TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Christopher J Peikert, Re: Kyber security level?

13 点作者 FiloSottile超过 1 年前

1 comment

tptacek超过 1 年前
Chris Peikert is one of the O.G. academic lattice cryptography researchers. He&#x27;s not affiliated with the CRYSTALS team, but was pretty involved with the NIST PQC contest (as was every other academic researcher working in the space).<p>The backstory here:<p>Dan Bernstein wrote a sprawling manifesto attempting to explain, in tens of thousands of words, how NIST computed the conventional security levels for Kyber-512 (the fastest, weakest of the Kybers, with security levels sort of analogous to Curve25519) wrong by a relatively insignificant amount; the gist of what Bernstein seems to be saying is that if you did the math on security levels differently, adding instead of multiplying specific terms, you&#x27;d get higher security levels for his team&#x27;s submission, NTRUprime.<p>Since Bernstein has chosen to communicate this in just about the most inflammatory way possible, choosing as his audience people who don&#x27;t pay attention to cryptographic research but do pay close attention to NSA kremlinology, his blog post has gotten some press, including a pop sci story in New Scientist that was on the front page last night.<p>It turns out: he appears to have gotten the math wrong. Which is pretty embarrassing if it&#x27;s true; if you&#x27;re going to write a zillion word manifesto calling laypeople to arms against the outcome of an academic cryptography competition, you should probably have your numbers right, as Omar Little was once heard to say.<p>Far more savage is Ray Perlner&#x27;s response; all you need to know to understand that response is, again, that Bernstein is affiliated with NTRUprime.
评论 #37876617 未加载