Re: The Signal Protocol used by 1+ billion people is getting a post-quantum makeover – Ars Technica

grarpamp grarpamp at gmail.com
Fri Sep 22 18:42:44 PDT 2023


On 9/22/23, jdb10987 at yahoo.com <jdb10987 at yahoo.com> wrote:
> https://arstechnica.com/security/2023/09/signal-preps-its-encryption-engine-for-the-quantum-doomsday-inevitability/

Saw this news as well.

It's probably worth noting that unless something has
changed in quantum land, no cryptosystem has ever,
or will ever, ship with a mathematic proof that it
is secure... except for XOR with RNG.

Thus quantum computers and further academic exploits
against both non-pqc and pqc cryptosystems may happen
someday, typically when least expected.

These pqc-enabled cryptosystems are very early. They have
received very little academic analysis in comparison to the
volumes and decades of work done against legacy systems.
And being new libraries, they'll be full of implementation bugs
and exploits, and user facing gotchas.

Further, the Government, Academic, and Corporate sponsored
"competitions" and "standards" bodies... from which many of these
cryptosystems have spawned from and been submitted to for
judging and "certification"... have been known to be compromised
by nefarious agents in the past.

And many of these cryptosystems have been authored
solely by, or by those affiliated through various [back]doors,
with Government and Corporate exploiters and banners
of crypto... NSA, GCHQ, IBM, political entities, etc.

Choose among whichever the worldwide academic
consensus has held out as the best for many years.

If using the early days of pqc-enabled crypto apps worries
people, you can always compose non-pqc within pqc.

GovCorp will never expose its biggest exploits.

And in the end, it's rarely the crypto that fails you.


More information about the cypherpunks mailing list