Making protocols post-quantum
The blog discusses the transition of cryptographic protocols to post-quantum security in response to the potential threat posed by quantum computers. It delves into the challenges faced when upgrading TLS, a widely deployed protocol, to be resistant against quantum computing attacks. The focus is on the choice between fast and small cryptographic algorithms for key exchange and signature schemes. The blog also explores the possibility of using key exchange not just for confidentiality but also for authentication, which could lead to more efficient post-quantum TLS handshakes. It emphasizes that the transition to post-quantum cryptography might require a fresh look at the desired characteristics of protocols and their constraints.
Company
Cloudflare
Date published
Feb. 23, 2022
Author(s)
Thom Wiggers
Word count
2094
Language
English
Hacker News points
5