The rise of quantum computing poses a significant threat to current cryptographic systems and protocols.
In particular, encrypted network traffic may be subjected to store-now-decrypt-later attacks, where encrypted data is collected by the adversary now so that it can be decrypted later,
maybe in several years, when quantum computers become powerful enough to break the public key cryptographic schemes we currently use to establish encryption keys.
To address this challenge, post-quantum cryptography (PQC) has emerged as an essential field aiming to develop cryptographic algorithms that remain secure against both classical and quantum computers.
In 2016, NIST initiated a process to solicit, evaluate, and standardise one or more quantum-resistant public-key cryptographic algorithms, and the first draft standards have started to appear.
diff --git a/tags/libcrux/index.xml b/tags/libcrux/index.xml
index 75dc997..eaa91de 100644
--- a/tags/libcrux/index.xml
+++ b/tags/libcrux/index.xml
@@ -13,4 +13,4 @@ implementation of ML-KEM in Rust, and talked about how our
high-assurance development methodology helped us find a <a href="https://github.com/pq-crystals/kyber/commit/dda29cc63af721981ee2c831cf00822e69be3220">new timing
bug</a>
in various other Kyber implementations.</p>Verified ML-KEM (Kyber) in Rusthttps://cryspen.com/post/ml-kem-implementation/Tue, 16 Jan 2024 00:00:00 +0000https://cryspen.com/post/ml-kem-implementation/<p>ML-KEM, previously known as <a href="https://pq-crystals.org/kyber/">Kyber</a>, is the first post-quantum secure key-encapsulation mechanism (KEM) to get standardised by NIST in <a href="https://csrc.nist.gov/pubs/fips/203/ipd">FIPS 203</a>.</p>
-<p>Cryspen has built <a href="https://github.com/cryspen/libcrux/tree/main/src/kem">a new high assurance Rust implementation of ML-KEM</a>, using our verification framework <a href="https://cryspen.com/hax">hax</a> and <a href="https://fstar-lang.org">F*</a>. Our implementation is among the fastest portable implementations that we know of (see <a href="#performance-comparison">Performance comparison</a>), and helped uncover a <a href="https://github.com/pq-crystals/kyber/commit/dda29cc63af721981ee2c831cf00822e69be3220">timing bug</a> (also called <a href="https://kyberslash.cr.yp.to/">KyberSlash</a>) in various Kyber implementations that would allow an attacker to <a href="https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/ldX0ThYJuBo/m/uIOqRF5BAwAJ">recover the private key</a>.</p>Cryspen @ RWC 2023https://cryspen.com/post/rwc-2023/Mon, 12 Jun 2023 00:00:00 +0000https://cryspen.com/post/rwc-2023/<p>At Real World Crypto 2023 in Tokyo, we gave a talk on the hacspec language, the hax tool, and the libcrux crypto library.</p>
\ No newline at end of file
+<p>Cryspen has built <a href="https://github.com/cryspen/libcrux/tree/main/libcrux-kem">a new high assurance Rust implementation of ML-KEM</a>, using our verification framework <a href="https://cryspen.com/hax">hax</a> and <a href="https://fstar-lang.org">F*</a>. Our implementation is among the fastest portable implementations that we know of (see <a href="#performance-comparison">Performance comparison</a>), and helped uncover a <a href="https://github.com/pq-crystals/kyber/commit/dda29cc63af721981ee2c831cf00822e69be3220">timing bug</a> (also called <a href="https://kyberslash.cr.yp.to/">KyberSlash</a>) in various Kyber implementations that would allow an attacker to <a href="https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/ldX0ThYJuBo/m/uIOqRF5BAwAJ">recover the private key</a>.</p>Cryspen @ RWC 2023https://cryspen.com/post/rwc-2023/Mon, 12 Jun 2023 00:00:00 +0000https://cryspen.com/post/rwc-2023/<p>At Real World Crypto 2023 in Tokyo, we gave a talk on the hacspec language, the hax tool, and the libcrux crypto library.</p>
\ No newline at end of file
diff --git a/tags/pqc/index.xml b/tags/pqc/index.xml
index f6a2ed6..6880926 100644
--- a/tags/pqc/index.xml
+++ b/tags/pqc/index.xml
@@ -3,4 +3,4 @@ implementation of ML-KEM in Rust, and talked about how our
high-assurance development methodology helped us find a <a href="https://github.com/pq-crystals/kyber/commit/dda29cc63af721981ee2c831cf00822e69be3220">new timing
bug</a>
in various other Kyber implementations.</p>Verified ML-KEM (Kyber) in Rusthttps://cryspen.com/post/ml-kem-implementation/Tue, 16 Jan 2024 00:00:00 +0000https://cryspen.com/post/ml-kem-implementation/<p>ML-KEM, previously known as <a href="https://pq-crystals.org/kyber/">Kyber</a>, is the first post-quantum secure key-encapsulation mechanism (KEM) to get standardised by NIST in <a href="https://csrc.nist.gov/pubs/fips/203/ipd">FIPS 203</a>.</p>
-<p>Cryspen has built <a href="https://github.com/cryspen/libcrux/tree/main/src/kem">a new high assurance Rust implementation of ML-KEM</a>, using our verification framework <a href="https://cryspen.com/hax">hax</a> and <a href="https://fstar-lang.org">F*</a>. Our implementation is among the fastest portable implementations that we know of (see <a href="#performance-comparison">Performance comparison</a>), and helped uncover a <a href="https://github.com/pq-crystals/kyber/commit/dda29cc63af721981ee2c831cf00822e69be3220">timing bug</a> (also called <a href="https://kyberslash.cr.yp.to/">KyberSlash</a>) in various Kyber implementations that would allow an attacker to <a href="https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/ldX0ThYJuBo/m/uIOqRF5BAwAJ">recover the private key</a>.</p>
\ No newline at end of file
+<p>Cryspen has built <a href="https://github.com/cryspen/libcrux/tree/main/libcrux-kem">a new high assurance Rust implementation of ML-KEM</a>, using our verification framework <a href="https://cryspen.com/hax">hax</a> and <a href="https://fstar-lang.org">F*</a>. Our implementation is among the fastest portable implementations that we know of (see <a href="#performance-comparison">Performance comparison</a>), and helped uncover a <a href="https://github.com/pq-crystals/kyber/commit/dda29cc63af721981ee2c831cf00822e69be3220">timing bug</a> (also called <a href="https://kyberslash.cr.yp.to/">KyberSlash</a>) in various Kyber implementations that would allow an attacker to <a href="https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/ldX0ThYJuBo/m/uIOqRF5BAwAJ">recover the private key</a>.</p>
\ No newline at end of file