La cryptographie post-quantique anticipe les ordinateurs quantiques

La cryptographie post-quantique anticipe les ordinateurs quantiques

La revue européenne des médias et du numérique
La cryptographie post-quantique anticipe les ordinateurs quantiques

La cryptographie post-quantique anticipe les ordinateurs quantiques

La revue européenne des médias et du numérique
The Impact of Quantum Computing on Cryptography (2025).

This article takes a view point on current status of Cryptography and Post Quantum Cryptography in year 2025.

Aliyesha
OpenSSH and Git on a Post-Quantum SPHINCS+ – Simon Josefsson's blog

NIST Releases Four PQC Algorithms For Standardization https://thequantuminsider.com/?p=2358057 #National #Research #CRYSTALSKyber #CRYSTALS–Dilithium #falcon #National_Institute_for_Standards_and_Technology #NIST #postquantum_cryptography #PostQuantum_Cryptography_Initiative #SPHINCS+ #quantumdaily Insider Brief NIST selected four algorithms it will standardize as a result of the Post-Quantum Cryptography (PQC) Standardization Process: CRYSTALS–KYBER, along with three digital signature schemes:
NIST Releases Four PQC Algorithms For Standardization

NIST announces it selected four algorithms it will standardize as a result of the PQC Standardization Process.

The Quantum Insider
Earlier this week me and the team released #SignServer Community 6.0 with additional Post Quantum support, new REST interface and tons of maintenance under the hood. #OpenSource #DigitalSignatures #CodeSigning #PKI #PQC #Dilithium #SPHINCS https://www.signserver.org/resources/signserver-community-6-is-released/
SignServer Community 6 is released - Signserver

We are pleased to announce the release of SignServer Community 6. This release introduces a REST interface and Post-Quantum Readiness with support for Dilithium and SPHINCS+ candidate algorithms. The release also brings technology upgrades including support for Java 17. Release highlights REST Interface – SignServer Community 6 includes a REST interface for signing operations. Post-Quantum […]

Signserver

A. Genêt, "On Protecting SPHINCS+ Against Fault Attacks"¹

SPHINCS+ is a hash-based digital signature scheme that was selected by NIST in their post-quantum cryptography standardization process. The establishment of a universal forgery on the seminal scheme SPHINCS was shown to be feasible in practice by injecting a fault when the signing device constructs any non-top subtree. Ever since the attack has been made public, little effort was spent to protect the SPHINCS family against attacks by faults. This paper works in this direction in the context of SPHINCS+ and analyzes the current algorithms that aim to prevent fault-based forgeries.

First, the paper adapts the original attack to SPHINCS+ reinforced with randomized signing and extends the applicability of the attack to any combination of faulty and valid signatures. Considering the adaptation, the paper then presents a thorough analysis of the attack. In particular, the analysis shows that, with high probability, the security guarantees of SPHINCS+ significantly drop when a single random bit flip occurs anywhere in the signing procedure and that the resulting faulty signature cannot be detected with the verification procedure. The paper shows both in theory and experimentally that the countermeasures based on caching the intermediate W-OTS+s offer a marginally greater protection against unintentional faults, and that such countermeasures are circumvented with a tolerable number of queries in an active attack. Based on these results, the paper recommends real-world deployments of SPHINCS+ to implement redundancy checks.

#IACR #ResearchPapers #SPHINCS+ #FaultAttacks #PQSignatures

__
¹ https://eprint.iacr.org/2023/042

On Protecting SPHINCS+ Against Fault Attacks

heise+ | Von der NIST standardisiert: Vier Post-Quanten-Kryptoalgorithmen erklärt

Die US-Behörde NIST hat vier Post-Quanten-Kryptoalgorithmen zur Standardisierung ausgewählt. Die IT-Welt muss sich nun mit diesen Methoden vertraut machen.
Von der NIST standardisiert: Vier Post-Quanten-Kryptoalgorithmen erklärt
Von der NIST standardisiert: Vier Post-Quanten-Kryptoalgorithmen erklärt

Die US-Behörde NIST hat vier Post-Quanten-Kryptoalgorithmen zur Standardisierung ausgewählt. Die IT-Welt muss sich nun mit diesen Methoden vertraut machen.

heise online

Van apareciendo los primeros estándares de criptografía post-cuántica del #NIST!

#kyber para cifrado, #Dilithium, #Falcon y #SPHINCS+ para auth y firma digital.

La computación cuántica cada vez más lejos de ser una amenaza a la criptografía moderna :-)

https://www.helpnetsecurity.com/2022/07/06/quantum-resistant-encryption/

NIST selects 4 quantum-resistant encryption algorithms - Help Net Security

NIST has chosen the first group of quantum-resistant encryption tools, designed to withstand the assault of a future quantum computer.

Help Net Security

Datensicherheit: Grazer Experten haben bei US-Standards Hand im Spiel

Amerikanische NIST präsentierte quantencomputersichere Verschlüsselungsalgorithmen – TU-Institut trug zum post-quanten-Algorithmus #SPHINCS+ bei

https://www.derstandard.at/story/2000137343917/datensicherheit-grazer-experten-haben-bei-us-standards-hand-im-spiel?ref=rss

Datensicherheit: Grazer Experten haben bei US-Standards Hand im Spiel

Amerikanische NIST präsentierte quantencomputersichere Verschlüsselungsalgorithmen – TU-Institut trug zum post-quanten-Algorithmus SPHINCS+ bei

DER STANDARD