29 August 2024
Feisty Duck’s Cryptography & Security Newsletter is a periodic dispatch bringing you commentary and news surrounding cryptography, security, privacy, SSL/TLS, and PKI. It's designed to keep you informed about the latest developments in this space. Enjoyed every month by more than 50,000 subscribers. Written by Ivan Ristić.
The US National Institute of Standards and Technology (NIST) released its first three post-quantum cryptography (PCQ) standards earlier this month, on August 13, 2024. This release marks the first official results of the public competition that started eight years ago. Out of the three standards, one (ML-KEM, based on Kyber) is for key agreement, and the other two (ML-DSA and SLH-DSA) are for digital signatures. Another standard, which will be called FN-DSA, is expected by the end of the year. Because this type of encryption is fairly new, further backup standards are planned. For more details, read a blog post on the topic from Cloudflare.
If you haven’t been following the progress of PQC over the past eight years, clearly now is a good time to catch up and understand why we’re rushing to adopt new algorithms despite—so far as we know—there not being a working quantum computer.
To start, we need to understand that a lot of cryptography we use today is based on mathematical problems that we don’t know how to break using today’s best algorithms and technology. However, if someone invented a new algorithm, all hell would break loose. In fact, we already know about two algorithms that would break or significantly weaken today’s cryptography: Shor’s algorithm for public key encryption and Grovers’s algorithm for private key encryption. The catch is that they need quantum computers to work, and we don’t yet know how to build those.
If no one has a quantum computer, then what’s the rush? First, due to the potential for catastrophic breakage, it’s better to be early than late. Second, a lot of encryption has to survive for decades, and some believe that a working quantum computer is a couple of decades away. Thus, if you’re protecting serious secrets, you want to start using PQC now so that you remain secure for the foreseeable future. This is especially true for key agreement, which is why the industry has been testing Kyber with TLS even before the standardization.
In essence, there is no drama. The engineering community is doing its job to make sure “nothing happens,” in the same way that nothing happened as our calendars reached the year 2000, when the first working quantum computer is announced—or when an advanced alien civilization visits our planet and laughs at the state of our cryptography.
This subscription is just for the newsletter; we won't send you anything else.
Here are some things that caught our attention since the previous newsletter:
Designed by Ivan Ristić, the author of SSL Labs, Bulletproof TLS and PKI, and Hardenize, our course covers everything you need to know to deploy secure servers and encrypted web applications.
Remote and trainer-led, with small classes and a choice of timezones.
Join over 2,000 students who have benefited from more than a decade of deep TLS and PKI expertise.