4chan enshittified further. 1. Wait 15 minutes to post something. 2. Solve a captcha. 3. Press post, but nothing shows up 20 seconds and minutes later.
So sometimes that website will just eat your post. Sucks for those who didn't copy it to the clipboard before posting - not me! Here it is - information about quantum-resistant encryption as enabled by certain cryptographic algorithms and computer programs:
> > 103264947 [ post in thread https://boards.4chan.org/g/thread/103241578/fglt-friendly-gnulinux-thread ]
> > 103265014
Chad wrote this article about post-quantum cryptography: https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards
Important:
> NIST plans to announce its selection of one or two of these algorithms by the end of 2024. \\ The second set includes a larger group of algorithms designed for digital signatures. In order to accommodate any ideas that cryptographers may have had since the initial 2016 call for submissions, NIST asked the public for additional algorithms in 2022 and has begun a process of evaluating them. In the near future, NIST expects to announce about 15 algorithms from this group that will proceed to the next round of testing, evaluation and analysis. \\ While analysis of these two additional sets of algorithms will continue, Moody said that any subsequent PQC standards will function as backups to the three that NIST announced today. \\ βThere is no need to wait for future standards,β he said. βGo ahead and start using these three. We need to be prepared in case of an attack that defeats the algorithms in these three standards, and we will continue working on backup plans to keep our data safe. But for most applications, these new standards are the main event.β
> [...]
> NIST announced its selection of four algorithms β CRYSTALS-Kyber, CRYSTALS-Dilithium, Sphincs+ and FALCON β slated for standardization in 2022 and released draft versions of three of these standards in 2023. The fourth draft standard based on FALCON is planned for late 2024.
Less important:
> While there have been no substantive changes made to the standards since the draft versions, NIST has changed the algorithmsβ names to specify the versions that appear in the three finalized standards, which are: * Federal Information Processing Standard (FIPS) 203, intended as the primary standard for general encryption. Among its advantages are comparatively small encryption keys that two parties can exchange easily, as well as its speed of operation. The standard is based on the CRYSTALS-Kyber algorithm, which has been renamed ML-KEM, short for Module-Lattice-Based Key-Encapsulation Mechanism. * FIPS 204, intended as the primary standard for protecting digital signatures. The standard uses the CRYSTALS-Dilithium algorithm, which has been renamed ML-DSA, short for Module-Lattice-Based Digital Signature Algorithm. * FIPS 205, also designed for digital signatures. The standard employs the Sphincs+ algorithm, which has been renamed SLH-DSA, short for Stateless Hash-Based Digital Signature Algorithm. The standard is based on a different math approach than ML-DSA, and it is intended as a backup method in case ML-DSA proves vulnerable. \ Similarly, when the draft FIPS 206 standard built around FALCON is released, the algorithm will be dubbed FN-DSA, short for FFT (fast-Fourier transform) over NTRU-Lattice-Based Digital Signature Algorithm.
So NIST says it's fine to use CRYSTALS-Kyber for ~quantum-proof encryption ( https://github.com/pq-crystals/kyber https://gh.phreedom.club/open-quantum-safe/oqs-provider ).