MORE POSTS
February 25, 2022
The post-quantum future: challenges and opportunities
The story and path of post-quantum cryptography is clear. But, what are the future challenges? In this blog post, we explore them...
February 25, 2022
Post-quantumify internal services: Logfwrdr, Tunnel, and gokeyless
A big challenge is coming: to change all internal connections at Cloudflare to use post-quantum cryptography. Read how we are tackling this challenge!...
February 24, 2022
Building Confidence in Cryptographic Protocols
This blogpost refers to the efforts to use formal/verification/implementation for post-quantum algorithms to achieve better assurance for them. It also touches on our Cloudflare efforts on this...
February 24, 2022
Using EasyCrypt and Jasmin for post-quantum verification
This blogpost will touch upon how to practically use Jasmin and EasyCrypt to achieve better security guarantees when verifying KEMs...
February 23, 2022
Making protocols post-quantum
Post-quantum key exchange and signature algorithms come with different trade-offs that we’re familiar. How do we handle that when updating protocols, is this an opportunity to revisit the status quo?...
February 22, 2022
Deep dive into a post-quantum key encapsulation algorithm
In this blog post, we will look at what Key Encapsulation Mechanisms are and why they matter in a post-quantum world...
February 22, 2022
Deep dive into a post-quantum signature scheme
How can one attest to an identity and prove it belongs to one self? And how can one do it in the face of quantum computers? In this blog post, we examine these questions and explain what post-quantum signatures are...
February 21, 2022
The post-quantum state: a taxonomy of challenges
At Cloudflare, we strive to help build a better Internet, which means a quantum-protected one. In this post, we look at the challenges for migrating to post-quantum cryptography and what lies ahead using a taxonomy...
February 21, 2022
The quantum solace and spectre
What is quantum computing and what advances have been made so far on this front? In this blog post, we will answer this question and see how to protect against quantum adversaries...
November 08, 2021
Sizing Up Post-Quantum Signatures
How much room does TLS have for the big post-quantum signatures? We had a look: it’s tight....
January 15, 2021
KEMTLS: Post-quantum TLS without signatures
The TLS 1.3 protocol has been around for quite some time, but it will be broken once quantum computers arrive. What can we do? In this blog post, we will examine a technique for achieving full post-quantum security for TLS 1.3 in the face of quantum computers: KEMTLS....
December 11, 2020
Securing the post-quantum world
As quantum computing matures, R&D efforts in cryptography are keeping pace. We’re working with academia and industry peers to create new cryptography standards resilient to quantum computer attacks....
October 30, 2019
The TLS Post-Quantum Experiment
In a June 2019 experiment with Google, we implemented two post-quantum key exchanges, integrated them into our TLS stack and deployed the implementation on edge servers and in Chrome Canary clients....
June 20, 2019
The Quantum Menace
The impact of quantum computing on cryptography conducts research and development towards a Post-Quantum era....