Objects in the quantum mirror are closer than they appear.
https://blog.google/innovation-and-ai/technology/safety-security/cryptography-migration-timeline/
| Website | https://davidben.net |
Objects in the quantum mirror are closer than they appear.
https://blog.google/innovation-and-ai/technology/safety-security/cryptography-migration-timeline/
New blog post: ML-KEM Mythbusting.
Due to reasons.
Here's something I am very excited about: Photosynthesis! 🌱☀️
A proposal to have CAs run transparency logs and make X.509 certificates out of Merkle Tree inclusion proofs.
This is similar to how CT would have worked in an ideal world, and it solves the problem of PQC signature sizes in logs and handshakes.
https://mailarchive.ietf.org/arch/msg/tls/6jqhUVz58s4ZgsZ8HvuZftncT9A/
A very nice summary by the Let's Encrypt folks of where the Certificate Transparency ecosystem is going with Sunlight and the Static CT API.
On a personal note, this has been some of my highest leverage work, and it's been possible in part because I had the independence to drop everything and pursue it when it became clear that the CT ecosystem was at risk.
I remember the day: I woke up to Cloudflare's outage and started https://filippo.io/a-different-CT-log.
https://letsencrypt.org/2025/06/11/reflections-on-a-year-of-sunlight/
The Sunlight CT log Previously “A different kind of CT log” or “The $4k log” Filippo Valsorda <[email protected]>Created: 6 November 2023 | Updated: 13 March 2024https://filippo.io/a-different-CT-log This is a design document for a radically cheaper and easier to operate Certificate Transpa...
Here's something counterintuitive to non-practitioners: curve P-521 is often less secure in practice than curve P-256.
The latter is more popular, and so better tested. The risk of implementation bugs dwarfs the risk of partial cryptanalysis of ECC, so picking P-521 optimizes for the wrong thing.