Replies: 1 comment
-
Companies offering network monitoring or network intrusion detection software may have heuristics aiming to detect this. But it's outside the scope of what we do in the OQS project, which is about implementation of post-quantum algorithms. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
I’m researching strategies to detect the “Harvest Now, Decrypt Later” attack
Specifically, I’m interested in exploring AI and machine learning models that can identify signs of this attack.
Are there any existing models or techniques that can help detect instances of data harvesting with the intention of future decryption?
Beta Was this translation helpful? Give feedback.
All reactions