this post was submitted on 28 Feb 2025
9 points (100.0% liked)

cyph3rPunk

829 readers
15 users here now

The people in this community hope for a world where an individual's informational footprints—everything from an opinion on abortion to the medical record of an actual abortion—can be traced only if the individual involved chooses to reveal them; a world where coherent messages shoot around the globe by network and microwave, but intruders and feds trying to pluck them out of the vapor find only gibberish; a world where the tools of prying are transformed into the instruments of privacy. There is only one way this vision will materialize, and that is by widespread use of cryptography. Is this technologically possible? Definitely. The obstacles are political—some of the most powerful forces in government are devoted to the control of these tools. In short, there is a war going on between those who would liberate crypto and those who would suppress it. The seemingly innocuous bunch strewn around this community represents the vanguard of the pro-crypto forces. Though the battleground seems remote, the stakes are not: The outcome of this struggle may determine the amount of freedom our society will grant us in the 21st century. To the Cypherpunks, freedom is an issue worth some risk.


Relevant Links:


"Security is mostly a superstition. It does not exist in nature, nor do the children of man as a whole experience it. Avoiding danger is no safer in the long run than outright exposure. Life is either a daring adventure, or nothing." Helen Keller

founded 2 years ago
MODERATORS
 

Different post-quantum algorithms can have significantly different performance characteristics and implementation constraints (with respect to key sizes, signature sizes, resource requirements, etc.). Consequently, different algorithms can be more suitable than others for specific applications. For example, the signature or key size might not be a problem for some applications but can be unacceptable for others. Some widely used protocols need to be modified to handle larger signatures or key sizes (e.g., using message segmentation). Implementations of new applications will need to accommodate the demands of post-quantum cryptography (pqc) and the schemes developed that incorporate pqc for digital signatures and key establishment. In fact, pqc requirements may actually shape some future application standards. The replacement of algorithms generally requires changing or replacing cryptographic libraries, implementation validation tools, hardware that implements or accelerates algorithm performance, dependent operating system and application code, communications devices and protocols, and user and administrative procedures. Security standards, procedures, and best practice documentation are being changed or replaced, and the same will be needed for installation, configuration, and administration documentation.

no comments (yet)
sorted by: hot top controversial new old
there doesn't seem to be anything here