TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

The clock is ticking: NIST's bold move towards Post-Quantum Cryptography

2 点作者 teleforce4 个月前

2 条评论

ggm4 个月前
I had a conversation recently on a podcast which explored the requirement, particularly as it relates to DNSSEC. In short: this may be required for PFS against packet capture of contents, TLS sessions, you-name-it but for the signed state of the DNS, it&#x27;s very unclear there is a risk here.<p>The reason it&#x27;s unclear is that the defensive move by NIST is to maintain the 20-30 year forward secrecy intention. Move now, IN CASE PQC HAPPENS but also in case non Q methods weaken RSA2048. Well, fair enough. But the DNS doesn&#x27;t have a 20-30 secrecy requirement: It&#x27;s a different use case.<p>OTOH moving to ECC is good because it reduces packet size but at a cost of moving compute burdens into the client space. Stll, it makes sign-at-the-edge easier, and it makes IPv6 DNS work better.
评论 #42765940 未加载
tptacek4 个月前
I think there&#x27;s approximately 0% of a chance that organizations are going to set an operational deadline for migrating off ECC by 2029, regardless of what Gartner says.