Get the latest tech news

NSA and IETF: Can an attacker purchase standardization of weakened cryptography?


's normal for post-quantum cryptography to be rolled out as an extra layer of security on top of traditional pre-quantum cryptography, rather than as a replacement. For example, Google's CECPQ1 experiment was double encryption with traditional pre-quantum ECC (specifically X25519) and post-quantum NewHope1024.

None

Get the Android app

Or read this on Hacker News

Read more on:

Photo of nsa

nsa

Photo of IETF

IETF

Related news:

News photo

Broadcom fixes high-severity VMware NSX bugs reported by NSA

News photo

FRA Kills High-Speed Maglev Project Citing “Unresolvable” Conflicts With NSA, NASA, and DoD

News photo

‘I nearly died after flying thousands of miles to install a power cord for the NSA’