The third Post-Quantum Cryptography (PQC) Conference, by the The PKI Consortium, will take place on January 15-16, 2025, at the Thompson Conference Center, University of Texas at Austin, USA. Discover the latest…
Category: quantum-safe cryptography
NIST Initial Public Draft: Transition to Post-Quantum Cryptography Standards
NIST’s initial public draft outlines their planned approach for transitioning from quantum-vulnerable cryptographic algorithms to post-quantum digital signature algorithms and key-establishment schemes. As NIST states in the introduction, all impacted organizations are…
New hybrid post-quantum key exchange algorithm on OpenSSH 9.9
The latest release of OpenSSH includes a hybrid post-quantum key exchange method called “mlkem768x25519-sha256.” This algorithm combines the recently standardized FIPS 203 Module-Lattice Key Encapsulation Mechanism (ML-KEM) with ECDH using the X25519…
First quantum cyberattack could happen by 2030s
IBM anticipates that advancements in quantum computing could result in the first quantum cyberattack, known as Q-Day, within the next decade. According to Antti Ropponen, an executive partner and leader in data…
NIST releases final quantum resistant encryption algorithms
The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) has finalized its primary set of encryption algorithms designed to resist quantum computer-based cyberattacks. As we get nearer to Y2Q,…
Sparkle and Arqit announce first quantum-safe IPSec Tunnel
Sparkle, Italy’s leading international service provider, and Arqit Quantum Inc., a company specializing in quantum-safe encryption, have announced the successful completion of a Proof of Concept (PoC) for the first Internet Protocol…
Zoom add post-quantum end-to-end encryption
Zoom announce they have added post-quantum end-to-end encryption (E2EE) to Zoom Workplace, using the Kyber 768 key encapsulation method, and claim to be the first UCaaS company to offer a post-quantum E2EE…
New polynomial time quantum algorithm for lattice problems
A new paper by Yilei Chen on eprint presents a polynomial time quantum algorithm that can solve the Learning with Errors (LWE) problem, which is significant due to its connections to lattice…
Apple announces a major cryptographic security update for iMessage
Apple have announced a new messaging protocol called PQ3, a major cryptographic security update for iMessage. This new protocol, described as the first of its kind to achieve Level 3 security, offers…
U.S. and China race to conceal secrets from quantum computers
Kunz informed the committee that there is an ongoing worldwide initiative to gather data, aimed at deciphering intercepted communications following Q-day, and characterized this strategy as “harvest now, decrypt later” attacks, based…