this post was submitted on 20 Sep 2023
168 points (98.3% liked)

Privacy

31876 readers
438 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
 

We believe that the key encapsulation mechanism we have selected, CRYSTALS-Kyber, is built on solid foundations, but to be safe we do not want to simply replace our existing elliptic curve cryptography foundations with a post-quantum public key cryptosystem. Instead, we are augmenting our existing cryptosystems such that an attacker must break both systems in order to compute the keys protecting people’s communications.

...

Our new protocol is already supported in the latest versions of Signal’s client applications and is in use for chats initiated after both sides of the chat are using the latest Signal software. In the coming months (after sufficient time has passed for everyone using Signal to update), we will disable X3DH for new chats and require PQXDH for all new chats. In parallel, we will roll out software updates to upgrade existing chats to this new protocol.

all 22 comments
sorted by: hot top controversial new old
[–] jet@hackertalks.com 19 points 1 year ago (4 children)

A nice and reasonable approach.

I just wonder why doubling up the cyphers is the way to go? Not confident in the post-quantum cipher yet?

[–] waffle@lemmy.cafe 19 points 1 year ago

Yeah they explain it in the article.

[–] CameronDev@programming.dev 11 points 1 year ago

There was a "quantum safe" encryption scheme proposed that had a non-quantum vulnerability found in it. Perhaps they are hedging against that occuring again? The scheme was rejected in the end so didnt matter to much.

https://arstechnica.com/information-technology/2022/08/sike-once-a-post-quantum-encryption-contender-is-koed-in-nist-smackdown/

New ones are too young and not battle tested with time. Hybrid PQ is the norm until more data is available.

[–] kanzalibrary@lemmy.ml 14 points 1 year ago

I never predict Signal will implement this QuanResist really fast pace than other messenger apps. Applause to the dev team!

[–] obinice@lemmy.world 8 points 1 year ago (2 children)

We believe that the key encapsulation mechanism we have selected, CRYSTALS-Kyber, is built on solid foundations, but to be safe we do not want to simply replace our existing elliptic curve cryptography foundations with a post-quantum public key cryptosystem.

Does this sound like VX Junkies to anybody else? I feel the need to check on my turbo encabulator 😅

[–] possiblylinux127@lemmy.zip 1 points 1 year ago

The original machine had a base-plate of prefabulated aluminite, surmounted by a malleable logarithmic casing in such a way that the two main spurving bearings were in a direct line with the pentametric fan. The latter consisted simply of six hydrocoptic marzlevanes, so fitted to the ambifacient lunar waneshaft that side fumbling was effectively prevented. The main winding was of the normal lotus-o-delta type placed in panendermic semi-bovoid slots in the stator, every seventh conductor being connected by a non-reversible tremie pipe to the differential girdlespring on the "up" end of the grammeters.

[–] Arghblarg@lemmy.ca 1 points 1 year ago

A clearer explanation is available here

[–] fmstrat@lemmy.nowsci.com 3 points 1 year ago (1 children)

Will signald be updated? Matrix wants to know.

[–] fmstrat@lemmy.nowsci.com 2 points 1 year ago

For anyone curious, I've opened an issue to confirm: https://gitlab.com/signald/signald/-/issues/377