Photo by Nicolas Thomas on Unsplash

Experimenting with Post Quantum Cryptography (PQC) … The Greatest Change in the Internet Has Started…

--

As you may know, we need to replace all our existing public key methods with methods that are quantum robust. One company at the forefront of pushing forward cryptographic methods is Cloudflare. In fact, their CIRCL library already contains Kyber, SIDH, and Frodo:

  • Kyber Key Exchange. Kyber. In this case, we will implement Kyber512, Kyber738 and Kyber1024, in order to create a quantum-robust key exchange.
  • Kyber, SIKE and Hybrid Key Exchange. Hybrid.
  • SIDH using Cloudflare. SIDH. Post-quantum key exchange.
  • SIKE Secret Shares with Go. SIKE. Post-quantum key exchange with key encapsulation.
  • CSIDH Go. CSIDH. Post-quantum key exchange.
  • SIKE Key Exchange. SIKE.
  • Frodo. Frodo. Frodo KEM is based on the learning with errors (LWE) problem.

A core part of security on the Internet is the key exchange mechanism that happens every time we connect to a website. This is where an encryption key is negotiated between the client and the server. Unfortunately, most of the existing key exchanges on the Internet use ECDH (Elliptic Curve Diffie Hellman), and would could be cracked by quantum computers.

--

--

Prof Bill Buchanan OBE FRSE
ASecuritySite: When Bob Met Alice

Professor of Cryptography. Serial innovator. Believer in fairness, justice & freedom. Based in Edinburgh. Old World Breaker. New World Creator. Building trust.