CIRCL
falcon.py
CIRCL | falcon.py | |
---|---|---|
6 | 21 | |
1,182 | 135 | |
1.9% | - | |
8.0 | 0.0 | |
7 days ago | 18 days ago | |
Go | Python | |
GNU General Public License v3.0 or later | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
CIRCL
-
Lattice Asymetric Encryption
- https://github.com/cloudflare/circl
- Circl: Cloudflare Interoperable Reusable Cryptographic Library
-
Is the reference implementation of Classic McEliece in the NIST submission the only good source available for developers out there? General post-quantum questions.
I'm not sure if portability, speed, or general security is on require level here, but Cloudflare's CIRCL library is working on adding support for McEliece, you can find the implementation PR at https://github.com/cloudflare/circl/pull/378
- NIST post-quantum picks Kyber and Dilithium in Go
- NIST announces PQC-algoritms to be standardized
-
Hertzbleed Attack
The attack in question was only tested on SIKE, so it seems logical to start targeted disclosure on the community using and developing it, while using the general disclosures to target the broader cryptographic community.
Both Cloudflare and Microsoft are one of the few companies that have put significant investments into developing SIKE for post-quantum cryptography. Microsoft has a SIKE research team, and Cloudflare has been exploring SIKE for post-quantum TLS for years.
Both companies also maintain the key open-source implementations of SIKE [1][2], and Microsoft is spearheading the effort to standardize SIKE through NIST. Most open source cryptographic libraries don't implement SIKE.
[1]: https://github.com/cloudflare/circl
falcon.py
-
A Practical Approach to Quantum-Resistant JWTs
As the field of quantum computing advances, the need for cryptographic systems that can withstand quantum attacks becomes increasingly critical. The jwt-falcon library addresses this challenge by integrating the Falcon algorithm, a prominent candidate in the NIST Post-Quantum Cryptography competition, into JSON Web Token (JWT). Falcon is designed to offer security against the potential capabilities of future quantum computers. For detailed information on the Falcon algorithm, visit Falcon-sign.info. Under the hood, jwt-falcon utilizes the Falcon-crypto package, a dedicated implementation of the Falcon algorithm for JavaScript environments.
-
I've been in Algorand for over two years now. Bought many at $2.00 and all the way down. It has been a rough bear market but the fundamentals have only gotten stronger. I'm extremely optimistic about the future. Algorand is still a best in class block chain. Tech will matter eventually.
From the Falcon Keys website:
-
Microsoft expects to build a quantum supercomputer within 10 years
At the rate quantum computing is developing, the issue of quantum readiness can't be ignored much longer by the cryptosphere. No other blockchain has a team that understands the problem and solution set better than Algorand; they are literally writing the papers that NIST standards are based on . It's going to matter.
- Cryptocurrencies II: Last Week Tonight with John Oliver (HBO)
-
Ask HN: Won’t quantum computing destroy most (if not all) crypto?
There are already post-quantum cryptographic algorithms already in existence.
One of the candidates is Falcon [0] proposed by the creators of Algorand.
[0] https://falcon-sign.info
-
Quantum computing
Falcon
-
Quantum Threat to Cryptocurrencies Explained [SERIOUS]
Algorand has actually already been upgraded with FALCON-based keys, which is not surprising given the fact tthat FALCON is actually based on the theoretical framework developed by Algorand's Craig Gentry, Chris Peikert, and Vinod Vaikuntanathan.
-
Academic cryptographer posted this to r/cc. Isn't aware of Algorand. -> Quantum Threat to Cryptocurrencies Explained [SERIOUS]
Algorand's Craig Gentry, Chris Peikert, and Vinod Vaikuntanathan developed the theoretical framework that Falcon, one of NIST's four approved quantum-hardened encryption algorithms, is based on.
- To endure into the future, Algorand believes that the protocol must be secure against potential post-quantum attacks, while also being able to interoperate and exchange with other blockchain networks. Listen to Algorand head of cryptography Chris Peikert discuss State Proofs and Quantum Security.
-
Interview about Post-Quantum (Cryptography)
For signing Algorand uses Falcon signatures, which are post quantum and one of NISTs recommendations. There are a few names there that might help. https://falcon-sign.info/
What are some alternatives?
kyber
falcon-cli - post-quantum file sigs
liboqs-go - Go bindings for liboqs
falcon
yubisigner - YubiSigner provides a convenient way to sign and securely verify file signatures with Yubico YubiKey, utilizing an organization's PKI infrastructure.
cryptography - cryptography is a package designed to expose cryptographic primitives and recipes to Python developers.
curve25519-voi - High-performance Curve25519/ristretto255 for Go.
kyber-py - A pure python implementation of CRYSTALS-Kyber
PQCrypto-SIKE - This software is part of "Supersingular Isogeny Key Encapsulation", a submission to the NIST Post-Quantum Standardization project.
secp256k1-voi - High assurance Go secp256k1 (Mirror)
ada-spark-rfcs - Platform to submit RFCs for the Ada & SPARK languages