Bas Westerbaan

1K posts

Bas Westerbaan banner
Bas Westerbaan

Bas Westerbaan

@bwesterb

Post-quantum @cloudflare

Nijmegen Katılım Kasım 2006
163 Takip Edilen1.4K Takipçiler
Bas Westerbaan
Bas Westerbaan@bwesterb·
@jedisct1 There is a use for Signal if it’s PQ. there was an RWC talk this year
English
0
0
0
56
Frank
Frank@jedisct1·
Is there interest in key blinding for signature schemes (with possible extensions to ML-DSA)? If so, would it be worth continuing our work on ietf.org/archive/id/dra… ?
English
1
0
1
813
Bas Westerbaan retweetledi
Christopher Patton
Christopher Patton@cjpatton_·
It's gonna be a big year for anonymous credentials. Let's make 'em PQ
English
3
2
14
1.4K
Justin Martin
Justin Martin@thefrozenfire·
@cjpatton_ Verifying any arbitrary signature scheme can be cheap with GROTH16, and it's subversion zero knowledge, but it's not zero knowledge sound.
English
1
0
0
18
Ian Smith
Ian Smith@IanSmith_HSA·
@bwesterb @veorq Reference? It wasn't in the click through or paper. This is still the wrong architecture but a 32 byte 'half' wouldn't be an egregiously bad security flaw. In a manual?
English
1
0
0
30
Ian Smith
Ian Smith@IanSmith_HSA·
Reading the article closely, the vendor is saying they encrypt half a key with PQC and half a key with elliptic curves. The Quantum Attacker will be able to break the elliptical curve portion and then brute force or Grover's the other half. My post attempted to show this is "the wrong way to hybrid."
English
1
0
0
53
Ian Smith
Ian Smith@IanSmith_HSA·
@veorq @bwesterb Half a key is faster to brute force on silicon for the next few decades. It is also possible on distributed workloads and this is very easy to do in parallel on silicon. My point was that they should never allow the possibility to brute force "half" at once.
English
1
0
0
52
Bas Westerbaan
Bas Westerbaan@bwesterb·
@IanSmith_HSA Even if Grover were practical (which it isn't), then your suggested attack doesn't work: in TLS each component of the hybrid contributes its own secret. Without the 32-byte ML-KEM secret, you can't make any progress, even if you do have the ECDH one.
English
0
0
0
14
Lucas
Lucas@rvcas·
@bwesterb Yes I know, it’s just cool to see
English
1
0
2
62
Lucas
Lucas@rvcas·
AWS giving interesting warnings now
Lucas tweet media
English
1
0
22
1.4K
Bas Westerbaan retweetledi
sam rhea
sam rhea@LakeAustinBlvd·
just one click to see who is post-quantum secure (and who is not) now in Cloudflare Radar
sam rhea tweet media
English
1
7
20
1.3K
Bas Westerbaan retweetledi
Parisa Tabriz
Parisa Tabriz@laparisa·
We’re continuing our work in @googlechrome to build safe, efficient post-quantum crypto on the web (10 years strong!) & now testing HTTPS using Merkle Tree Certificates (MTCs). Thanks for the collab @bwesterb @cloudflare! More details in goo.gle/3MSAYnS 🕸️🔒🌲
English
11
24
69
4.2K
Bas Westerbaan retweetledi
Wall St Engine
Wall St Engine@wallstengine·
$GOOGL is testing quantum-resistant HTTPS in Chrome using Merkle Tree Certificates, to protect certificate validation from future quantum attacks without blowing up certificate sizes. Cloudflare $NET is partnering on live trials, and Google is targeting broader CA rollout by 2027
Wall St Engine tweet media
English
12
60
368
38.7K
Jordy
Jordy@KreizJordy·
@wallstengine Didnt expect $GOOG and $NET to partner
English
1
0
1
360
Solix Trading
Solix Trading@Solix_Trade·
@wallstengine Wow, this is actually pretty cool. Using Merkle Trees to future-proof HTTPS is smart, and keeping the certs small is key. Curious to see how it performs in the wild.
English
1
0
1
137