“Mythos Preview identified a number of weaknesses in the world’s most popular cryptography libraries, in algorithms and protocols like TLS, AES-GCM, and SSH. These bugs all arise due to oversights in the respective algorithms’ implementation that allows an attacker to (for example) forge certificates or decrypt encrypted communications.”

This new leap in the intersection of AI and cryptography is going to further raise the urgency on both adoption of #PQC and on crypto agility broadly. Orgs are going to be doing a LOT of patching and changes in this area the next few years.

https://red.anthropic.com/2026/mythos-preview/

Claude Mythos Preview \ red.anthropic.com

A quantum risk Q&A - your questions answered

Quantum computing’s threat to encryption is - conceptually at least – very simple. One day, perhaps quite soon, a quantum computer may be able to ...

This is soo funny: Synthesized voices of US presidents talking about nerdy details of: "Standardizing Pure PQC"
(the title of the Edpisode) of the Podcast: https://securitycryptographywhatever.com

#PQC #securitycryptographywhatever #podcast

Media file: https://www.buzzsprout.com/1822302/episodes/18819288-standardizing-pure-pqc.mp3

Security Cryptography Whatever

TL;DR: OpenSSH has since version 9.0 PQC kx enabled. Use it!

You might want to check the key exchange algos for SSH, if you had hardened them on the client or server side like years back -- unless you want your ssh sessions be vulnerable to "store now, decrypt later" attacks .

Only newer #OpenSSH clients (>10.1) issue a warning if the kx is not #PQC safe.

https://www.openssh.org/pq.html

(ssh -v , look for "kex: algorithm ")

量子算法最近的大進展

看到 Cloudflare 決定將 post-quantum security 的計畫提前到 2029 年的消息:「Cloudflare targets 2029 for full post-quantum security」,主要是最近有兩個不同團隊的大進展。 一個是 Google 的進展:「Safeguarding cryptocurrency by disclosing quantum vulnerabilitie...

Gea-Suan Lin's BLOG
interesting to compare #PQC adoption rate at the edge (between browsers and CDNs) and the origin (between CDNs and backend webservers). it's almost an order of magnitude difference. https://radar.cloudflare.com/post-quantum?dateRange=7d

The road to post-quantum cryptography (PQC) has been long, but the end is nigh.

For the past nine months we’ve been working on technical debt issues in hockeypuck, resulting in the 2.3.x series of releases. This has included a major postgres schema redesign, in-place reloading, reindexing threads, configurable keyword search, and significant refactoring of hockeypuck’s internals. v2.3.3 is in final testing with the last of these improvements, and will be released soon.

But this is all just prep.

The goal is version 2.4, which will distribute v6 PGP keys, which support post-quantum algorithms for both encryption and signing. 2026 is the year of PQC in PGP, and the hockeypuck keyservers will be ready.

To enable the safe distribution of v6/PQC keys without breaking legacy software, we have developed an updated version of the venerable HKP API (for which HocKeyPuck is named). v1 and v2 HKP will be supported in parallel, but v6/PQC keys will only be distributed over v2.

HKPv2 is specified in https://datatracker.ietf.org/doc/html/draft-gallagher-openpgp-hkp and server implementation is underway in https://github.com/hockeypuck/hockeypuck/tree/feature/hkpv2 .

If you maintain PGP client software and wish to be PQC ready, now is the time to check out HKPv2 and what it means for your users. Join the discussion at https://groups.google.com/g/hockeypuck-devel

Hockeypuck v2.4 development is kindly supported by @NGIZero Core.

#openpgp #pgp #gnupg #pqc

OpenPGP HTTP Keyserver Protocol

This document specifies a series of conventions to implement an OpenPGP keyserver using the Hypertext Transfer Protocol (HTTP). As this document is a codification and extension of a protocol that is already in wide use, strict attention is paid to backward compatibility with these existing implementations.

IETF Datatracker

Cloudflare aims for full post-quantum security by 2029, including authentication across all services. Current post-quantum encryption protects most traffic, but PQ-vulnerable keys must be retired to prevent downgrade attacks. 🔐

@cloudflare

🔗 https://blog.cloudflare.com/post-quantum-roadmap/

#TechNews #Cloudflare #PostQuantum #PQC #CyberSecurity #Encryption #Privacy #FOSS #OpenSource #InternetSecurity #DataProtection #QuantumComputing #WebSecurity #InfoSec #DigitalSafety

Cloudflare targets 2029 for full post-quantum security

Recent advances in quantum hardware and software have accelerated the timeline on which quantum attack might happen. Cloudflare is responding by moving our target for full post-quantum security to 2029.

The Cloudflare Blog

the same config from the above post should also work on debian 13 (trixie) and higher, as that ships with OpenSSL 3.5.1 by default as well: https://distrowatch.com/table.php?distribution=debian

#Debian #Debian13 #Linux #Apache #OpenSSL #PQC

DistroWatch.com: Debian

News and feature lists of Linux and BSD distributions.

looks like you can enable post quantum cryptography in apache on @almalinux 9 and up with one simple config change1

with the ssl config generated by mozilla's tool2 change the line:

SSLOpenSSLConfCmd Curves X25519:prime256v1:secp384r1

to:

SSLOpenSSLConfCmd Curves X25519MLKEM768:X25519:prime256v1:secp384r1

and restart the httpd service with sudo systemctl restart httpd, that's it! (a reload may work as well and you wouldn't have any service downtime, but i'm not certain, i would have to test it)

AlmaLinux 9 ships with OpenSSL 3.5.1 by default3 , so you should be all set for PQC

1 https://brnrd.eu/security/2025-03-22/openssl-35-is-pqc-enabled-and-an-lts-release.html
2 https://ssl-config.mozilla.org/#server=apache&version=2.4.62&config=modern&openssl=3.5.0&guideline=5.7
3 https://distrowatch.com/table.php?distribution=alma

#AlmaLinux #AlmaLinux9 #Linux #Apache #OpenSSL #PQC

OpenSSL 3.5 is PQC enabled, and an LTS release.

OpenSSL 3.5 is soon to be released, and brings new Post-Quantum Cryptographic protocols.

brnrd - Bernard Spil