CIRCL
kyber
CIRCL | kyber | |
---|---|---|
6 | 6 | |
1,182 | 689 | |
1.9% | 2.2% | |
8.0 | 5.1 | |
7 days ago | 4 months ago | |
Go | C | |
GNU General Public License v3.0 or later | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
CIRCL
-
Lattice Asymetric Encryption
- https://github.com/cloudflare/circl
- Circl: Cloudflare Interoperable Reusable Cryptographic Library
-
Is the reference implementation of Classic McEliece in the NIST submission the only good source available for developers out there? General post-quantum questions.
I'm not sure if portability, speed, or general security is on require level here, but Cloudflare's CIRCL library is working on adding support for McEliece, you can find the implementation PR at https://github.com/cloudflare/circl/pull/378
- NIST post-quantum picks Kyber and Dilithium in Go
- NIST announces PQC-algoritms to be standardized
-
Hertzbleed Attack
The attack in question was only tested on SIKE, so it seems logical to start targeted disclosure on the community using and developing it, while using the general disclosures to target the broader cryptographic community.
Both Cloudflare and Microsoft are one of the few companies that have put significant investments into developing SIKE for post-quantum cryptography. Microsoft has a SIKE research team, and Cloudflare has been exploring SIKE for post-quantum TLS for years.
Both companies also maintain the key open-source implementations of SIKE [1][2], and Microsoft is spearheading the effort to standardize SIKE through NIST. Most open source cryptographic libraries don't implement SIKE.
[1]: https://github.com/cloudflare/circl
kyber
-
Quantum Computers Break Encryption in China But Far From Cracking Bitcoin
I wouldn’t even be worried about the banks, any mode of encryption used for data would be at stake, but there’s already some algos that are quantum secure made by Crystal Kyber. Here’s their git repo: https://github.com/pq-crystals/kyber.git
-
NSA, NIST, and post-quantum cryptography
So, question then, isn't one of the differences between this time's selection, compared to previous selections, that some of the algorithms are open source with their code available.
For example, Kyber, one of the finalists, is here: https://github.com/pq-crystals/kyber
And where it's not open source, I believe in the first round submissions, everyone included reference implementations.
Does the code being available make it easy to verify whether there are some shady/shenanigans going on, even without NIST's cooperation?
-
NIST Announces First Four Quantum-Resistant Cryptographic Algorithms
The C reference code is available: https://github.com/pq-crystals/kyber
- NIST announces PQC-algoritms to be standardized
- Kyber key encapsulation mechanism (Post Quantum Cryptography Standardization)
What are some alternatives?
liboqs-go - Go bindings for liboqs
minisign - A dead simple tool to sign files and verify digital signatures.
yubisigner - YubiSigner provides a convenient way to sign and securely verify file signatures with Yubico YubiKey, utilizing an organization's PKI infrastructure.
openssl - Fork of OpenSSL 1.1.1 that includes prototype quantum-resistant algorithms and ciphersuites based on liboqs [OQS-OpenSSL 1.1.1 is NO LONGER SUPPORTED, please switch to OQS-Provider for OpenSSL 3]
falcon.py - A python implementation of the signature scheme Falcon
mbedTLS - An open source, portable, easy to use, readable and flexible TLS library, and reference implementation of the PSA Cryptography API. Releases are on a varying cadence, typically around 3 - 6 months between releases.
curve25519-voi - High-performance Curve25519/ristretto255 for Go.
Selenite - An Experimental Rust Crate for Post-Quantum Code-Signing Certificates.
PQCrypto-SIKE - This software is part of "Supersingular Isogeny Key Encapsulation", a submission to the NIST Post-Quantum Standardization project.
libsodium - A modern, portable, easy to use crypto library.
secp256k1-voi - High assurance Go secp256k1 (Mirror)
s2n - An implementation of the TLS/SSL protocols