kyber
Selenite
kyber | Selenite | |
---|---|---|
6 | 5 | |
689 | 23 | |
2.2% | - | |
5.1 | 0.0 | |
4 months ago | over 2 years ago | |
C | Rust | |
GNU General Public License v3.0 or later | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
kyber
-
Quantum Computers Break Encryption in China But Far From Cracking Bitcoin
I wouldn’t even be worried about the banks, any mode of encryption used for data would be at stake, but there’s already some algos that are quantum secure made by Crystal Kyber. Here’s their git repo: https://github.com/pq-crystals/kyber.git
-
NSA, NIST, and post-quantum cryptography
So, question then, isn't one of the differences between this time's selection, compared to previous selections, that some of the algorithms are open source with their code available.
For example, Kyber, one of the finalists, is here: https://github.com/pq-crystals/kyber
And where it's not open source, I believe in the first round submissions, everyone included reference implementations.
Does the code being available make it easy to verify whether there are some shady/shenanigans going on, even without NIST's cooperation?
-
NIST Announces First Four Quantum-Resistant Cryptographic Algorithms
The C reference code is available: https://github.com/pq-crystals/kyber
- NIST announces PQC-algoritms to be standardized
- Kyber key encapsulation mechanism (Post Quantum Cryptography Standardization)
Selenite
- Selenite - A Post-Quantum Cryptography and Digital Certificate Library Written In Rust
- r/crypto - Selenite: A Post-Quantum Cryptography Library For Digital Certificates Written In Rust
-
Selenite: A Post-Quantum Cryptography Library For Digital Certificates Written In Rust
[Repo] | [Docs] | [Examples] | Selenite By @AtropineTears (with OpenNightshade)
-
What's everyone working on this week (38/2021)?
You can check out my project here
What are some alternatives?
minisign - A dead simple tool to sign files and verify digital signatures.
diamond-types - The world's fastest CRDT. WIP.
openssl - Fork of OpenSSL 1.1.1 that includes prototype quantum-resistant algorithms and ciphersuites based on liboqs [OQS-OpenSSL 1.1.1 is NO LONGER SUPPORTED, please switch to OQS-Provider for OpenSSL 3]
bubbles - TUI components for Bubble Tea 🫧
mbedTLS - An open source, portable, easy to use, readable and flexible TLS library, and reference implementation of the PSA Cryptography API. Releases are on a varying cadence, typically around 3 - 6 months between releases.
reverie - An efficient and generalized implementation of the IKOS-style KKW proof system (https://eprint.iacr.org/2018/475) for arbitrary rings.
libsodium - A modern, portable, easy to use crypto library.
bitsock - Safe Rust crate for creating socket servers and clients with ease.
s2n - An implementation of the TLS/SSL protocols
Tink - Tink is a multi-language, cross-platform, open source library that provides cryptographic APIs that are secure, easy to use correctly, and hard(er) to misuse.
falcon
moonlight - moonlight is a reverse port forwarding tool written by python