Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Correct, KEM's should be replaced ASAP since they are currently vulnerable to store-now-decrypt-later attacks. Digital signature algorithms are less urgent but considering how long it takes to roll out new cryptography standards, they should be preferred for any new designs. That said, the new PQC signatures are much larger than the current 32 byte ed25519 signatures that are most common, and that could end up being very difficult to integrate into embedded systems with low bandwidth or limited memory, ie. CAN bus secure diagnostics, meshtastic nodes etc.


Sorry, can you expand on the issues with KEM?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: