Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Microsoft The Internet Technology

Microsoft Adds Post-Quantum Cryptography To an OpenVPN Fork (bleepingcomputer.com) 63

An anonymous reader writes: Microsoft recently published an interesting open source project called "PQCrypto-VPN" that implements post-quantum cryptography (PQC) within OpenVPN. Being developed by the Microsoft Research Security and Cryptography group, as part of their research into post-quantum cryptography, this fork is being used to test PQC algorithms and their performance and functionality when used with VPNs.

Microsoft's PQCrypto-VPN is published on Github and allows anyone to build an OpenVPN implementation that can encrypt communications using three different post-quantum cryptography protocols, with more coming as they are developed. These protocols are: (1) Frodo: a key exchange protocol based on the learning with errors problem (2) SIKE: a key exchange protocol based on Supersingular Isogeny Diffie-Hellman and (3) Picnic: a signature algorithm using symmetric-key primitives and non-interactive zero-knowledge proofs.

This discussion has been archived. No new comments can be posted.

Microsoft Adds Post-Quantum Cryptography To an OpenVPN Fork

Comments Filter:
  • by CajunArson ( 465943 ) on Wednesday June 06, 2018 @04:55PM (#56739126) Journal

    Picnic might be secure from quantum computers.

    But its basket structures are clearly vulnerable to bear based attacks where the attacker is mathematically proven to be smarter than average.

  • GitHub... sounds familiar. Can't remember what it was...
  • Given that its hosted on Github which since Microsoft bought most of /. say they won't use, then I guess there won't be that many people trying it....
  • We need a lot of independent researchers opinion on that.

    Everyone remember Dual EC DRBG [wikipedia.org]?

  • what a stupid pandering meaningless sound-bite.

    it is not known that any current crypto is unbreakable by quantum computing.

After the last of 16 mounting screws has been removed from an access cover, it will be discovered that the wrong access cover has been removed.

Working...