-DSA (FIPS 205). This development ensures enhanced security against emerging quantum computing threats. For an in-depth analysis, refer to the article by Prof Bill Buchanan OBE FRSE: medium.com/asecuritysite-when-

ASecuritySite: When Bob Met Alice · No Excuses: OpenSSL Enters the Quantum Age - ASecuritySite: When Bob Met Alice - MediumBy Prof Bill Buchanan OBE FRSE
Continued thread

This is undoubtedly the most promising Post-Quantum TLS deployment situation I have seen for #Tor since we started discussing it more actively in the team. Very exciting!

I hope that OpenSSL 3.5, when released, will make it into #Debian Trixie. That would make deployment of this so much more snappy and easy for the Tor network to upgrade, but that may be dreaming. The timelines here look quite difficult for that to happen, but let's hope.

Continued thread

Lo and behold, #OpenSSL 3.5 (their upcoming LTS release) will come out here at the beginning of April, and it does indeed support some of these hybrid PQC schemes. Their recent beta2 announcement can be read here: openssl-library.org/post/2025- and their roadmap is at openssl-library.org/roadmap/in

Very excited by this work. Big kudos to the OpenSSL Team here! 🥳🎉 Already planning on giving this a spin with the C implementation of #Tor later this week to see how it goes!

OpenSSL Library · OpenSSL 3.5 Beta Release AnnouncementThe OpenSSL Project is pleased to announce that OpenSSL 3.5 Beta1 pre-release is released and adding significant new functionality to the OpenSSL Library.

The NCSC’s advisory deadline of 2035 for organisations to introduce quantum-safe algorithms is too late, according to some industry insiders.

The NCSC’s advisory deadline of 2035 for organisations to introduce quantum-safe algorithms is too late, according to some industry insiders.

computing.co.uk/news/2025/secu

www.computing.co.ukNCSC’s quantum safety deadlines too optimistic say industry insiders‘I’d halve all those numbers’
#ncsc#quantum#pqc