Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Google has devised a means for securing HTTPS certificates against quantum computing attacks without massive performance hits stemming from the considerably longer size of data required to be included.

Google has devised a means for securing HTTPS certificates against quantum computing attacks without massive performance hits stemming from the considerably longer size of data required to be included.

Scheduled Pinned Locked Moved Uncategorized
20 Posts 14 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • andrei_chiffa@mastodon.socialA andrei_chiffa@mastodon.social

    @dangoodin this problem has been solved for a while using symmetric encryption after a QR assymetric handshake for a while now, no?

    dangoodin@infosec.exchangeD This user is from outside of this forum
    dangoodin@infosec.exchangeD This user is from outside of this forum
    dangoodin@infosec.exchange
    wrote last edited by
    #6

    @andrei_chiffa

    Great question . . . and one I don't know the answer to.

    1 Reply Last reply
    0
    • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

      Google has devised a means for securing HTTPS certificates against quantum computing attacks without massive performance hits stemming from the considerably longer size of data required to be included.

      Is anyone following this work?

      Link Preview Image
      Cultivating a robust and efficient quantum-safe HTTPS

      Posted by Chrome Secure Web and Networking Team Today we're announcing a new program in Chrome to make HTTPS certificates secure against ...

      favicon

      Google Online Security Blog (security.googleblog.com)

      shuasha@infosec.exchangeS This user is from outside of this forum
      shuasha@infosec.exchangeS This user is from outside of this forum
      shuasha@infosec.exchange
      wrote last edited by
      #7

      @dangoodin Yeah, but I'm a weirdo who goes to IETF meetings and cares about this stuff. You can watch the PLANTS meeting from Novermber's IETF meeting here: https://www.youtube.com/watch?v=wBR_MIFc08I

      1 Reply Last reply
      0
      • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

        Google has devised a means for securing HTTPS certificates against quantum computing attacks without massive performance hits stemming from the considerably longer size of data required to be included.

        Is anyone following this work?

        Link Preview Image
        Cultivating a robust and efficient quantum-safe HTTPS

        Posted by Chrome Secure Web and Networking Team Today we're announcing a new program in Chrome to make HTTPS certificates secure against ...

        favicon

        Google Online Security Blog (security.googleblog.com)

        agwa@follow.agwa.nameA This user is from outside of this forum
        agwa@follow.agwa.nameA This user is from outside of this forum
        agwa@follow.agwa.name
        wrote last edited by
        #8
        @dangoodin Yes, closely. There's a lot of momentum and Mozilla and Apple are interested as well.
        1 Reply Last reply
        0
        • andrei_chiffa@mastodon.socialA andrei_chiffa@mastodon.social

          @dangoodin this problem has been solved for a while using symmetric encryption after a QR assymetric handshake for a while now, no?

          agwa@follow.agwa.nameA This user is from outside of this forum
          agwa@follow.agwa.nameA This user is from outside of this forum
          agwa@follow.agwa.name
          wrote last edited by
          #9
          @andrei_chiffa @dangoodin The QR asymmetric handshake protects against passive attackers decrypting sniffed traffic, but not against active attackers presenting a forged certificate in a man-in-the-middle attack. Merkle Tree Certificates protect against the latter threat.
          1 Reply Last reply
          0
          • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

            Google has devised a means for securing HTTPS certificates against quantum computing attacks without massive performance hits stemming from the considerably longer size of data required to be included.

            Is anyone following this work?

            Link Preview Image
            Cultivating a robust and efficient quantum-safe HTTPS

            Posted by Chrome Secure Web and Networking Team Today we're announcing a new program in Chrome to make HTTPS certificates secure against ...

            favicon

            Google Online Security Blog (security.googleblog.com)

            sophieschmieg@infosec.exchangeS This user is from outside of this forum
            sophieschmieg@infosec.exchangeS This user is from outside of this forum
            sophieschmieg@infosec.exchange
            wrote last edited by
            #10

            @dangoodin yes. 😏

            icing@chaos.socialI 1 Reply Last reply
            0
            • andrei_chiffa@mastodon.socialA andrei_chiffa@mastodon.social

              @dangoodin this problem has been solved for a while using symmetric encryption after a QR assymetric handshake for a while now, no?

              sophieschmieg@infosec.exchangeS This user is from outside of this forum
              sophieschmieg@infosec.exchangeS This user is from outside of this forum
              sophieschmieg@infosec.exchange
              wrote last edited by
              #11

              @andrei_chiffa @dangoodin the issue is the size of the handshake itself. You have to run the entire handshake before you can transmit data. With PQC, what used to be a 32 to 256 byte public key or signature now each becomes 1 to 3.5 KB in size. This is acceptable for the key agreement parts, since we really only need one artifact per party there, but becomes way too expensive when talking about the certificate, i.e. a chain of public keys signed by keys further up.
              Merkle Tree Certificates are a proposal that significantly compresses this certificate chain, at the cost of a more complicated trust management story.

              shuasha@infosec.exchangeS 1 Reply Last reply
              1
              0
              • sophieschmieg@infosec.exchangeS sophieschmieg@infosec.exchange

                @andrei_chiffa @dangoodin the issue is the size of the handshake itself. You have to run the entire handshake before you can transmit data. With PQC, what used to be a 32 to 256 byte public key or signature now each becomes 1 to 3.5 KB in size. This is acceptable for the key agreement parts, since we really only need one artifact per party there, but becomes way too expensive when talking about the certificate, i.e. a chain of public keys signed by keys further up.
                Merkle Tree Certificates are a proposal that significantly compresses this certificate chain, at the cost of a more complicated trust management story.

                shuasha@infosec.exchangeS This user is from outside of this forum
                shuasha@infosec.exchangeS This user is from outside of this forum
                shuasha@infosec.exchange
                wrote last edited by
                #12

                @sophieschmieg @andrei_chiffa @dangoodin Dan: The scale of the problem is spelled out pretty clearly in this presentation from the last IETF: https://youtu.be/wBR_MIFc08I?si=85y_tlGfEdREkFRd&t=1027

                1 Reply Last reply
                1
                0
                • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

                  Google has devised a means for securing HTTPS certificates against quantum computing attacks without massive performance hits stemming from the considerably longer size of data required to be included.

                  Is anyone following this work?

                  Link Preview Image
                  Cultivating a robust and efficient quantum-safe HTTPS

                  Posted by Chrome Secure Web and Networking Team Today we're announcing a new program in Chrome to make HTTPS certificates secure against ...

                  favicon

                  Google Online Security Blog (security.googleblog.com)

                  S This user is from outside of this forum
                  S This user is from outside of this forum
                  spacelifeform@infosec.exchange
                  wrote last edited by
                  #13

                  @dangoodin

                  Smells.

                  #EEE

                  1 Reply Last reply
                  0
                  • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

                    Google has devised a means for securing HTTPS certificates against quantum computing attacks without massive performance hits stemming from the considerably longer size of data required to be included.

                    Is anyone following this work?

                    Link Preview Image
                    Cultivating a robust and efficient quantum-safe HTTPS

                    Posted by Chrome Secure Web and Networking Team Today we're announcing a new program in Chrome to make HTTPS certificates secure against ...

                    favicon

                    Google Online Security Blog (security.googleblog.com)

                    S This user is from outside of this forum
                    S This user is from outside of this forum
                    spacelifeform@infosec.exchange
                    wrote last edited by
                    #14

                    @dangoodin

                    Who cares about the certs if you are behind a defacto MITM like Cloudflare?

                    1 Reply Last reply
                    0
                    • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

                      Google has devised a means for securing HTTPS certificates against quantum computing attacks without massive performance hits stemming from the considerably longer size of data required to be included.

                      Is anyone following this work?

                      Link Preview Image
                      Cultivating a robust and efficient quantum-safe HTTPS

                      Posted by Chrome Secure Web and Networking Team Today we're announcing a new program in Chrome to make HTTPS certificates secure against ...

                      favicon

                      Google Online Security Blog (security.googleblog.com)

                      S This user is from outside of this forum
                      S This user is from outside of this forum
                      spacelifeform@infosec.exchange
                      wrote last edited by
                      #15

                      @dangoodin

                      This is Security Threatre.

                      i@toot.pouyan.netI 1 Reply Last reply
                      0
                      • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

                        Google has devised a means for securing HTTPS certificates against quantum computing attacks without massive performance hits stemming from the considerably longer size of data required to be included.

                        Is anyone following this work?

                        Link Preview Image
                        Cultivating a robust and efficient quantum-safe HTTPS

                        Posted by Chrome Secure Web and Networking Team Today we're announcing a new program in Chrome to make HTTPS certificates secure against ...

                        favicon

                        Google Online Security Blog (security.googleblog.com)

                        tknarr@mstdn.socialT This user is from outside of this forum
                        tknarr@mstdn.socialT This user is from outside of this forum
                        tknarr@mstdn.social
                        wrote last edited by
                        #16

                        @dangoodin My question is, how close are we to hardware that can do quantum attacks on encryption?

                        thibaultmol@en.osm.townT 1 Reply Last reply
                        0
                        • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

                          Google has devised a means for securing HTTPS certificates against quantum computing attacks without massive performance hits stemming from the considerably longer size of data required to be included.

                          Is anyone following this work?

                          Link Preview Image
                          Cultivating a robust and efficient quantum-safe HTTPS

                          Posted by Chrome Secure Web and Networking Team Today we're announcing a new program in Chrome to make HTTPS certificates secure against ...

                          favicon

                          Google Online Security Blog (security.googleblog.com)

                          vandorb12@infosec.exchangeV This user is from outside of this forum
                          vandorb12@infosec.exchangeV This user is from outside of this forum
                          vandorb12@infosec.exchange
                          wrote last edited by
                          #17

                          @dangoodin seeing the cryptography nerds do their thing, and all I see is word salad, dreading the day I have to learn anything about certificates and cryptography beyond a Cæsar cypher in school.

                          1 Reply Last reply
                          0
                          • tknarr@mstdn.socialT tknarr@mstdn.social

                            @dangoodin My question is, how close are we to hardware that can do quantum attacks on encryption?

                            thibaultmol@en.osm.townT This user is from outside of this forum
                            thibaultmol@en.osm.townT This user is from outside of this forum
                            thibaultmol@en.osm.town
                            wrote last edited by
                            #18

                            @tknarr @dangoodin don't forget how slow certain technology adoption rates are.
                            You only need one person to have the capabilities to use quantum computer for this meanwhile every website needs to update which will take a while

                            1 Reply Last reply
                            0
                            • sophieschmieg@infosec.exchangeS sophieschmieg@infosec.exchange

                              @dangoodin yes. 😏

                              icing@chaos.socialI This user is from outside of this forum
                              icing@chaos.socialI This user is from outside of this forum
                              icing@chaos.social
                              wrote last edited by
                              #19

                              @sophieschmieg @dangoodin @filippo 82 pages of RFC…hmmm…must be secure then!😌

                              1 Reply Last reply
                              0
                              • S spacelifeform@infosec.exchange

                                @dangoodin

                                This is Security Threatre.

                                i@toot.pouyan.netI This user is from outside of this forum
                                i@toot.pouyan.netI This user is from outside of this forum
                                i@toot.pouyan.net
                                wrote last edited by
                                #20
                                @SpaceLifeForm@infosec.exchange Firefox never really forced CT logged, but with this proposal it seems to me that you now have to trust that a CA can properly maintain a log and also trust the cosigners at the same time.

                                @dangoodin@infosec.exchange
                                1 Reply Last reply
                                0
                                • R relay@relay.infosec.exchange shared this topic
                                Reply
                                • Reply as topic
                                Log in to reply
                                • Oldest to Newest
                                • Newest to Oldest
                                • Most Votes


                                • Login

                                • Login or register to search.
                                • First post
                                  Last post
                                0
                                • Categories
                                • Recent
                                • Tags
                                • Popular
                                • World
                                • Users
                                • Groups