<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Chasing Cyber]]></title><description><![CDATA[Occasional insights on cryptography and quantum cybersecurity.]]></description><link>https://chasingcyber.com</link><image><url>https://substackcdn.com/image/fetch/$s_!dZmz!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8aa39865-48bb-45b0-9104-d6ce04a339aa_500x500.png</url><title>Chasing Cyber</title><link>https://chasingcyber.com</link></image><generator>Substack</generator><lastBuildDate>Tue, 05 May 2026 04:34:54 GMT</lastBuildDate><atom:link href="https://chasingcyber.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Duncan Jones]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[chasingcyber@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[chasingcyber@substack.com]]></itunes:email><itunes:name><![CDATA[Duncan Jones]]></itunes:name></itunes:owner><itunes:author><![CDATA[Duncan Jones]]></itunes:author><googleplay:owner><![CDATA[chasingcyber@substack.com]]></googleplay:owner><googleplay:email><![CDATA[chasingcyber@substack.com]]></googleplay:email><googleplay:author><![CDATA[Duncan Jones]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[No – RSA Isn't Broken By Every Piece of Quantum News]]></title><description><![CDATA[Let's trust the experts instead of the LinkedIn lunatics]]></description><link>https://chasingcyber.com/p/rsa-isnt-broken-by-every-piece-of-quantum-news</link><guid isPermaLink="false">https://chasingcyber.com/p/rsa-isnt-broken-by-every-piece-of-quantum-news</guid><dc:creator><![CDATA[Duncan Jones]]></dc:creator><pubDate>Mon, 16 Dec 2024 07:02:22 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/785de7a0-87b4-4f42-a275-c29388694609_1456x1048.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Yydu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85795f44-9f70-47ed-a4bd-2a22f281925b_1456x1048.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Yydu!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85795f44-9f70-47ed-a4bd-2a22f281925b_1456x1048.heic 424w, https://substackcdn.com/image/fetch/$s_!Yydu!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85795f44-9f70-47ed-a4bd-2a22f281925b_1456x1048.heic 848w, https://substackcdn.com/image/fetch/$s_!Yydu!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85795f44-9f70-47ed-a4bd-2a22f281925b_1456x1048.heic 1272w, https://substackcdn.com/image/fetch/$s_!Yydu!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85795f44-9f70-47ed-a4bd-2a22f281925b_1456x1048.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Yydu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85795f44-9f70-47ed-a4bd-2a22f281925b_1456x1048.heic" width="1456" height="1048" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/85795f44-9f70-47ed-a4bd-2a22f281925b_1456x1048.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1048,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:211481,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Yydu!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85795f44-9f70-47ed-a4bd-2a22f281925b_1456x1048.heic 424w, https://substackcdn.com/image/fetch/$s_!Yydu!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85795f44-9f70-47ed-a4bd-2a22f281925b_1456x1048.heic 848w, https://substackcdn.com/image/fetch/$s_!Yydu!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85795f44-9f70-47ed-a4bd-2a22f281925b_1456x1048.heic 1272w, https://substackcdn.com/image/fetch/$s_!Yydu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85795f44-9f70-47ed-a4bd-2a22f281925b_1456x1048.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This week saw two major announcements in the quantum world. Google <a href="https://blog.google/technology/research/google-willow-quantum-chip/">launched a new chip</a>, Willow, with bold comparisons against classical systems. Meanwhile, my colleagues at Quantinuum revealed a record-setting <a href="https://www.linkedin.com/posts/quantinuumqc_unveiling-the-quantum-computing-industry-activity-7272146808900882432-UJYU?utm_source=share&amp;utm_medium=member_desktop">entanglement of 50 logical qubits</a>.</p><p>Whenever significant quantum news is released, my LinkedIn feed overflows with speculation that RSA and Bitcoin can now be hacked. These lazy interpretations frustrate me. Do people think encryption would be shattered overnight without a large collection of experts saying so?</p><p><a href="https://www.linkedin.com/in/intallura/">Philip Intallura</a> wonderfully summarised the collective feeling on my side of the fence:</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!AhZ2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76613881-7389-47bb-9c65-17d9a916f4ba_800x251.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!AhZ2!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76613881-7389-47bb-9c65-17d9a916f4ba_800x251.jpeg 424w, https://substackcdn.com/image/fetch/$s_!AhZ2!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76613881-7389-47bb-9c65-17d9a916f4ba_800x251.jpeg 848w, https://substackcdn.com/image/fetch/$s_!AhZ2!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76613881-7389-47bb-9c65-17d9a916f4ba_800x251.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!AhZ2!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76613881-7389-47bb-9c65-17d9a916f4ba_800x251.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!AhZ2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76613881-7389-47bb-9c65-17d9a916f4ba_800x251.jpeg" width="619" height="194.21125" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/76613881-7389-47bb-9c65-17d9a916f4ba_800x251.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:251,&quot;width&quot;:800,&quot;resizeWidth&quot;:619,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A screenshot of a phone\n\nDescription automatically generated&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A screenshot of a phone

Description automatically generated" title="A screenshot of a phone

Description automatically generated" srcset="https://substackcdn.com/image/fetch/$s_!AhZ2!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76613881-7389-47bb-9c65-17d9a916f4ba_800x251.jpeg 424w, https://substackcdn.com/image/fetch/$s_!AhZ2!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76613881-7389-47bb-9c65-17d9a916f4ba_800x251.jpeg 848w, https://substackcdn.com/image/fetch/$s_!AhZ2!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76613881-7389-47bb-9c65-17d9a916f4ba_800x251.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!AhZ2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76613881-7389-47bb-9c65-17d9a916f4ba_800x251.jpeg 1456w" sizes="100vw"></picture><div></div></div></a></figure></div><p>However, if I put on my Hat of Reluctant Understanding, I recognise the quantum threat is difficult to assess based on sporadic industry announcements. How can you tell if a year full of exciting announcements impacts the date when quantum computers will threaten encryption?</p><p>One approach is to periodically consult a large group of experts to see what they think. This is exactly what Michele Mosca does in his annual <em>Quantum Threat Report</em>, which was <a href="https://globalriskinstitute.org/publication/2024-quantum-threat-timeline-report/">recently updated for 2024</a>. Mosca&#8217;s team has polled dozens of experts since 2019, asking them to estimate when quantum computers will break 2048-bit RSA in less than twenty-four hours.</p><p>These experts presumably keep abreast of the latest developments in quantum (at least up until the cut-off point for the report). So their collective answers represent a balanced opinion on how the various announcements contribute towards cryptographic risk.</p><p>This year, they assigned a one-in-ten probability that a quantum computer would break RSA in the next five years. The risk steadily rises over the subsequent years, passing the fifty-percent mark at the end of the 2030s.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!n-zx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14ee4934-f32e-4b1d-8da0-827e72e8794a_1428x783.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!n-zx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14ee4934-f32e-4b1d-8da0-827e72e8794a_1428x783.png 424w, https://substackcdn.com/image/fetch/$s_!n-zx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14ee4934-f32e-4b1d-8da0-827e72e8794a_1428x783.png 848w, https://substackcdn.com/image/fetch/$s_!n-zx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14ee4934-f32e-4b1d-8da0-827e72e8794a_1428x783.png 1272w, https://substackcdn.com/image/fetch/$s_!n-zx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14ee4934-f32e-4b1d-8da0-827e72e8794a_1428x783.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!n-zx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14ee4934-f32e-4b1d-8da0-827e72e8794a_1428x783.png" width="1428" height="783" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/14ee4934-f32e-4b1d-8da0-827e72e8794a_1428x783.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:783,&quot;width&quot;:1428,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A graph with a red line\n\nDescription automatically generated&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A graph with a red line

Description automatically generated" title="A graph with a red line

Description automatically generated" srcset="https://substackcdn.com/image/fetch/$s_!n-zx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14ee4934-f32e-4b1d-8da0-827e72e8794a_1428x783.png 424w, https://substackcdn.com/image/fetch/$s_!n-zx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14ee4934-f32e-4b1d-8da0-827e72e8794a_1428x783.png 848w, https://substackcdn.com/image/fetch/$s_!n-zx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14ee4934-f32e-4b1d-8da0-827e72e8794a_1428x783.png 1272w, https://substackcdn.com/image/fetch/$s_!n-zx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14ee4934-f32e-4b1d-8da0-827e72e8794a_1428x783.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: <em>Quantum Threat Timeline Report 2024</em>, Global Risk Institute</figcaption></figure></div><p>Does that mean we can heave a collective sigh of relief? <strong>Absolutely not!</strong></p><p>In the world of cybersecurity, even a ten percent risk is unacceptable. Organizations spend millions each year to squash much smaller risks. And since Mosca&#8217;s report is a lagging indicator, it&#8217;s best to assume things might have worsened since it was published.</p><p>The message remains simple and urgent: take this growing threat seriously and begin your migration planning.</p><p>There is no need to panic, and no need to believe RSA has been broken each time you read quantum news. However, the exciting announcements this week show the quantum industry is moving rapidly, and we need to be ready for whatever comes next.</p><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://chasingcyber.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://chasingcyber.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><h2>In Other News&#8230;</h2><ul><li><p>The Open Quantum Safe project <a href="https://github.com/open-quantum-safe/liboqs/releases/tag/0.12.0">released v0.12</a> of its quantum-safe library. As of this release, the library now contains FIPS approved versions of both ML-KEM and ML-DSA.</p></li><li><p>The Bank of England <a href="https://www.bankofengland.co.uk/-/media/boe/files/digital-pound/mit-report-enhancing-the-privacy-of-a-digital-pound.pdf">published a study</a> about using advanced cryptographic techniques (such as zero-knowledge proofs and multi-party computation) to ensure the privacy of digital currency.</p></li><li><p>The world of secure enclaves took another battering, <a href="https://badram.eu/">this time targeting AMD</a>. A new attack vector allowed attackers with physical access to bypass security mechanisms and expose sensitive data.</p></li><li><p>Microsoft is on a mission to move one billion users to passkeys instead of passwords. <a href="https://www.microsoft.com/en-us/security/blog/2024/12/12/convincing-a-billion-users-to-love-passkeys-ux-design-insights-from-microsoft-to-boost-adoption-and-security/">This blog</a> gives some interesting insights into how they are changing user behaviours.</p></li></ul>]]></content:encoded></item><item><title><![CDATA[Relax – Your IoT Device Is Now Secured by Stack Overflow]]></title><description><![CDATA[Copy, paste, and the Cyber Resilience Act]]></description><link>https://chasingcyber.com/p/relax-your-iot-device-is-now-secured</link><guid isPermaLink="false">https://chasingcyber.com/p/relax-your-iot-device-is-now-secured</guid><dc:creator><![CDATA[Duncan Jones]]></dc:creator><pubDate>Mon, 09 Dec 2024 07:02:26 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!c_VJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d9575c4-8a41-4870-baf2-8a03dd504100_1456x1048.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!c_VJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d9575c4-8a41-4870-baf2-8a03dd504100_1456x1048.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!c_VJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d9575c4-8a41-4870-baf2-8a03dd504100_1456x1048.heic 424w, https://substackcdn.com/image/fetch/$s_!c_VJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d9575c4-8a41-4870-baf2-8a03dd504100_1456x1048.heic 848w, https://substackcdn.com/image/fetch/$s_!c_VJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d9575c4-8a41-4870-baf2-8a03dd504100_1456x1048.heic 1272w, https://substackcdn.com/image/fetch/$s_!c_VJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d9575c4-8a41-4870-baf2-8a03dd504100_1456x1048.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!c_VJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d9575c4-8a41-4870-baf2-8a03dd504100_1456x1048.heic" width="1456" height="1048" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3d9575c4-8a41-4870-baf2-8a03dd504100_1456x1048.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1048,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:57018,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!c_VJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d9575c4-8a41-4870-baf2-8a03dd504100_1456x1048.heic 424w, https://substackcdn.com/image/fetch/$s_!c_VJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d9575c4-8a41-4870-baf2-8a03dd504100_1456x1048.heic 848w, https://substackcdn.com/image/fetch/$s_!c_VJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d9575c4-8a41-4870-baf2-8a03dd504100_1456x1048.heic 1272w, https://substackcdn.com/image/fetch/$s_!c_VJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d9575c4-8a41-4870-baf2-8a03dd504100_1456x1048.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This week, the Cyber Resilience Act (CRA) comes into force in EU member states. All products containing a &#8220;digital element&#8221; sold after December 2027 will need to meet minimum cybersecurity standards.</p><p>The scope of the CRA is enormous. It applies to any device with &#8220;&#8230; <em>a direct or indirect logical or physical data connection to a device or network.</em>&#8221; In short, any connected device, whether in IT systems, consumer or enterprise IoT, operational technology, or beyond.</p><p>Naturally, this is a big deal for cybersecurity and cryptography. Among the requirements defined in <a href="https://eur-lex.europa.eu/eli/reg/2024/2847/oj#anx_I">Annex I</a> are two that squarely point to greater use of encryption:</p><ul><li><p>&#8220;<em>ensure protection from unauthorised access by appropriate control mechanisms, including but not limited to authentication, identity or access management systems, and report on possible unauthorised access;</em>&#8221;</p></li><li><p>&#8220;<em>protect the confidentiality of stored, transmitted or otherwise processed data, personal or other, such as by encrypting relevant data at rest or in transit by state of the art mechanisms, and by using other technical means.</em>&#8221;</p></li></ul><p>It&#8217;s all very sensible. And, if implemented correctly, it should lead to improved digital security for all. However, this is easier said than done, which makes me wonder whether poorly implemented security is better than no security. I&#8217;m not sure.</p><p>Twice in my career, I&#8217;ve had the opportunity to inspect the source code underpinning third-party enterprise security software. On each occasion, I was horrified. The code was clearly written by engineers with no training in cryptography since it broke many of the standard rules. <a href="https://en.wikipedia.org/wiki/Security_through_obscurity">Security through obscurity</a> was rampant, along with the incorrect use of encryption parameters (things like all-zero IVs, misused salts, and so forth).</p><p>Extrapolating from this small sample, I assume the average engineer finds writing secure code difficult. And now the CRA is forcing almost everyone to do it, we will see some funky stuff going into production.</p><p>Stack Overflow may find itself on the front lines of software supply chain security, given how much code will be copied from its pages. I wonder if nation-states have started subverting the code examples yet.</p><p>Ultimately, we need the industry to settle on some idiot-proof security libraries for everyone to use. There&#8217;s been some progress on this over the years, with libraries like <a href="https://doc.libsodium.org/">libsodium</a> and <a href="https://github.com/RNCryptor/RNCryptor">RNCryptor</a> trying to limit the amount of damage a developer can do. However, their adoption seems limited, and many developers still resort to the raw cryptographic libraries provided by their programming language.</p><p>Until this changes, I shall continue treating my consumer devices as though they have no security at all. And perhaps we should be doing this with enterprise tools as well. As a reminder &#8211; it&#8217;s OK to ask your vendors to see their code!</p><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://chasingcyber.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://chasingcyber.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><h2>In Other News&#8230;</h2><ul><li><p>Congratulation to TNO, who recently released <a href="https://tno.github.io/PQChoiceAssistant/">PQChoiceAssistant</a> v2. It&#8217;s an interactive tool that helps you choose the PQC algorithm for your use case. Give it a go, it&#8217;s brilliant. Thanks to <a href="https://www.linkedin.com/in/frederikkerling/">Frederik Kerling</a> for sharing this.</p></li><li><p>Related to the above, TNO and collaborators have shipped a revised revision of their <a href="https://ir.cwi.nl/pub/34604/34604D.pdf">PQC Migration Handbook</a> (PDF). I&#8217;ve not had a chance to read this in-depth, but it seems extremely comprehensive.</p></li><li><p>The NCSC has published <a href="https://www.ncsc.gov.uk/collection/ncsc-annual-review-2024">their annual review</a>, with the geekiest cover image I&#8217;ve ever seen. Buried at the back of the review are <a href="https://www.ncsc.gov.uk/collection/ncsc-annual-review-2024/chapter-04/post-quantum-cryptography">some thoughts on post-quantum migration</a>. I was interested to see their hint that regulation will play an important part in creating the motivation for action.</p></li></ul>]]></content:encoded></item><item><title><![CDATA[Erratum: You Really Must Focus On PQC Migrations]]></title><description><![CDATA[Please, please, please don't take your eye off the ball]]></description><link>https://chasingcyber.com/p/erratum-you-really-must-focus-on</link><guid isPermaLink="false">https://chasingcyber.com/p/erratum-you-really-must-focus-on</guid><dc:creator><![CDATA[Duncan Jones]]></dc:creator><pubDate>Wed, 04 Dec 2024 18:01:51 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!cC16!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51d3a49a-092c-4563-af59-eab73b55f242_1456x1048.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!cC16!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51d3a49a-092c-4563-af59-eab73b55f242_1456x1048.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!cC16!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51d3a49a-092c-4563-af59-eab73b55f242_1456x1048.jpeg 424w, https://substackcdn.com/image/fetch/$s_!cC16!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51d3a49a-092c-4563-af59-eab73b55f242_1456x1048.jpeg 848w, https://substackcdn.com/image/fetch/$s_!cC16!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51d3a49a-092c-4563-af59-eab73b55f242_1456x1048.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!cC16!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51d3a49a-092c-4563-af59-eab73b55f242_1456x1048.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!cC16!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51d3a49a-092c-4563-af59-eab73b55f242_1456x1048.jpeg" width="1456" height="1048" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/51d3a49a-092c-4563-af59-eab73b55f242_1456x1048.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1048,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:144541,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!cC16!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51d3a49a-092c-4563-af59-eab73b55f242_1456x1048.jpeg 424w, https://substackcdn.com/image/fetch/$s_!cC16!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51d3a49a-092c-4563-af59-eab73b55f242_1456x1048.jpeg 848w, https://substackcdn.com/image/fetch/$s_!cC16!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51d3a49a-092c-4563-af59-eab73b55f242_1456x1048.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!cC16!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51d3a49a-092c-4563-af59-eab73b55f242_1456x1048.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>So, I&#8217;ve discovered something interesting happens when you write a blog.</p><p>In your head, you develop a clear idea to convey to the reader. You try to capture that in 600-800 words with a catchy title. Then you publish it, and despite your best intentions, sometimes a<em> <strong>completely different message</strong> </em>is heard by your audience<em>.</em></p><p>Of course, this is a failure on the part of the author, not the audience.</p><p>My blog last week failed catastrophically on this front. My goal was to push back on some of the over-simplistic statements I&#8217;d heard about hack-now, decrypt-later attacks. There is nuance missing from the public narrative and I was trying to trigger a discussion around it.</p><p>However, I did a terrible job of conveying that idea. And, horrifyingly, what landed for many readers was a message of &#8220;<em>You don&#8217;t need to do a post-quantum migration any more.&#8221;</em></p><p><strong>Let me be super clear: all organizations must take the quantum threat seriously and take action now</strong>. It is well-established that cryptographic migrations take a <em>long</em> time. Just look around at some of the migrations we&#8217;ve barely finished (MD5 anyone?). To get our systems quantum-ready is going to take a decade or more, so it must begin with urgency.</p><p>Let me also be clear that hack now, decrypt later attacks are a genuine threat to high-value targets. Every organization should consider this type of threat carefully and decide if they are impacted by it. If so, you must move even sooner on your migration.</p><p>I&#8217;ve deleted my previous post because it seems irresponsible to let that confusion continue. My sincere apologies for being unclear, and my deep thanks to the friend in my network who drew attention to this issue.</p>]]></content:encoded></item><item><title><![CDATA[The Winds of Change]]></title><description><![CDATA[Death, reflection, and shortening lifespans]]></description><link>https://chasingcyber.com/p/the-winds-of-change</link><guid isPermaLink="false">https://chasingcyber.com/p/the-winds-of-change</guid><dc:creator><![CDATA[Duncan Jones]]></dc:creator><pubDate>Mon, 25 Nov 2024 07:00:40 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/77818f5b-0ebf-443f-a404-b660d985dc0b_1456x1048.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>He Bequeathed You His Instagram Account</h2><p>What happens to cryptographic keys after you die?<br><br>In Japan, citizens have been advised to give loved ones access to their smartphones and subscription details to make a post-mortem cleanup easier.<br><br>This story, reported in The Register, reminds me how short-sighted most cryptographic systems are. Death is inevitable and yet ignored in almost every consumer product. Users have to violate best practices by writing down usernames and passwords or giving others access to their critical data. In many cases, this breaks the terms of the services they are using.<br><br>Enterprise systems often have the same problem. Powerful root accounts need to be shared between a few trusted individuals. There are cryptographic solutions to this problem, such as secret sharing, but they are often not implemented.<br><br>These are the symptoms of a cyber industry that relegates "far away" problems to a later software release (which never arrives).&nbsp;In my experience, many systems don&#8217;t even support key rotation. <br><br>I&#8217;m not sure how we can fix this systemic issue. But I suspect it involves better cryptographic education for the next generation. More emphasis needs to be given to the lifecycle of cryptography, and the techniques we have available to handle the inevitable changes in business and life.</p><div><hr></div><h2>Take a Long Hard Look in the Mirror</h2><p>Amid the flurry of reactions to the NIST announcements, something critical is being ignored.<br><br>When NIST publishes its advice and standards, it sets the **<strong>low</strong> <strong>bar**</strong> for acceptable practice. Their job is to find a pragmatic path forward, which inevitably aligns with the lowest common denominator.<br><br>There's no perfect answer to balancing the need for stronger keys with the migration to quantum-safe algorithms. However, while I still question if the decisions made were optimal, I&#8217;m expecting cyber practitioners are already taking action.<br><br>If you still use 2048-bit RSA keys in 2024 and don&#8217;t have a near-term plan to lengthen them, you are negligent.<br><br>If you wait until the last possible NIST-approved date before you retire algorithms, then you&#8217;re a cryptographic jackass.<br><br>If the idea of more than one cryptographic migration in 10 years gives you cold sweats, you need to build more agile systems.<br><br>In short, we should stop bashing NIST for their necessarily one-size-fits-all crypto advice. Instead, we need to be deeply critical of a cyber industry that still hasn&#8217;t finished its SHA-1 migration.<br><br>Time to step it up, folks!</p><div><hr></div><h2>On the Convergence of Certificates and Mayflies</h2><p>Is the world ready for shorter certificate lifespans? The answer isn&#8217;t clear, but we may be heading in that direction regardless.<br><br>Many of my posts focus on the post-quantum migration, where NIST will struggle to enforce its migration timeline outside federal agencies. The world of certificates, however, is quite different. <br><br>A small group of gatekeepers set the rules, and tech companies with massive user bases can make unliteral decisions. Google has been shaking things up since 2023 when it suggested certificate lifespans should be reduced from 398 days to 90 days. Apple recently proposed to halve that again, demanding 45-day validity periods by 2027.<br><br>Shortening certificate lifespans does come with potential security benefits. Attackers would have a smaller window to abuse compromised keys, plus it will trigger the adoption of automated certificate management tools. This is seen as a positive move &#8211; carefully managed certificates leave less room for errors and outages.<br><br>But the downsides are also significant. Organizations seem ill-prepared for this shift, and smaller enterprises won&#8217;t relish the investment in automation tools. Inevitably, certificate expiries will increase, which may lead to users routinely ignoring warnings.<br><br>Ultimately, the power rests with big tech companies. With one button press, Google can instruct Chrome to stop trusting long-lifespan certificates. We must hope they wield this privilege carefully and with forethought.<br><br>Whatever happens next, this will be a fascinating sector to watch.</p>]]></content:encoded></item><item><title><![CDATA[Time is Ticking]]></title><description><![CDATA[Quantum tokens, quantum deadlines, and quantum drones]]></description><link>https://chasingcyber.com/p/time-is-ticking</link><guid isPermaLink="false">https://chasingcyber.com/p/time-is-ticking</guid><dc:creator><![CDATA[Duncan Jones]]></dc:creator><pubDate>Mon, 18 Nov 2024 08:09:56 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/c1bf11a3-18dd-4f46-9a3f-fb4cff6dbe85_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>In a first for me, I&#8217;m delivering this newsletter an hour late to accommodate an 8AM media embargo on the opening story. In my eyes, I&#8217;m officially a journalist now!</em></p><div><hr></div><h2>Show Me the Quantum Money!</h2><p>Today, my team and colleagues at Quantinuum announced the first demonstration of quantum tokens sent over commercial-grade QKD equipment.<br><br>Quantum tokens are a novel financial instrument, inspired by the concept of quantum money. They offer three useful properties for financial transactions: unconditional unforgeability, near-instant settlement, and user privacy. We are not aware of a classical solution that can guarantee all three.<br><br>Unlike quantum money, which was imagined in the 1980s, quantum tokens are a hybrid of quantum and classical communications. This avoids the requirement for long-term quantum memories, while delivering many benefits of quantum money. We anticipate this technology will have multiple use cases across the financial industry, including high-speed financial trading, and ultra-high security access control.<br><br>Our demonstration took place in Tokyo, alongside our partners Mitsui and NEC. Token data was delivered over 10km of fibre, using two QKD devices from NEC.<br><br>You can read more about this in our <strong><a href="https://cdn.prod.website-files.com/669960f53cd73aedb80c8eea/6737abcb0d737d15feea6d4d_Quantinuum_Quantum-Tokens-Whitepaper.pdf">white paper</a> </strong>(PDF). A <strong><a href="https://www.quantinuum.com/press-releases/quantinuum-together-with-mitsui-advance-unforgeable-quantum-tokens-over-fibre-network-in-first-commercial-trial">press release</a></strong> is also available.<br><br>Our team will continue to focus on this technology, and I&#8217;ll share further updates as we hit new milestones.</p><div><hr></div><h2>10 Years to Go&#8230;</h2><p>NIST has spoken. RSA and ECDSA are banned from 2035.<br><br>Also, key lengths offering 112-bit security are deprecated (but not banned) after 2030. This includes 2048-bit RSA and 224-bit ECDSA.<br><br>The new rules are from NIST IR 8547, which was just released for public comments. The 2035 date is no surprise since it matches the deadline already given to federal agencies to complete their migrations.<br><br>The main symmetric algorithms are unaffected, as they provide at least 128 bits of security.<br><br>NIST IR 8547 is a 29-page document, but other than the timeline announcement, there&#8217;s nothing new to read. Page 13 is where you find the good stuff.<br><br>View the whole doc here: <strong><a href="https://csrc.nist.gov/pubs/ir/8547/ipd">https://csrc.nist.gov/pubs/ir/8547/ipd</a></strong>.<br><br>The clock is ticking! Ten years to go&#8230;</p><div><hr></div><h2>Droning On About QKD</h2><p>Once again, Chinese scientists are pushing the boundaries of quantum key distribution, this time using drones.<br><br>A team from Nanjing University has successfully conducted prepare-and-measure QKD over a 200-metre distance between a hovering drone and a ground station. They achieved a key exchange rate of over 8 kHz, with a drone weighing about 30 kg.<br><br>I&#8217;m not sure drones are the best long-term solution for the last-mile delivery problem. But it&#8217;s a cute experiment and maybe something for Amazon drone deliveries to consider!<br><br>You can read the paper here: <strong><a href="https://journals.aps.org/prl/abstract/10.1103/PhysRevLett.133.200801">https://journals.aps.org/prl/abstract/10.1103/PhysRevLett.133.200801</a></strong>.</p>]]></content:encoded></item><item><title><![CDATA[Mission Impossible]]></title><description><![CDATA[Self-destructing keys and operational technology]]></description><link>https://chasingcyber.com/p/mission-impossible</link><guid isPermaLink="false">https://chasingcyber.com/p/mission-impossible</guid><dc:creator><![CDATA[Duncan Jones]]></dc:creator><pubDate>Mon, 11 Nov 2024 07:01:39 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/d3119be4-b2b6-4000-a70e-5cc2818ea02b_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>A slightly shorter missive this week, as I&#8217;m travelling all weekend. Welcome to the whole pile of new subscribers who recently joined after last week&#8217;s stories hit LinkedIn.</em></p><div><hr></div><h2>This Key Will Self-Destruct in 5 Seconds</h2><p>How about a signing key that self-destructs after use? It sounds like Mission Impossible, but it may actually be possible with quantum physics. <br><br>I stumbled upon &#8220;one-shot quantum signatures&#8221; recently, after reading a paper published in 2020 (link below). The idea sounds magical, and I must remind folks that I&#8217;m quantum curious, but not a quantum cryptographer. So, I take such papers at face value.<br><br>The motivation of the paper is signature delegation. Alice wants to delegate signing authority to Bob but needs to limit him to just one signature. Using classical cryptography, this would be challenging if not impossible. If Bob has the data necessary to construct a valid signing key, he can do so multiple times and Alice cannot stop him.<br><br>In this paper, a new concept of a &#8220;one-shot quantum signature&#8221; is defined, which exhibits this desired behaviour. Through the no-cloning theorem from quantum physics, Bob&#8217;s key is proven to be destroyed after use, preventing multiple signatures.<br><br>What&#8217;s fascinating is that the protocol only requires classical (i.e. non-quantum) communication between Alice and Bob. Bob needs access to a quantum system, but Alice does not.<br><br>For more information, including security proofs, check out the paper: <strong><a href="https://eprint.iacr.org/2020/107">https://eprint.iacr.org/2020/107</a></strong>. Several potential use cases are explored.</p><div><hr></div><h2>Quantum-Proof OT &#8212; Oxymoron?</h2><p>CISA&#8217;s guidance on quantum-safe operational technology (OT) is a mixed bag.<br><br>It paints a bleak picture of the status quo, highlighting how OT often lacks encryption and may rely on outdated operating systems. Acknowledging these major challenges, CISA&#8217;s main practical advice is to limit the potential impact of quantum attacks through proper network segmentation.<br><br>Where the advice falls short is firmware security. It only briefly mentions that a quantum computer could enable the installation of malware via fraudulent firmware signatures. Yet, this represents a clear and present danger. Each new OT system deployed without a quantum-safe root of trust is a future weak link and a guaranteed swap-out within the next decade.<br><br>Quantum-safe firmware signing is a solvable problem today. We&#8217;ve had quantum-safe firmware signatures algorithms long before the recently standardised general-purpose PQC algorithms. So there's no reason not to be prioritising this today.<br><br>Asides from this bug bear, there&#8217;s nothing else offensive in the document, which proposes typical advice of inventorying, prioritising, and working with vendors to achieve crypto agility. But do let me know in a reply if you feel I&#8217;ve missed something.<br><br>You can view the CISA document here: <strong><a href="https://www.cisa.gov/resources-tools/resources/post-quantum-considerations-operational-technology">https://www.cisa.gov/resources-tools/resources/post-quantum-considerations-operational-technology</a></strong>.</p>]]></content:encoded></item><item><title><![CDATA[Chasing Cyber - #35 - The Pace of Change]]></title><description><![CDATA[AI watermarking, crypto standards, and government policy]]></description><link>https://chasingcyber.com/p/chasing-cyber-35-the-pace-of-change</link><guid isPermaLink="false">https://chasingcyber.com/p/chasing-cyber-35-the-pace-of-change</guid><dc:creator><![CDATA[Duncan Jones]]></dc:creator><pubDate>Mon, 04 Nov 2024 07:01:48 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/b378f46f-c399-49b3-84e5-53c118f8a702_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Meet Google&#8217;s Random New Watermarking</h2><p>Google found a new way to use random numbers: efficiently watermarking AI-generated text to prevent plagiarism.<br><br>The new approach is called &#8220;SynthID-Text&#8221;, suggesting the marketing team had the week off. Nonetheless, the technical details are interesting.<br><br>Large language models generate text by repeatedly choosing a plausible next word based on the preceding text. Google&#8217;s watermarking approach influences which words are chosen without degrading the resulting text.<br><br>Before each word is chosen, a random number is generated based on a secret watermarking key and the context of recently generated words. This random number is used to score potential word choices, which compete against each other in a tournament bracket system until only one word remains.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!CPuu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9324e80a-6f8b-4ba3-87a4-989b17a3e4e8_1200x400.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!CPuu!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9324e80a-6f8b-4ba3-87a4-989b17a3e4e8_1200x400.heic 424w, https://substackcdn.com/image/fetch/$s_!CPuu!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9324e80a-6f8b-4ba3-87a4-989b17a3e4e8_1200x400.heic 848w, https://substackcdn.com/image/fetch/$s_!CPuu!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9324e80a-6f8b-4ba3-87a4-989b17a3e4e8_1200x400.heic 1272w, https://substackcdn.com/image/fetch/$s_!CPuu!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9324e80a-6f8b-4ba3-87a4-989b17a3e4e8_1200x400.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!CPuu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9324e80a-6f8b-4ba3-87a4-989b17a3e4e8_1200x400.heic" width="728" height="242.66666666666666" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9324e80a-6f8b-4ba3-87a4-989b17a3e4e8_1200x400.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:400,&quot;width&quot;:1200,&quot;resizeWidth&quot;:728,&quot;bytes&quot;:35775,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!CPuu!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9324e80a-6f8b-4ba3-87a4-989b17a3e4e8_1200x400.heic 424w, https://substackcdn.com/image/fetch/$s_!CPuu!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9324e80a-6f8b-4ba3-87a4-989b17a3e4e8_1200x400.heic 848w, https://substackcdn.com/image/fetch/$s_!CPuu!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9324e80a-6f8b-4ba3-87a4-989b17a3e4e8_1200x400.heic 1272w, https://substackcdn.com/image/fetch/$s_!CPuu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9324e80a-6f8b-4ba3-87a4-989b17a3e4e8_1200x400.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The reverse process is used to detect a watermark. The scoring of each word is compared against the candidates that could have been chosen. If it scores too highly against the random-number-driven preference, the text is considered watermarked. <br><br>You can read more about the details, and Google&#8217;s large-scale testing with Gemini, in their paper: <strong><a href="https://www.nature.com/articles/s41586-024-08025-4">https://www.nature.com/articles/s41586-024-08025-4</a></strong>.</p><div><hr></div><h2>Finally, It&#8217;s Banned&#8230;</h2><p>If you need proof that cryptographic standards move slowly, look no further.<br><br>Thirty-one years ago, Bruce Schneier lambasted ECB mode in his seminal book, Applied Cryptography. Finally, in 2024, it&#8217;s about to be banned in the standards.<br><br>Electronic codebook (ECB) is a block-cipher mode that describes how to encrypt long messages. ECB is the simplest possible mode: the message is divided into equal-sized blocks, encrypted, and then concatenated. However, this simplicity caused a lot of problems.<br><br>One major issue is that patterns in the message show through as patterns in the encrypted data. This is best demonstrated in the classic penguin image, which I&#8217;ve included in this post. There&#8217;s so much structure and repeated data in the original image that the encrypted version still looks like a penguin.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!oOyf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dd748ac-2186-41a0-9fdc-512cd5ba2266_1200x627.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!oOyf!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dd748ac-2186-41a0-9fdc-512cd5ba2266_1200x627.heic 424w, https://substackcdn.com/image/fetch/$s_!oOyf!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dd748ac-2186-41a0-9fdc-512cd5ba2266_1200x627.heic 848w, https://substackcdn.com/image/fetch/$s_!oOyf!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dd748ac-2186-41a0-9fdc-512cd5ba2266_1200x627.heic 1272w, https://substackcdn.com/image/fetch/$s_!oOyf!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dd748ac-2186-41a0-9fdc-512cd5ba2266_1200x627.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!oOyf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dd748ac-2186-41a0-9fdc-512cd5ba2266_1200x627.heic" width="728" height="380.38" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7dd748ac-2186-41a0-9fdc-512cd5ba2266_1200x627.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:627,&quot;width&quot;:1200,&quot;resizeWidth&quot;:728,&quot;bytes&quot;:91537,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!oOyf!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dd748ac-2186-41a0-9fdc-512cd5ba2266_1200x627.heic 424w, https://substackcdn.com/image/fetch/$s_!oOyf!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dd748ac-2186-41a0-9fdc-512cd5ba2266_1200x627.heic 848w, https://substackcdn.com/image/fetch/$s_!oOyf!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dd748ac-2186-41a0-9fdc-512cd5ba2266_1200x627.heic 1272w, https://substackcdn.com/image/fetch/$s_!oOyf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dd748ac-2186-41a0-9fdc-512cd5ba2266_1200x627.heic 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Despite this problem (and others), ECB was widely adopted. Unfortunately, this made it very difficult to erase. Cryptographic standards have complex inter-dependencies, which makes it hard to remove a foundational ingredient like a cipher mode. It&#8217;s taken many years to get to the point where ECB can finally be killed.<br><br>Remember, just because something is standardised doesn&#8217;t mean it&#8217;s the best choice. Always do your research to find the best option.</p><div><hr></div><h2>Thanks, GSMA!</h2><p>Here&#8217;s something post-quantum fans should bookmark.<br><br>The GSMA has compiled a list of governmental guidance on the transition to post-quantum. For each country, you get links to the official documents alongside a summary of their timeline requirements and preferred algorithms.<br><br>It was last updated in early October, so it&#8217;s reasonably fresh. It has data for Australia, Canada, China, the Czech Republic, the European Union, France, Germany, Italy, Japan, Netherlands, New Zealand, Singapore, South Korea, Spain, the United Kingdom, and the United States.<br><br>Bookmark this link: <strong><a href="https://www.gsma.com/newsroom/post-quantum-government-initiatives-by-country-and-region/">https://www.gsma.com/newsroom/post-quantum-government-initiatives-by-country-and-region/</a></strong>.</p>]]></content:encoded></item><item><title><![CDATA[Chasing Cyber - #34 - In NIST We Trust?]]></title><description><![CDATA[Key lengths, key algorithms, and key hardware]]></description><link>https://chasingcyber.com/p/chasing-cyber-34-in-nist-we-trust</link><guid isPermaLink="false">https://chasingcyber.com/p/chasing-cyber-34-in-nist-we-trust</guid><dc:creator><![CDATA[Duncan Jones]]></dc:creator><pubDate>Mon, 28 Oct 2024 07:01:56 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/6407eb52-d27b-46f1-8dca-d2c757d68ce8_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Did NIST Just Leave a Security Hole?</h2><p>Don&#8217;t bother lengthening your RSA keys, says NIST. Just move straight to quantum-safe algorithms. But does that leave a security gap?<br><br>The new rules come from NIST SP 800-131A Rev. 3, which is out for public comment.&nbsp;&nbsp;There&#8217;s too much in this document to cover in one post. But I want to zoom in on the rules around key strengths.<br><br>In previous documents, NIST set a 2030 deadline for transitioning from 112-bit security to 128-bit security. This meant moving from to 3072-bit RSA or 256-bit ECDSA or stronger.<br><br>Since then, post-quantum algorithms have been standardised, and NIST feels it&#8217;s&nbsp;unfair to expect two big shifts in cryptography in a small space of time. As a result, they are encouraging organizations to shift directly from 112-bit security to post-quantum.<br><br>This is pragmatic and will reduce costs. But it does leave a security hole.<br><br>To give organisations time to move to post-quantum, they're removing the 2030 ban on 112-bit security. Instead, it will be merely deprecated. Meanwhile, there isn&#8217;t yet a NIST timeline for moving to post-quantum algorithms. I assume the date will be significantly after 2035 since that is the timeline for federal government migrations.<br><br>Why is this important? Well, it means a system in 2036 (perhaps) might be running on only 2048-bit RSA. Not only is this system more vulnerable to classical attacks, but 2036 is also right in the range of when quantum computers might break cryptography. And you need a less powerful quantum computer to break 2048-bit than longer bit lengths.<br><br>I shall be submitting a comment to suggest they rethink this approach. Yes, it will be harder to make two shifts. However, we know from experience that people avoid changing cryptography unless they are forced to do so. And even then, they drag their heels.<br><br>Let me know in a reply if you agree or disagree with this.</p><div><hr></div><h2>Cryptanalysis in Short Supply</h2><p>With the fuss around the new PQC standards, it&#8217;s easy to forget NIST is still hunting for new signature algorithms. <br><br>Last week, the selection process entered its second round, with 14 candidates surviving from a pool of 40. This round of analysis will last up to eighteen months and will be followed by a third and final round.<br><br>Worryingly, NIST noted that &#8220;<em>some of the second-round candidates have received little or no published cryptanalysis</em>&#8221;. <br><br>Perhaps the academic community has grown tired of examining dozens of algorithms. Or maybe they&#8217;re focusing on breaking the new standards since that brings far more kudos...<br><br>You can read the report from NIST here: <strong><a href="https://csrc.nist.gov/pubs/ir/8528/final">https://csrc.nist.gov/pubs/ir/8528/final</a></strong>.</p><div><hr></div><h2>CPU, GPU, &#8230; VPU?</h2><p>Have you ever heard of a verifiable processing unit (VPU)? Me neither. But a startup claims VPUs will revolutionise high-performance cryptography, like GPUs revolutionised AI.<br><br>The company, Fabric, argues that high-performance cryptography needs hardware acceleration. However, the options available today are not great. Either you try your best with GPUs, which are not designed for cryptographic operations, or you spend a lot of money to build custom silicon.<br><br>They are working on a third option &#8211; a brand-new type of chip, with an instruction set designed to accelerate trendy crypto operations, like zero-knowledge proofs and fully homomorphic encryption.<br><br>I&#8217;ve never met the team at Fabric and have no idea if their technology is sound. But I shall watch with interest to see if the concept of a VPU takes off.<br><br>You can read a one-sided and investor-focused overview of their technology here: <strong><a href="https://www.blockchaincapital.com/blog/the-dawn-of-a-new-era-in-cryptography-with-fabrics-innovative-vpu-technology">https://www.blockchaincapital.com/blog/the-dawn-of-a-new-era-in-cryptography-with-fabrics-innovative-vpu-technology</a></strong>.<br><br>Separately, this reminds me of the ongoing efforts to build a memory-safe processor architecture, which started as the CHERI project at Cambridge University. The CHERI team has since partnered with ARM and Microsoft to bring this closer to reality: <strong><a href="https://newsroom.arm.com/news/morello-research-program-hits-major-milestone-with-hardware-now-available-for-testing">https://newsroom.arm.com/news/morello-research-program-hits-major-milestone-with-hardware-now-available-for-testing</a></strong>.</p>]]></content:encoded></item><item><title><![CDATA[Chasing Cyber - #33 - Interesting Papers]]></title><description><![CDATA[Speculation, military radar, and pizza delivery systems]]></description><link>https://chasingcyber.com/p/chasing-cyber-33-interesting-papers</link><guid isPermaLink="false">https://chasingcyber.com/p/chasing-cyber-33-interesting-papers</guid><dc:creator><![CDATA[Duncan Jones]]></dc:creator><pubDate>Mon, 21 Oct 2024 06:01:34 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/1ed14b22-745f-423b-a5f1-48da3e3c4653_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Yes, My Tin Foil Hat is On</h2><p>Were the recent Salt Typhoon attacks a hack-now, decrypt-later strategy?<br><br>The Chinese-backed group gained persistent access to telecom networks in the United States, seemingly with access to large amounts of encrypted data. Though they appear to have targeted federal wiretap systems, news reports suggest they had access to miscellaneous Internet traffic as well.<br><br>Stolen encrypted traffic could be attacked using a powerful quantum computer in as little as 10-15 years. And by examining metadata related to the connections (such as source/destination info), the masses of data could be prioritised for decryption.<br><br>This is wild speculation, of course. Hypocritical even, since I&#8217;ve recently denounced inflated media claims about Chinese activities. However, I&#8217;m flagging this because it&#8217;s a reminder of the need to accelerate the deployment of post-quantum cryptography.<br><br>We must assume nation-states are in our global networks, sniffing for interesting traffic. The sooner we can protect that with quantum-resistant technology, the better.<br><br>Even if Salt Typhoon isn&#8217;t gathering encrypted transmissions, it is a worrying reminder that powerful nations don&#8217;t struggle to infiltrate our systems.<br><br>Let me know in a reply if you think I&#8217;m being paranoid! And a hat-tip to <a href="https://www.linkedin.com/in/roystephan-cyber/">Roy Stephan</a> for planting this question in my head.</p><p><em>P.S. I messed up my LinkedIn scheduling, so this post has already been published. You can join the <strong><a href="https://www.linkedin.com/posts/duncanjones_quantum-cybersecurity-cryptography-activity-7253668793913151488-KDeS?utm_source=share&amp;utm_medium=member_desktop">conversation in the replies</a></strong>.</em></p><div><hr></div><h2>Is Multi-Party Computation on the Radar?</h2><p>This interesting paper shows how multi-party computation (MPC) could solve a real-world problem: military radar fingerprinting among allies.<br><br>Radar fingerprinting identifies vessels based on the unique characteristics of the radar signal they emit. Tiny imperfections in the radar systems &#8211; like oscillator drift, power amplifier characteristics, or antenna configurations &#8211; create subtle variations in the transmitted signal.<br><br>Each country has a secret fingerprint database based on the vessels they&#8217;ve encountered. Allowing full access to this database, even to allied countries, would be challenging due to national security regulations. However, MPC can offer a neat solution to help allies identify vessels without sharing the crown jewels.<br><br>Read the paper for a deeper dive into the trade-offs made in such a solution and to learn more about MPC. However, the takeaway is that the authors demonstrate this solution would work in practice. Using an example scenario of a ship approaching an offshore installation at speed, they conclude that the ship can be identified within 400 seconds, with an unoptimized implementation.<br><br>Link to the paper: <strong><a href="https://eprint.iacr.org/2024/1590">https://eprint.iacr.org/2024/1590</a></strong>.</p><div><hr></div><h2>Why Encryption Is a Bit Like Ordering Pizza</h2><p>I can&#8217;t decide if this is deranged or brilliant. I think I&#8217;m leaning towards brilliant.<br><br>It&#8217;s a paper full of analogies to help you discuss cryptography and the quantum threat. I often find the right analogy is critical when telling stories about technology. For instance, talking about padlocks and keys has helped me explain the difference between cryptography algorithms and randomness to a wide range of audiences.<br><br>This paper provides analogies for a wide range of subjects, from the basics of cryptography to network security. The analogies are amusingly varied, including pizza delivery systems, trains, and aircraft flight dynamics.<br><br>Read the paper here: <strong><a href="https://eprint.iacr.org/2024/1487">https://eprint.iacr.org/2024/1487</a></strong>.</p>]]></content:encoded></item><item><title><![CDATA[Chasing Cyber - #32 - Crypto Mistakes]]></title><description><![CDATA[Chinese whispers, stolen Bitcoin, and leaky clouds.]]></description><link>https://chasingcyber.com/p/chasing-cyber-32-crypto-mistakes</link><guid isPermaLink="false">https://chasingcyber.com/p/chasing-cyber-32-crypto-mistakes</guid><dc:creator><![CDATA[Duncan Jones]]></dc:creator><pubDate>Mon, 14 Oct 2024 06:02:55 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/c1728d1b-3dfd-4f93-a289-c7dd6adfa9ae_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Chinese Whispers</h2><p>Have the Chinese broken &#8220;military-grade encryption&#8221; using quantum computers, as claimed in the media?</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PBrj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8329980-63ff-46a0-a84f-a33f8401b7db_1200x627.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PBrj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8329980-63ff-46a0-a84f-a33f8401b7db_1200x627.heic 424w, https://substackcdn.com/image/fetch/$s_!PBrj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8329980-63ff-46a0-a84f-a33f8401b7db_1200x627.heic 848w, https://substackcdn.com/image/fetch/$s_!PBrj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8329980-63ff-46a0-a84f-a33f8401b7db_1200x627.heic 1272w, https://substackcdn.com/image/fetch/$s_!PBrj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8329980-63ff-46a0-a84f-a33f8401b7db_1200x627.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PBrj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8329980-63ff-46a0-a84f-a33f8401b7db_1200x627.heic" width="1200" height="627" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e8329980-63ff-46a0-a84f-a33f8401b7db_1200x627.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:627,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:107835,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!PBrj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8329980-63ff-46a0-a84f-a33f8401b7db_1200x627.heic 424w, https://substackcdn.com/image/fetch/$s_!PBrj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8329980-63ff-46a0-a84f-a33f8401b7db_1200x627.heic 848w, https://substackcdn.com/image/fetch/$s_!PBrj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8329980-63ff-46a0-a84f-a33f8401b7db_1200x627.heic 1272w, https://substackcdn.com/image/fetch/$s_!PBrj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8329980-63ff-46a0-a84f-a33f8401b7db_1200x627.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Of course not. But let&#8217;s use this as an example of distinguishing fact from fiction in the world of cryptanalysis.</p><p>In this case, Chinese scientists claim to have worked with a quantum annealing company to demonstrate attacks against substitution&#8211;permutation network (SPN) structures. </p><p>The AES algorithm relies on SPN structures to operate. Remember those &#8220;S-boxes&#8221; you&#8217;ve seen in diagrams about AES? That&#8217;s what we are talking about. </p><p>However, breaking one SPN-based algorithm doesn&#8217;t bring you closer to another. In this case, it seems like the Chinese have broken some toy algorithms that happen to use SPN structures. And the media have translated this into &#8220;AES broken, world ends&#8221;.</p><p>But we don&#8217;t need to pick apart the details to realise these media claims are nonsense. We just need to apply a modicum of common sense. If you were the Chinese military and you had just broken AES, what would you do?</p><p>I suspect speaking to the South China Morning Post would be quite far down your priority list. Instead, you would maximise your informational advantage, without revealing you&#8217;ve broken a critical global cipher. </p><p>Any major cryptographic break, whether from academics or government spooks, would follow the same pattern. Either you wouldn&#8217;t hear about it, or someone would post definitive evidence. It would likely be the former since the spooks are quite good at suppressing these things.</p><p>Shame on the journalists for allowing their headline writers to get away with murder.</p><div><hr></div><h2>The Vanishing Bitcoin Trick</h2><p>Imagine inventing a new attack against Bitcoin, only to discover the criminals beat you to it. Here&#8217;s the story of how $10 million vanished without a trace&#8230;<br><br>First, some background. Bitcoin uses the Elliptic Curve Digital Signature Algorithm (ECDSA) for transaction security. It&#8217;s difficult to write a good ECDSA implementation because small mistakes can reveal your private key.<br><br>ECDSA relies on nonces, which are random numbers used only once during a cryptographic operation. Small weaknesses in your ECDSA nonces can be exploited to reverse-engineer your private key.<br><br>In 2023, researchers discovered a new flaw in ECDSA nonce generation related to weak random number generators. With this attack, dubbed Polynonce, tiny correlations between the random numbers in the nonces and the private key were exploited to break the private key.<br><br>Curious about the impact of this attack, the researchers downloaded the entire Bitcoin transaction history. They discovered over 700 wallets that exhibited evidence of this weakness. But here&#8217;s the catch &#8211; someone beat them to it. <br><br>The wallets were all empty.<br><br>Digging further into the transactions, they concluded at least $10 million was stolen because of this Polynonce weakness. These thefts were unreported until that point, which makes me wonder how many other undiscovered attacks there are on weak randomness or other ECDSA vulnerabilities.<br><br>I recommend reading this blog for more details on the research behind Polynonce: <strong><a href="https://research.kudelskisecurity.com/2023/03/06/polynonce-a-tale-of-a-novel-ecdsa-attack-and-bitcoin-tears/">https://research.kudelskisecurity.com/2023/03/06/polynonce-a-tale-of-a-novel-ecdsa-attack-and-bitcoin-tears/</a></strong>. </p><p><em>Thanks to <a href="https://www.linkedin.com/in/kevin-milner-a53b59182/">Kevin Milner</a> for drawing this to my attention.</em></p><div><hr></div><h2>End-to-End Security (Ish)</h2><p>A recent paper exposed vulnerabilities in four major providers of end-to-end (E2E) encryption for public clouds.</p><p>The providers involved are not household names, yet they are leaders in the E2E encryption space. Their websites claim they are trusted by organizations such as the German and Canadian governments, Amnesty International, SAP, and many others.</p><p>The goal of these E2E solutions is to protect confidential data from malicious or compromised cloud providers. Users should have full control of the data, as well as the encryption keys that protect it.</p><p>The paper tells a different story. The researchers found basic cryptographic errors in 4 out of 5 providers, including lack of authentication, protocol downgrade attacks, and link-sharing exploits.</p><p>Quoting from the paper:</p><blockquote><p><em>&#8220;Not all of our attacks are sophisticated in nature, which means that they are within reach of attackers who are not necessarily skilled in cryptography. Indeed, our attacks are highly practical and can be carried out without significant resources. Additionally, while some of these attacks are not novel from a cryptographic perspective, they emphasise that E2EE cloud storage as deployed in practice fails at a trivial level and often does not require more profound cryptanalysis to break.&#8221;</em></p></blockquote><p>Read the full details here (PDF): <a href="https://eprint.iacr.org/2024/1616.pdf">https://eprint.iacr.org/2024/1616.pdf</a>.</p><p>Given the trivial nature of these attacks, I doubt any penetration testing was performed on these systems. I suggest this serves as a warning for anyone buying sophisticated encryption systems: do your homework. Probe the providers to understand who has assessed their systems. Ask for previous penetration testing reports and be deeply suspicious of any perfect &#8220;nothing found&#8221; scores.</p>]]></content:encoded></item><item><title><![CDATA[Chasing Cyber - #31 - Myth Busting]]></title><description><![CDATA[Public Wi-Fi, QKD confusion, and Amazon's big decision.]]></description><link>https://chasingcyber.com/p/chasing-cyber-31-myth-busting</link><guid isPermaLink="false">https://chasingcyber.com/p/chasing-cyber-31-myth-busting</guid><dc:creator><![CDATA[Duncan Jones]]></dc:creator><pubDate>Mon, 07 Oct 2024 06:01:51 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/afc0ccea-4442-4654-b554-46637fd77d10_1200x627.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Does Coffee Shop Wi-Fi Give You Jitters?</h2><p>Unpopular opinion: you don't need a VPN to use public Wi-Fi.<br><br>Consumer VPN vendors want you to fear the Starbucks Wi-Fi. However, with recent enhancements to cryptographic protocols, the risks are dwindling.<br><br>For years it's been safe to exchange confidential data using public Wi-Fi. TLS protects every important service you access, including online banking and work emails. The data is end-to-end encrypted, offering no option for an evil employee to spy on it.<br><br>Now, privacy is a different matter. Some folks don't want the Wi-Fi owner to know which websites they are visiting. There are two ways this information can leak, and both routes are becoming less viable.<br><br>The first is through DNS queries. Historically, these have been sent in plaintext, which exposes the website you want to visit. However, modern browsers support encrypted DNS queries, which plugs this gap.<br><br>The second leak is via TLS handshakes. One of the messages sent during the handshake is the ClientHello, which exposes plaintext information about the server you want to connect to. However, a solution is on the way, called encrypted ClientHello (ECH). A <strong><a href="https://datatracker.ietf.org/doc/draft-ietf-tls-esni/">draft RFC</a></strong> is nearing completion, and major players, including Cloudflare and Mozilla, are supporting the initiative.<br><br>Once all these pieces are in place, public Wi-Fi will be risk-free. Even today, the biggest risk is that a skilled hacker might figure out which domains you visit, but they won&#8217;t be able to see the specific pages you access. For most of us, that's not a big deal.<br><br>If you're paranoid enough to worry about that, what makes you think you can trust a $5/month VPN provider?<br><br><em>P.S. Thanks to <a href="https://www.linkedin.com/in/billatnapier/">Prof Bill Buchanan</a> for writing about this recently - I wasn't aware of ECH until then.</em></p><div><hr></div><h2>Myth-Busting Quantum Key Distribution</h2><p>&#8220;Quantum key distribution doesn't improve security because it relies on a classical authentication channel.&#8221;<br><br>I still hear this viewpoint being touted by people who, frankly, ought to know better. To explain why this is wrong, we need to consider something called "everlasting security".<br><br>A key exchange protocol that exhibits everlasting security is immune to future advances in cryptanalysis. Even if the algorithms used in the key exchange are broken, the keys will not be revealed.<br><br>QKD offers everlasting security, provided the authentication channel is not broken during the execution of the protocol. Said another way, an attacker would have to possess a zero-day exploit for the classical channel and execute it during the time it takes for the QKD protocol to complete. If this is not accomplished, the keys remain secure indefinitely.<br><br>This is a stronger guarantee than offered by key exchanges that rely on public-key cryptography. Here, an attacker could record the exchange and attack it in the future, using advances in cryptanalysis. For example, if ECDSA was broken in two years, an attacker could decrypt the recorded key exchange and steal the key. This would not be possible if QKD were used.<br><br>That being said, QKD faces many challenges that prevent its widespread adoption. So we will continue with classical key exchanges for quite some time!</p><div><hr></div><h2>Amazon&#8217;s Subtle But Important Decision</h2><p>AWS services now prioritise post-quantum security over performance.<br><br>If a connecting client advertises support for PQC algorithms, the server will select them, even if it introduces additional round-trip times.<br><br><strong>This decision is more important than it seems.</strong><br><br>AWS could have taken a different path, preferring well-established classical algorithms unless the client forced the selection of PQC algorithms. However, they've opted to use PQC by default.<br><br>If AWS left it to clients to mandate PQC algorithms, the global migration would be slower, and we would discover errors and issues further down the path.<br><br>I hope other service providers follow suit so the transition to PQC will be as seamless as possible.<br><br>You can read more about Amazon's work here: <strong><a href="https://aws.amazon.com/blogs/security/customer-compliance-and-security-during-the-post-quantum-cryptographic-migration/">https://aws.amazon.com/blogs/security/customer-compliance-and-security-during-the-post-quantum-cryptographic-migration/</a></strong>.</p>]]></content:encoded></item><item><title><![CDATA[Chasing Cyber - #30 - And we're back...]]></title><description><![CDATA[Deep learning, love for Deloitte, and the real meaning of "crypto".]]></description><link>https://chasingcyber.com/p/chasing-cyber-30-and-were-back</link><guid isPermaLink="false">https://chasingcyber.com/p/chasing-cyber-30-and-were-back</guid><dc:creator><![CDATA[Duncan Jones]]></dc:creator><pubDate>Mon, 30 Sep 2024 06:01:40 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/0343d44d-4170-4228-bc39-795374848e10_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Apologies for the <a href="https://www.dictionary.com/e/slang/irish-goodbye/">Irish goodbye</a>, six months ago. Eventually, a few folks asked where my newsletter had gone, so thank you to those kind souls.</p><p>I&#8217;m going to just pretend my hiatus didn&#8217;t happen, and leap straight into edition #30&#8230;</p><div><hr></div><h2>Deep Learning Meets Quantum</h2><p>This is cool. MIT researchers claim to have used the quantum properties of light to increase the security of deep-learning computation.<br><br>The proposed protocol allows a client to securely perform inference on their own data, using a model generated by a central server. The security of the model is preserved because the client is unable to store the model weights sent by the server (thanks to quantum behaviour). And the client data is preserved because the inference is performed locally, avoiding sending sensitive data to the cloud.<br><br>This nicely fits real-world ML use cases, such as a doctor wanting to perform analysis on sensitive patient data, using a proprietary model owned by a third party.<br><br>The MIT article does a great job of explaining how the protocol works (and links to the underlying paper). Interested readers should learn more here: <a href="https://news.mit.edu/2024/new-security-protocol-shields-data-during-cloud-based-computation-0926">https://news.mit.edu/2024/new-security-protocol-shields-data-during-cloud-based-computation-0926</a>.<br><br>This project reminds us that quantum cybersecurity isn't just about quantum randomness and key distribution.</p><div><hr></div><h2>Deloitte Sets the Tone</h2><p>Deloitte's recent white paper is a big deal for the QRNG industry. Here&#8217;s why:<br><br>Firstly, a credible third party is weighing in on the topic. It&#8217;s one thing for people like me to gush about QRNGs since my company is knee-deep in the game. But for Deloitte to stick their neck out on the topic is quite another.<br><br>Consumers of advanced products struggle to separate hype from reality. When measured opinions emerge from companies like Deloitte, it helps buyers comprehend the menu in front of them.<br><br>Secondly, it provides a language framework to use. Language matters around new technology. We&#8217;ve seen in the broader quantum world how hard it is to wrestle with &#8220;advantage&#8221; vs &#8220;supremacy&#8221; vs &#8220;utility&#8221; and so forth. In the QRNG world, we&#8217;ve also struggled with terminology, around what it means to be &#8220;proven&#8221; or to be &#8220;truly random&#8221; (if such a thing exists).<br><br>The paper solves this by defining four levels of security for random number generators. Level 3 is the typical quality level found in cryptosystems, and it falls short of Level 4 because it cannot prove the quality of the output. Only QRNGs can inhabit Level 4, although most are still stuck in Level 3.<br><br>Finally, papers like this encourage standards bodies to take note. The consultancies are focusing on QRNGs because their customers are asking. The standards bodies need to be ready to adapt to the changes in front of them. The framework proposed in this paper could find its way into the standards one day.<br><br>You can read the Deloitte paper here (PDF): <a href="https://www.deloitte.com/content/dam/assets-shared/docs/services/risk-advisory/2024/qrng-what-is-the-fuss-all-about.pdf">https://www.deloitte.com/content/dam/assets-shared/docs/services/risk-advisory/2024/qrng-what-is-the-fuss-all-about.pdf</a><br><br>Congrats to the authors: <a href="https://www.linkedin.com/in/itanbarmes/">Itan Barmes</a>, <a href="https://www.linkedin.com/in/colin-soutar-9430724/">Colin Soutar</a>, and <a href="https://www.linkedin.com/in/carlosabellan/">Carlos Abellan</a>.</p><div><hr></div><h2>Maybe They Wrote It Badly First Time?</h2><p>A post for the crypto geeks. (And I mean <em>cryptography</em>, obviously.)<br><br>Though I regularly comment on the quantum side of cyber, it's great to know folks are still paying attention to the algorithms that got us this far.<br><br>In particular, a recent blog from Amazon gives a great overview of how elliptic curve cryptography works, and how they've painstakingly optimized it for better performance and security.<br><br>In one setting, they saw an 86% increase in performance through these changes. Impressive!<br><br>There's also some interesting commentary around proving algorithm correctness at the assembly level, which means their proofs are independent to the compiler.<br><br>You can read the gory details here: <a href="https://www.amazon.science/blog/better-performing-25519-elliptic-curve-cryptography">https://www.amazon.science/blog/better-performing-25519-elliptic-curve-cryptography</a>.</p>]]></content:encoded></item><item><title><![CDATA[Chasing Cyber - #29 - Where's My Wallet?]]></title><description><![CDATA[Digital IDs, post-quantum TLS, and Lava Lamps]]></description><link>https://chasingcyber.com/p/chasing-cyber-29-wheres-my-wallet</link><guid isPermaLink="false">https://chasingcyber.com/p/chasing-cyber-29-wheres-my-wallet</guid><dc:creator><![CDATA[Duncan Jones]]></dc:creator><pubDate>Mon, 11 Mar 2024 07:00:33 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/3582027d-2ffd-4d60-89e4-5d10db05b055_1200x627.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Goodbye Leather Wallets</h2><p>Europe is one step away from agreeing to an EU-wide digital wallet. This is pretty cool!</p><p>The new wallets would serve as a form of digital identity, as well as proof of personal attributes (such as an educational degree). It could also be used to produce qualified electronic signatures, which are legally binding in EU courts.</p><p>Interestingly, the European parliament has mandated wallet software be open-source, in the interest of security. A bold step, which makes a lot of sense, given the long history of shoddy cryptography in closed systems. </p><p>There is also a strong encouragement to use zero-knowledge proofs. Relying parties should be able to &#8220;<em>validate whether a given statement based on the person&#8217;s identification data and attestation of attributes is true, without revealing any data on which that statement is based, thereby preserving the privacy of the user</em>&#8221;. It&#8217;s great to see advanced cryptography concepts being written into policy.</p><p>Sadly, in a post-Brexit world, I&#8217;ll have to watch with envy from the shores of Britain. Missing out on this cool technology may hurt even more than the &#8220;All Passports&#8221; lane.</p><div><hr></div><h2>PQC Is Coming to TLS&#8230; Slowly</h2><p>Cloudflare reports that 1-2% of TLS connections use post-quantum algorithms today.</p><p>Almost all of that traffic comes from Google Chrome users. Roughly 10% of Google Chrome users have PQC algorithms enabled, according to Cloudflare.</p><p>On the one hand, this sub-2% figure seems pitiful. But when you consider how much traffic Cloudflare handles, you realise these post-quantum algorithms are getting hammered at scale.</p><p>Brave readers can check out <strong><a href="https://blog.cloudflare.com/pq-2024">Cloudflare&#8217;s blog</a></strong>. It&#8217;s a 10,000-word dissertation, covering everything from why we need PQC algorithms to performance metrics for individual algorithms.</p><div><hr></div><h2>Some Random Ideas</h2><p>People have tried some very weird tricks to generate random data.</p><p>I recently <strong><a href="https://www.darkreading.com/remote-workforce/creating-security-through-randomness">spotted a blog</a></strong> which walks through some of the more esoteric ideas employed by companies like Cloudflare.</p><p>You may have heard about their Lava Lamp wall. But did you know each Cloudflare office has a different gimmick installed in the foyer, ranging from pendulums to overgrown baby mobiles?</p><p>Elsewhere, different organisations are measuring seismic activity or looking at atmospheric static and pulsars to try and find something unpredictable. </p><p>It&#8217;s almost sad that these ideas will soon be a nostalgic curiosity of the past. Nowadays, quantum technology allows us to generate provably random data. And while mixing sources of randomness is always a healthy idea, we won&#8217;t be needing walls of Lava Lamps to protect the internet going forward.</p><p>I hope people keep doing weird things to generate randomness. It&#8217;s fun to see what ideas get invented. But with my security hat on, I&#8217;m glad we will be relying on stronger quantum foundations in the years ahead.</p>]]></content:encoded></item><item><title><![CDATA[Chasing Cyber - #28 - Debt]]></title><description><![CDATA[Shor's Algorithm, careful coding, and cryptographic debt]]></description><link>https://chasingcyber.com/p/chasing-cyber-28-debt</link><guid isPermaLink="false">https://chasingcyber.com/p/chasing-cyber-28-debt</guid><dc:creator><![CDATA[Duncan Jones]]></dc:creator><pubDate>Mon, 04 Mar 2024 07:01:24 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/b29f330a-a53e-4925-9e24-3135b2d4b6f7_1200x627.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Fewer Qubits for Shor</h2><p>A new paper claims to reduce the qubits needed to run Shor&#8217;s Algorithm. The updated approach requires fewer than 1,700 logical qubits to break a 2048-bit RSA key.</p><p>Should we panic? Probably not.</p><p>As with most attempts to optimise Shor&#8217;s Algorithm, trade-offs are being made. In this case, the consequence of reducing logical qubits is a significant increase in gate count (by a factor of 1,000). So it&#8217;s hard to judge whether &#8220;Y2Q&#8221; has gotten closer as a result.</p><p>And yet, each paper like this is a reminder that science doesn&#8217;t stand still. On the one hand, quantum computers are becoming more error-resistant and powerful each day. On the other hand, algorithm specialists are continually trying to optimise Shor&#8217;s Algorithm with papers like this.</p><p>All the more reason to take the quantum threat seriously and start planning!</p><p>You can check out the paper here: <strong><a href="https://eprint.iacr.org/2024/222">https://eprint.iacr.org/2024/222</a></strong>.</p><div><hr></div><h2>Pop Quiz</h2><p>Can you spot the cryptographic coding error in this picture?</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!n6WI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89627779-3724-4a2e-80ad-c7615135db6f_1200x627.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!n6WI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89627779-3724-4a2e-80ad-c7615135db6f_1200x627.png 424w, https://substackcdn.com/image/fetch/$s_!n6WI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89627779-3724-4a2e-80ad-c7615135db6f_1200x627.png 848w, https://substackcdn.com/image/fetch/$s_!n6WI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89627779-3724-4a2e-80ad-c7615135db6f_1200x627.png 1272w, https://substackcdn.com/image/fetch/$s_!n6WI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89627779-3724-4a2e-80ad-c7615135db6f_1200x627.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!n6WI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89627779-3724-4a2e-80ad-c7615135db6f_1200x627.png" width="1200" height="627" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/89627779-3724-4a2e-80ad-c7615135db6f_1200x627.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:627,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:155997,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!n6WI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89627779-3724-4a2e-80ad-c7615135db6f_1200x627.png 424w, https://substackcdn.com/image/fetch/$s_!n6WI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89627779-3724-4a2e-80ad-c7615135db6f_1200x627.png 848w, https://substackcdn.com/image/fetch/$s_!n6WI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89627779-3724-4a2e-80ad-c7615135db6f_1200x627.png 1272w, https://substackcdn.com/image/fetch/$s_!n6WI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89627779-3724-4a2e-80ad-c7615135db6f_1200x627.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Look carefully!</p><p>If you can&#8217;t spot it, you might want to read this excellent article about constant-time cryptography: </p><p><strong><a href="https://www.chosenplaintext.ca/articles/beginners-guide-constant-time-cryptography.html">https://www.chosenplaintext.ca/articles/beginners-guide-constant-time-cryptography.html</a></strong></p><p>Constant-time algorithm implementation is critical for avoiding a whole bunch of nasty side-channel attacks in cryptography. And this article does a great job of introducing the topic to non-technical newcomers. Take a peek!</p><div><hr></div><h2>On Cryptographic Debt</h2><p>Let&#8217;s talk about cryptographic debt, and how it spawned a presidential memo and a multi-billion dollar industry.</p><p>Cryptographic debt accumulates through years of bad security decisions taken in the interest of speed or as a result of ignorance. Much like technical debt, which plagues software development projects, cryptographic debt has to be repaid. And the longer you leave it, the more painful it becomes.</p><p>Examples of cryptographic debt include:</p><ul><li><p>Failing to implement key rotation.</p></li><li><p>Hard-coding algorithm choices.</p></li><li><p>Spattering crypto code throughout your project, instead of centralising it.</p></li><li><p>Not following (or even having) a cryptographic policy.</p></li><li><p>Losing track of where cryptography is being used.</p></li></ul><p>A critical consequence of cryptographic debt is an inability to adapt quickly to changing circumstances.</p><p>And so here we are, in 2024, needing to change a lot of algorithms to tackle the quantum threat. And companies are finding it very tough indeed. They&#8217;ve lost track of what cryptography is in use, which data lives where, and changing anything requires rewriting software from scratch.</p><p>The result? A presidential memo urging federal departments to take action, and a multi-billion dollar industry supporting organisations through the pain that lies ahead.</p><p>All of this should have been easy, had we baked crypto agility into our systems when we had the chance.</p><p>It&#8217;s important to recognise we now have a wonderful opportunity to build a better future. The quantum threat is forcing us to change all of our cryptographic systems. This means we can solve some of these problems once and for all, and develop a more agile and future-proofed set of technologies underpinning our cybersecurity.</p><p>I fear it won&#8217;t happen because it requires spending more than the minimum possible money. However, I suspect we&#8217;ll need more algorithmic changes in the years ahead, so it would be a wise decision to eliminate cryptographic debt while we have the chance.</p>]]></content:encoded></item><item><title><![CDATA[Chasing Cyber - #27 - Zeitgeist]]></title><description><![CDATA[Apple, RSA keys, and Daniel Bernstein]]></description><link>https://chasingcyber.com/p/chasing-cyber-27-zeitgeist</link><guid isPermaLink="false">https://chasingcyber.com/p/chasing-cyber-27-zeitgeist</guid><dc:creator><![CDATA[Duncan Jones]]></dc:creator><pubDate>Mon, 26 Feb 2024 07:00:39 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/64d3685f-dbfb-4778-9b48-b4bc70821c12_1200x627.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>This week, we&#8217;re returning to a blend of quantum cyber news and straight-up cryptography. Thank you to JJ for helping me steer the course of this newsletter! Let&#8217;s dive into the contents.</em></p><div><hr></div><h2>Apple Makes Post-Quantum Cool</h2><p>Everyone&#8217;s talking about Apple's PQ3 announcement, but most reports miss the point. The important thing is <strong>NOT</strong> the technology.</p><p>The real significance of Apple adding post-quantum security to iMessage is the impact on the zeitgeist.</p><p>In the UK, the BBC&#8217;s prime-time radio show dedicated three minutes to the topic. Ten million listeners learned about post-quantum security while cooking their bangers and mash.</p><p>Outlets like Bloomberg and Fast Company also reported on the news, driving awareness into executive minds across the world. I suspect opinion pieces will soon appear in other major outlets as their editors notice the splash Apple&#8217;s announcement has made.</p><p>This is coverage of post-quantum security at a scale we&#8217;ve never seen before.</p><p>A raft of similar high-profile announcements will no doubt follow, as organisations race to be seen as security thought leaders. We&#8217;ve already seen this on a smaller scale in the last year, with Signal, OpenSSL and Google making their first announcements.</p><p>2024 has started with a bang for PQC, and Apple has done the industry a huge favour by raising awareness to new heights. I&#8217;m excited to see what happens next as we steam towards NIST's publication of the final standards.</p><p>If you haven&#8217;t seen the Apple blog yet, <strong><a href="https://security.apple.com/blog/imessage-pq3/">check it out here</a></strong>.</p><div><hr></div><h2>RSA Key Fingerprinting</h2><p>Did you know RSA public keys have fingerprints that identify the cryptographic library that generated them?</p><p>In a paper from 2016, researchers studied sixty million keys generated by a range of open-source libraries and closed-source smartcards. By analysing the most significant byte of the public key modulus, distinct patterns were found.</p><p>These &#8220;fingerprints&#8221; can be used to identify which library generated a given key. The underlying patterns are caused by different approaches to the difficult task of prime number generation. The paper authors created heat maps, showing the likely distribution of bits, which are quite fascinating.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!L6f4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F355c5d7a-5511-4a79-8773-96ced8bfd262_1200x627.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!L6f4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F355c5d7a-5511-4a79-8773-96ced8bfd262_1200x627.png 424w, https://substackcdn.com/image/fetch/$s_!L6f4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F355c5d7a-5511-4a79-8773-96ced8bfd262_1200x627.png 848w, https://substackcdn.com/image/fetch/$s_!L6f4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F355c5d7a-5511-4a79-8773-96ced8bfd262_1200x627.png 1272w, https://substackcdn.com/image/fetch/$s_!L6f4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F355c5d7a-5511-4a79-8773-96ced8bfd262_1200x627.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!L6f4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F355c5d7a-5511-4a79-8773-96ced8bfd262_1200x627.png" width="1200" height="627" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/355c5d7a-5511-4a79-8773-96ced8bfd262_1200x627.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:627,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:367107,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!L6f4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F355c5d7a-5511-4a79-8773-96ced8bfd262_1200x627.png 424w, https://substackcdn.com/image/fetch/$s_!L6f4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F355c5d7a-5511-4a79-8773-96ced8bfd262_1200x627.png 848w, https://substackcdn.com/image/fetch/$s_!L6f4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F355c5d7a-5511-4a79-8773-96ced8bfd262_1200x627.png 1272w, https://substackcdn.com/image/fetch/$s_!L6f4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F355c5d7a-5511-4a79-8773-96ced8bfd262_1200x627.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>These fingerprints are not just a curiosity &#8211; they represent a potential cyber risk. If a vulnerability is discovered in a popular library, these fingerprints could be used to identify vulnerable keys in the wild. Similarly, fingerprinting could aid deanonymisation when using services like Tor.</p><p>You can see more of these cool graphs, and find links to the paper, on this website: <a href="https://rsa.sekan.eu/">https://rsa.sekan.eu/</a>. And a hat-tip to my colleague Kevin Milner for drawing my attention to this paper several months ago.</p><div><hr></div><h2>Hybrid Opinions</h2><p>Most post-quantum implementations, including Apple's PQ3, rely on a hybrid of traditional and PQC algorithms. So why are governments in the US and the UK still lukewarm on this concept?</p><p>In January, Daniel Bernstein posted an interesting blog with his views. It&#8217;s worth reading if you're building a quantum-safe system and are debating whether to go hybrid or not.</p><p>For those new to Bernstein's writing: brace yourself for conspiracy-theory vibes and plentiful jabs at NIST, the NSA, and allied organisations (like GCHQ). Yet, there is wisdom in what he writes. He carefully dissects the arguments against using hybrid modes and finds them wanting.</p><p>Check out his <a href="https://blog.cr.yp.to/20240102-hybrid.html">blog post here</a>.</p>]]></content:encoded></item><item><title><![CDATA[Chasing Cyber - #26 - Are You Ready?]]></title><description><![CDATA[PQC excuses, QKD speed-ups, plus bananas]]></description><link>https://chasingcyber.com/p/chasing-cyber-26-are-you-ready</link><guid isPermaLink="false">https://chasingcyber.com/p/chasing-cyber-26-are-you-ready</guid><dc:creator><![CDATA[Duncan Jones]]></dc:creator><pubDate>Mon, 19 Feb 2024 07:01:21 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/302b68f4-b6d3-41f1-a661-1191791cc427_1200x627.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Opinion: Too Many Heads Are in the Sand</h2><p>If NIST publishes their PQC standards tomorrow, would you be ready?</p><p>Today, you can dodge the issue. &#8220;I&#8217;d love to get started, but the standards aren&#8217;t out yet!&#8221; Soon that response won&#8217;t cut it any more.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!CylE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb74957c-f58e-495e-939a-cc125809967d_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!CylE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb74957c-f58e-495e-939a-cc125809967d_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!CylE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb74957c-f58e-495e-939a-cc125809967d_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!CylE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb74957c-f58e-495e-939a-cc125809967d_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!CylE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb74957c-f58e-495e-939a-cc125809967d_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!CylE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb74957c-f58e-495e-939a-cc125809967d_1024x1024.png" width="466" height="466" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bb74957c-f58e-495e-939a-cc125809967d_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:466,&quot;bytes&quot;:289575,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!CylE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb74957c-f58e-495e-939a-cc125809967d_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!CylE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb74957c-f58e-495e-939a-cc125809967d_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!CylE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb74957c-f58e-495e-939a-cc125809967d_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!CylE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb74957c-f58e-495e-939a-cc125809967d_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The NIST announcement will be global news. The broadsheets read by company board members will cover it. High-ranking executives will helicopter down to ask about plans for tackling the quantum threat. You&#8217;ll be quizzed about store-now, decrypt-later attacks, and cryptographic inventories.</p><p>Hopefully, as a reader of my newsletter, you&#8217;re already thinking about this stuff. But if you&#8217;re a serial can-kicker, remember we might be less than 100 days from new PQC standards. And the deafening boom of a starting gun.</p><div><hr></div><h2>Faster QKD at Long Distances</h2><p>A new paper from TU Eindhoven proposes a CV-QKD scheme with key rates far higher than typically assumed limits.</p><p>The scheme targets long-distance communications and relies on the use of unusual error-correcting codes. Typically these codes are impractical to implement because they require too much memory. But in long-distance CV-QKD, the low rates make it feasible to consider.</p><p>As a reminder, CV-QKD (or "continuous-variable" QKD) is an attractive technology because it operates at normal telecom wavelengths. This paper seems interesting because it explores higher key establishment rates at long distances, which will be a typical deployment model for QKD. </p><p>I freely admit this paper is beyond me mathematically, so I'll leave interested readers to conclude whether they find this result plausible and/or exciting.</p><p>You can find the paper here: <strong><a href="https://arxiv.org/abs/2402.04770">https://arxiv.org/abs/2402.04770</a></strong>.</p><div><hr></div><h2>European Telcos Go Bananas for QKD</h2><p><strong><a href="https://www.lightreading.com/security/european-telcos-prepare-for-quantum-hackers">This article</a></strong> gives a good overview of the QKD activities of European telcos.</p><p>The interviewee is <strong><a href="https://www.linkedin.com/in/andrew-lord-3122787/?lipi=urn%3Ali%3Apage%3Ad_flagship3_feed%3BCQIbveJETbCoUzdZKLY9cA%3D%3D">Andrew Lord</a></strong>, Senior Manager of Optical Research at BT. Andrew is well-known to those in the quantum cyber sector.</p><p>It's a balanced article that touches on NIST perspectives as well as hardware challenges. There's even a reference to my favourite subject, quantum randomness, which lies at the heart of QKD devices.</p><p>What's fascinating is the summary of activity by European telcos. Alongside BT, there are projects underway involving Deutsche Telekom, Orange, Telef&#243;nica, and Vodafone.</p><p>Take a read and let me know what you think.</p>]]></content:encoded></item><item><title><![CDATA[Chasing Cyber - #25 - Stronger Together]]></title><description><![CDATA[TLS performance, beautiful code, and the death of a business model]]></description><link>https://chasingcyber.com/p/chasing-cyber-25-stronger-together</link><guid isPermaLink="false">https://chasingcyber.com/p/chasing-cyber-25-stronger-together</guid><dc:creator><![CDATA[Duncan Jones]]></dc:creator><pubDate>Mon, 12 Feb 2024 07:01:30 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/426c7474-fdff-401b-9eae-ad2595d6bc65_1200x627.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Post-Quantum TLS Performance Paper</h2><p>Amazon just published a paper on PQC performance in TLS 1.3. The results are promising! </p><p>With good network conditions, there is a 5% impact of switching to post-quantum algorithms. In less ideal conditions, where stability or bandwidth is lower, the impact is 10-15%.</p><p>Uniquely, this research considered total data transfer time, rather than the initial TLS handshake. I prefer this approach because it mimics real-world concerns. Nobody cares about handshake speed. They care how long it takes to fling 200KB across their network.</p><p>Papers like this make me feel confident about the path ahead. In most settings, small overheads of 5-15% are not going to impact our lives.</p><p>Read the paper here: <strong><a href="https://eprint.iacr.org/2024/176">https://eprint.iacr.org/2024/176</a></strong>.</p><div><hr></div><h2>Launch of the Post-Quantum Cryptography Alliance</h2><p>&#8220;We implemented some PQC algorithms&#8221; was never going to be a long-term software business model. And now the end has come.</p><p>The Linux Foundation just launched the <strong><a href="https://pqca.org">Post-Quantum Cryptography Alliance</a></strong>, which seeks to be &#8220;the central foundation for organizations and open source projects seeking production-ready libraries&#8221;.</p><p>The founding members include Google, AWS, Cisco and IBM. Given this critical mass of big players, I expect the PQCA will become the leading open-source community for quantum-safe algorithm implementations.</p><p>The University of Waterloo, another founding partner, has contributed its Open Quantum Safe project to the PQCA. Open Quantum Safe has been a bedrock of the PQC community for years, thanks to its high-quality implementations and convenient plugins for software like OpenSSL.</p><p>Despite this announcement, there&#8217;s plenty of opportunity for vendors who specialise in hardware implementations of PQC algorithms. But for those who peddle non-descript software with the only differentiator being PQC algorithms, the future looks bleak.</p><div><hr></div><h2>Kyber in 500 Beautiful Lines of Code</h2><p>Kyber in 500 lines of code and actually readable &#128588;</p><p>I don&#8217;t often delve into the nuts and bolts of algorithm implementation, but I was inspired by the recent work of Filippo Valsorda. Filippo was the head of cryptography for the Go team at Google and is now a professional open-source programmer.</p><p>He wrote an implementation of ML-KEM (f.k.a Kyber) in the Go language, straight from the FIPS-203 draft standards. It is remarkably readable, concise, and somewhat performant.</p><p>You can read his <strong><a href="https://words.filippo.io/dispatches/mlkem768/">blog about the topic</a></strong>, but here are my takeaways:</p><ul><li><p>Readability will pay dividends for years to come. Security bugs are nasty, and we all need code that is clear and concise.</p></li><li><p>The specs work! Filippo didn't refer to the reference implementations and worked straight from the FIPS-203 draft specs.</p></li><li><p>Exhaustive testing needn't bloat the code base. In another 650 lines of code, 95%+ code coverage was achieved. </p></li></ul><p>I might have to fire up the text editor and write some Go code! I miss it.</p>]]></content:encoded></item><item><title><![CDATA[Chasing Cyber - #24 - Morality Tests]]></title><description><![CDATA[Good quantum, bad certificates]]></description><link>https://chasingcyber.com/p/chasing-cyber-24-morality-tests</link><guid isPermaLink="false">https://chasingcyber.com/p/chasing-cyber-24-morality-tests</guid><dc:creator><![CDATA[Duncan Jones]]></dc:creator><pubDate>Mon, 05 Feb 2024 07:01:11 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/e139bc03-520b-4cd2-8405-fd28bb1bb79a_1200x628.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Welcome to the 24th edition! Let&#8217;s dive right in&#8230;</p><div><hr></div><h2>Quantum: Jekyll or Hyde?</h2><p>If you&#8217;re interested in quantum cybersecurity, you should check out the paper published on arXiv last week:</p><p>&#8220;<em>Assessing the Benefits and Risks of Quantum Computers</em>&#8221;</p><p>It&#8217;s a broad title and a broad paper. Thirty-four pages of dense text attempt to answer the question: &#8220;Will quantum computers be economically impactful before they become a threat to cryptography?&#8221;</p><p>The authors are all big hitters in the quantum and cyber worlds, so I was keen to read it. Here are some takeaways on the crypto side:</p><ul><li><p>(Spoiler) The authors expect economic benefits to arrive first. Quantum computers that threaten cryptography are expected to arrive later.</p></li><li><p>Several techniques appear promising for accelerating the arrival of economic value on quantum computers. However, there&#8217;s no known work in the literature that enables cryptanalysis to be performed using those same techniques.</p></li><li><p>It is unlikely that cryptanalysis will be possible without fault tolerance. The same may not be true for economically useful activities.</p></li><li><p>Section 4.2 provides a summary of the best resource estimates for running Shor's and breaking RSA and ECC. Later in that section, it is noted that RSA will be far harder to break than ECC for the same security strength, based on the state-of-the-art approaches.</p></li><li><p>Section 5 goes into quite some detail on quantum-safe migrations. (I said it was a broad paper!). There is nothing fundamentally new in there from my perspective, but it&#8217;s a good read for those who don't know the topic.</p></li></ul><p>Is it important to know which milestone comes first (cryptanalysis vs business use cases)? I&#8217;m not sure it is. But in answering that curious question, this paper consolidated a lot of interesting data and perspectives, which will prove helpful to the quantum cyber community.</p><p>You can read the paper here: <strong><a href="https://arxiv.org/abs/2401.16317">https://arxiv.org/abs/2401.16317</a></strong>.</p><p><em>P.S. I lack a PhD in quantum computing, so I was taking much of this paper at face value.</em></p><div><hr></div><h2>That Certificate Looks Familiar!</h2><p>Today I learned that public CAs issue certificates for compromised private keys every day!</p><p>The aptly named &#8220;pwnedkeys&#8221; service publishes a warning every time a compromised private key is certified. It scrapes the Certificate Transparency logs and compares the thumbprints of new certificates against a naughty list of broken keys. Each time a match is found, it's added to the database and posted online.</p><p>In case you&#8217;re wondering, private keys become compromised (i.e. known publicly) for all sorts of reasons. Often, developers post them to GitHub by mistake. Sometimes, software or hardware mistakes result in private keys being overly predictable.</p><p>Whatever the reason for the compromise, it&#8217;s a bad idea for a CA to issue a certificate for a broken key. And yet they do it every day.</p><p>The numbers are not staggering. However, we can assume this is the tip of the iceberg. This service is run by one guy doing his best to spot broken keys using Internet searches, and there are still several hits a day.</p><p>You can read more about this service in <strong><a href="https://www.hezmatt.org/~mpalmer/blog/2024/01/16/pwned-certificates-on-the-fediverse.html">this blog post</a></strong>. And you can see the bot announcing compromises <strong><a href="https://botsin.space/@pwnedcerts">here</a></strong>.</p><div><hr></div><h2>Prepare Your Photons</h2><p>ETSI just published an update to their Common Criteria Protection Profile for QKD.</p><p>The original document was launched with some fanfare in early 2023. It targets prepare-and-measure QKD devices (only) and helps manufacturers prepare their equipment for evaluation at a testing house.</p><p>I couldn&#8217;t see a changelog for this document, so I&#8217;m not sure what has been tweaked. But presumably, the updates are to address a year of feedback from companies passing through the process.</p><p>You can find a link to the document on the ETSI website: <strong><a href="https://www.etsi.org/committee/qkd">https://www.etsi.org/committee/qkd</a></strong>.</p>]]></content:encoded></item><item><title><![CDATA[Chasing Cyber - #23 - Europe Grumbles]]></title><description><![CDATA[Cyber agencies publish a damning report about QKD]]></description><link>https://chasingcyber.com/p/chasing-cyber-23-europe-grumbles</link><guid isPermaLink="false">https://chasingcyber.com/p/chasing-cyber-23-europe-grumbles</guid><dc:creator><![CDATA[Duncan Jones]]></dc:creator><pubDate>Mon, 29 Jan 2024 07:01:01 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/c843cca2-bf3f-460a-9727-1315c9634fa1_1200x628.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Welcome to the 23rd edition! This week was dominated by a blistering report on QKD from European cyber agencies.</p><p>I have a few thoughts on this topic, which I&#8217;ve split into two posts below. As a reminder, this newsletter is a concatenation of my future LinkedIn posts, which sometimes means I split large topics into multiple pieces.</p><p><strong>I&#8217;d love to hear your replies on this QKD topic</strong>. I suspect it will divide Chasing Cyber readers!</p><p><em>Finally, I apologise for the broken link in my last newsletter. The German BSI website doesn&#8217;t work properly when I link to it from my emails. To view the BSI report, check out the <a href="https://chasingcyber.com/i/140887893/qkd-under-das-mikroskop">web version of the last edition</a>, where the link works correctly.</em></p><div><hr></div><h2>After the Hype Comes the Storm</h2><p>Yikes! Who spat in their bean curd? Quantum key distribution (QKD) gets slammed in the latest assessment from European governments.</p><p>The joint report from the French, German, Swedish, and Dutch governments is highly critical of QKD and strongly advocates for post-quantum cryptography or symmetric key distribution.</p><p>The mere existence of this report demonstrates a big challenge in the quantum cybersecurity industry. Too many voices still preach &#8220;perfect&#8221; or &#8220;unhackable&#8221; quantum solutions. While this attracts commercial success (to some degree), it forces government agencies to put our hit pieces like this one.</p><p>Let&#8217;s hope these negative reports don't squash a useful technology in its infancy. It reminds me of how the UK government failed to launch a digital ID system because they positioned it as a solution to terrorism. Had they pitched it as a cheap, wallet-sized passport, we may have had a different outcome.</p><p>I firmly believe QKD has a role to play in the future of cybersecurity. But right now, it needs support from governments and not public criticism. And yet, I struggle to blame these agencies for their report, as they've been forced to respond to the hype in the industry.</p><p>The report itself is very one-sided and overlooks significant challenges for both post-quantum algorithms and symmetric key distribution. But the criticism levelled at QKD is mostly fair. In my next post (below), I&#8217;ll break that down and analyse it.<br><br>Meanwhile, you can read the report here: <strong><a href="https://cyber.gouv.fr/actualites/uses-and-limits-quantum-key-distribution">https://cyber.gouv.fr/actualites/uses-and-limits-quantum-key-distribution</a></strong>.<br><br><em>P.S. If &#8220;spat in your bean curd&#8221; had you confused, watch <a href="https://www.youtube.com/watch?v=bPa0TiCuvR4">Disney's Mulan</a>.</em></p><div><hr></div><h2>Part Dieu &#8211; What&#8217;s Their B&#339;uf with QKD?</h2><p>As mentioned above, the recent statement from European cyber agencies was highly critical of quantum key distribution (QKD). Here are the main challenges they pointed out:</p><h4>Denial of Service</h4><p>QKD systems only work correctly if there are no eavesdroppers on the line. This is one of the great strengths of QKD, but it is also a great weakness. A persistent eavesdropper can prevent any keys from being distributed.</p><h4>Bandwidth Issues</h4><p>QKD systems don't have enough bandwidth to support the distribution of one-time pads. Therefore, QKD systems are used to distribute cryptographic keys.</p><p>This means an unconditionally secure system (QKD) is used to distribute keys that will be used in systems that are not unconditionally secure. The report claims this weakens the overall benefit of QKD.</p><h4>Lack of Protocol Standardisation</h4><p>There has been no equivalent to the NIST PQC standardisation process applied to QKD. Of course, there are several popular schemes in the literature, e.g. BB84, but these have not been subjected to a formal standardisation process.</p><p>The report also criticises the lack of security proofs available for practical QKD protocols.</p><h4>Limited Device Certification</h4><p>Security devices are usually certified before being used in production. For instance, hardware security modules are usually FIPS 140-3 certified.</p><p>The report complains that there are only very limited certification schemes in place at the moment. Although, ironically, the German BSI is involved in such as scheme (and co-authored this QKD report).</p><h4>Conclusions</h4><p>Overall, much of the criticism in the report is fair. My main objection would be to the comments around bandwidth. They seem to imply there is no value in unconditional security in the distribution of keys, which doesn't feel right to me.</p><p>I believe many of these QKD challenges can be rectified with time. If we can control the hype around QKD and let it mature naturally, then it will become a valuable tool in the security toolbox.</p><p>It's a shame the agencies felt the need to put this piece out, but I agree with the fundamental recommendation &#8211; adopt PQC as a near-term solution.</p><p>Again, here's a link to the full report: <strong><a href="https://cyber.gouv.fr/actualites/uses-and-limits-quantum-key-distribution">https://cyber.gouv.fr/actualites/uses-and-limits-quantum-key-distribution</a></strong>.</p>]]></content:encoded></item><item><title><![CDATA[Chasing Cyber - #22 - Quantum Keys]]></title><description><![CDATA[NATO looks forward, GCHQ looks back, BSI looks around]]></description><link>https://chasingcyber.com/p/chasing-cyber-22-quantum-keys</link><guid isPermaLink="false">https://chasingcyber.com/p/chasing-cyber-22-quantum-keys</guid><dc:creator><![CDATA[Duncan Jones]]></dc:creator><pubDate>Mon, 22 Jan 2024 07:00:27 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!xrDT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4b32b5d-6ced-430b-817d-6fef3cc1140b_650x434.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Welcome to the 22nd edition! This week we focus on quantum key distribution and Hollywood B-listers.</p><div><hr></div><h3>An Allied Approach to QKD</h3><p>NATO just announced its Quantum Technologies Strategy.</p><p>Their stance on quantum key distribution is more positive than we see from individual governments. Here&#8217;s what they say:</p><blockquote><p>&#8220;In the future, further improvements could allow quantum key distribution to also contribute to secure communications.</p><p>... Allies can support each other... in the development and implementation of post-quantum cryptography and quantum key distribution to enhance the quantum-resilience of our networks.&#8221;</p></blockquote><p>It&#8217;s great to see a balanced statement on the topic from NATO. To date, I&#8217;ve found national governments unnecessarily critical of QKD. At a conference last year, the French ANSSI even described it as &#8220;science fiction&#8221;.</p><p>QKD isn&#8217;t ready for large-scale deployment yet. But there&#8217;s no need to pour cold water on a technology that may offer future security improvements for critical communications. Well done to NATO for treating it fairly.</p><p>I also thought the conclusion of their quantum threat section was particularly interesting:</p><blockquote><p>&#8220;Strategic competitors and potential adversaries may also leverage disinformation opportunities within Allied societies by creating public distrust of the military use of quantum technologies. Allies will seek to prevent and counter any such efforts through the use of strategic communications. NATO will support Allies as required.&#8221;</p></blockquote><p>You can read the <strong><a href="https://www.nato.int/cps/en/natohq/official_texts_221777.htm">summary document here</a></strong>.</p><div><hr></div><h3>A History Lesson from GCHQ (and Hollywood)</h3><p>Colossus was the Stephen Baldwin of World War II.</p><p>Despite being a strong contributor to the Allied success, few people know about Colossus. Pop culture favours the Enigma-busting Bombe machine instead.</p><p>To help rebalance this, GCHQ is celebrating the 80th anniversary of the Colossus machine, with some never-before-seen images:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!xrDT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4b32b5d-6ced-430b-817d-6fef3cc1140b_650x434.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!xrDT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4b32b5d-6ced-430b-817d-6fef3cc1140b_650x434.jpeg 424w, https://substackcdn.com/image/fetch/$s_!xrDT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4b32b5d-6ced-430b-817d-6fef3cc1140b_650x434.jpeg 848w, https://substackcdn.com/image/fetch/$s_!xrDT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4b32b5d-6ced-430b-817d-6fef3cc1140b_650x434.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!xrDT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4b32b5d-6ced-430b-817d-6fef3cc1140b_650x434.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!xrDT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4b32b5d-6ced-430b-817d-6fef3cc1140b_650x434.jpeg" width="650" height="434" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a4b32b5d-6ced-430b-817d-6fef3cc1140b_650x434.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:434,&quot;width&quot;:650,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:66997,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!xrDT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4b32b5d-6ced-430b-817d-6fef3cc1140b_650x434.jpeg 424w, https://substackcdn.com/image/fetch/$s_!xrDT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4b32b5d-6ced-430b-817d-6fef3cc1140b_650x434.jpeg 848w, https://substackcdn.com/image/fetch/$s_!xrDT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4b32b5d-6ced-430b-817d-6fef3cc1140b_650x434.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!xrDT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4b32b5d-6ced-430b-817d-6fef3cc1140b_650x434.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Colossus was used to crack the Lorenz cipher, which encrypted strategic messages between senior German officers. It is widely regarded as the first programmable digital computer system.</p><p>The Colossus was kept secret until the early 2000s, which might explain its lack of fame. By contrast, the world learned the Enigma storyline back in the 1970s.</p><p>These stories make me wonder whether present-day ciphers have been similarly broken. I guess we&#8217;ll need to wait 30 years to find out.</p><p>You can read the <strong><a href="https://www.gchq.gov.uk/news/colossus-80">GCHQ article here</a></strong>. And you can learn more about <strong><a href="https://en.wikipedia.org/wiki/Colossus_computer">Colussus on Wikipedia</a></strong>.</p><div><hr></div><h3>QKD under das Mikroskop</h3><p>If you&#8217;re building or buying a QKD system, you need to read this document.</p><p>The industrious folks at the German BSI have compiled the most comprehensive survey of QKD implementation attacks I&#8217;ve ever seen.</p><p>Over 300 papers were analysed, and 49 attack paths were identified. Each attack is graded with a feasibility score, and known countermeasures are listed.</p><p>One conclusion from the document is more research into continuous-variable (CV-QKD) systems is needed. The older and more established discrete-variable (DV-QKD) protocols have seen far more scrutiny over the years. This is reflected in the number of papers and attacks found so far.</p><p>The document is mostly news for QDK nerds. However, the opening sections provide a good overview of QKD technology, which would benefit the general reader.</p><p>You can access the report on <strong><a href="https://www.bsi.bund.de/EN/Service-Navi/Publikationen/Studien/QKD-Systems/Implementation_Attacks_QKD_Systems_node.html">the BSI website</a></strong>.</p>]]></content:encoded></item></channel></rss>