fosstodon.org is one of the many independent Mastodon servers you can use to participate in the fediverse.
Fosstodon is an invite only Mastodon instance that is open to those who are interested in technology; particularly free & open source software. If you wish to join, contact us for an invite.

Administered by:

Server stats:

10K
active users

#nist

15 posts15 participants1 post today

#NIST chose #HQC as their backup KEM and elected not to standardize #ClassicMcElice for now among other reasons pointing to the standardization with #ISO.

The argument to choose HQC over Bike is a higher confidence in IND-CCA-security of HQC. I cannot comment on whether that is a reasonable assessment, though I have no reason to doubt it, but I can say that in terms of reasons to make a choice this is of course a pretty good one.

I’m not sure how I think about the decision regarding McElice, but I can to an extend see where they are coming from.

This means there are now
9 post quantum algorithms approved, standardized or chosen for standardization by generally respected organizations:

Key Encapsulation Mechanisms (“KEMs”):

* ML-KEM (“Kyber”), based on Lattices, standardized by NIST

* HQC, based on Codes, chosen for standardization by NIST

* Classic McElice, based on codes, approved by BSI (de), ANSSI(fr), and NCSC (nl)

* Frodo, based on lattices, approved by BSI (de), ANSSI(fr), and NCSC (nl)

Signatures:

* ML-DSA (“Dilithium”), based on Lattices, standardized by NIST

* SLH-DSA (“SPHINCS+”), based on hashes, standardized by NIST

* FN-DSA (“Falcon”), based on lattices, chosen for standardization by NIST

Stateful Signatures:

* XMSS, based on hashes, standardized by IEEE

* LMS, based on hashes, standardized by IEEE

Overall, this looks like a decent portfolio. Future standardization might add schemes based on multivariate-equations and isogonies, but for now this should do and give us a basis from which we can design more efficient schemes without being to concerned about the entire ground suddenly giving in because one random guy/gal finds a new attack-vector.

#postquantumcryptography #PQC #PQCrypto

Quantum leap: Passwords in the new era of computing security

It’s more a case of building stronger locks to protect our important data and resources, rather than removing the locks altogether. By creating longer, more complex passwords built on greater sizes of hash keys, passwords will be more secure against attacks, even against quantum computing.

#NIST #quantum #quantumcomputing #encryption #passwords #security #cybersecurity #technology #tech #science

bleepingcomputer.com/news/secu

BleepingComputerQuantum leap: Passwords in the new era of computing security
More from Lawrence Abrams

Via a ridiculous path including an off-the-books meeting with a #NIST staffer comes news of a clever hack being perpetrated by the PFYs now running the US Department of Commerce.

DoC is not allowing certain notices from subsidiary organizations to be published in the Federal Register. Advisory committees to such as NIST must publish notice of meetings in order to follow the law.

Ergo, no meetings are possible, meaning not only cessation of work but that committees will die as terms expire.

Continued thread

Update. The American Physical Society (#APS, @apsphysics) is running a survey on the impact of cuts to US science #funding. Please take it if you're affected or likely to be affected.
apsphysics.fillout.com/t/6ESUv

"This survey collects stories showcasing the transformative positive impact of #NSF, #NIST, #DOE, #NASA, and #DOD-funded research and programs as well as what would be lost if support for basic research evaporates. You can document your experiences and share how recent executive actions have impacted you. Individual stories will be only be used publicly with permission or when fully anonymized."

Impacts of Federal Science FundingImpacts of Federal Science FundingMade with Fillout, the best way to make forms, surveys and quizzes your audience will answer.