3 January 2019
Bulletproof TLS Newsletter is a free periodic newsletter bringing you commentary and news surrounding SSL/TLS and Internet PKI, designed to keep you informed about the latest developments in this space. Received monthly by more than 50,000 subscribers. Written by Hanno Böck.
Quantum computers have the potential of compromising the security of almost all public key encryption systems in use today. This has led to discussions in the TLS community on how to face this threat.
Google developer Adam Langley announced that Google soon will deploy a new TLS key exchange method called CECPQ2 (combined elliptic curve and postquantum key exchange). It uses a combination of the classic X25519 elliptic curve key exchange and a variant of the HRSS key exchange.
HRSS is one of the submissions of the NIST postquantum cryptography competition and a variant of the NTRU algorithm. However, Google will use a variation of HRSS that includes an improvement that avoids the occasional rare failures in the original scheme.
Google started testing a postquantum key exchange in 2016 using the NewHope algorithm; the key exchange was named CECPQ1. But this was only a temporary experiment that ended a few months later.
This subscription is just for the newsletter; we won't send you anything else.
Designed by Ivan Ristić, the author of SSL Labs, Bulletproof TLS and PKI, and Hardenize, our course covers everything you need to know to deploy secure servers and encrypted web applications.
Remote and trainer-led, with small classes and a choice of timezones.
Join over 1,500 students who have benefited from more than a decade of deep TLS and PKI expertise.