MORE POSTS
February 23, 2022 1:59 PM
Making protocols post-quantum
Post-quantum key exchange and signature algorithms come with different trade-offs that we’re familiar. How do we handle that when updating protocols, is this an opportunity to revisit the status quo?...
February 22, 2022 1:59 PM
Deep dive into a post-quantum key encapsulation algorithm
In this blog post, we will look at what Key Encapsulation Mechanisms are and why they matter in a post-quantum world...
February 22, 2022 1:59 PM
Deep dive into a post-quantum signature scheme
How can one attest to an identity and prove it belongs to one self? And how can one do it in the face of quantum computers? In this blog post, we examine these questions and explain what post-quantum signatures are...
February 21, 2022 1:59 PM
The post-quantum state: a taxonomy of challenges
At Cloudflare, we strive to help build a better Internet, which means a quantum-protected one. In this post, we look at the challenges for migrating to post-quantum cryptography and what lies ahead using a taxonomy...
February 21, 2022 1:59 PM
The quantum solace and spectre
What is quantum computing and what advances have been made so far on this front? In this blog post, we will answer this question and see how to protect against quantum adversaries...
November 08, 2021 3:39 PM
Sizing Up Post-Quantum Signatures
How much room does TLS have for the big post-quantum signatures? We had a look: it’s tight....
October 18, 2021 1:46 PM
Tunnel: Cloudflare’s Newest Homeowner
Starting today, users who deploy and manage Cloudflare Tunnel at scale now have easier visibility into their Tunnel’s respective status, routes, uptime, connectors, cloudflared version, and much more through our new UI in the Cloudflare for Teams Dashboard. ...
October 15, 2021 1:02 PM
“Look, Ma, no probes!” — Characterizing CDNs’ latencies with passive measurement
In this article we describe an alternative approach to active measurements, which accurately predicts network latencies using only passively collected data....
October 15, 2021 1:01 PM
Multi-User IP Address Detection
We’ve devised novel methods to detect multi-user IP addresses, and today we’re excited to announce their integration into our global threat intelligence products. These will improve the quality of our detection techniques and reduce false positives for our customers, and the clie...
October 15, 2021 1:00 PM
Geo Key Manager: Setting up a service for scale
Diagnosing scaling issues in a service associated with TLS termination through a deep dive into some of the incidents it caused....
October 14, 2021 12:59 PM
Privacy-Preserving Compromised Credential Checking
Announcing a public demo and open-sourced implementation of a privacy-preserving compromised credential checking service...
October 14, 2021 12:59 PM
Unbuckling the narrow waist of IP: Addressing Agility for Names and Web Services
IP addresses associated with names, interfaces, and sockets, can tie these things together in a way that IP was never designed to support. This post describes Cloudflare efforts to decouple of IP addresses from names, the latest in a quest for something we’re calling Addressing A...
October 14, 2021 12:59 PM
Research Directions in Password Security
We've been studying password problems, including malicious logins using compromised credentials. Here's what we learned and here's where we think we can go from here with safer password systems....
October 13, 2021 12:59 PM
Cloudflare and the IETF
Cloudflare helps build a better Internet through collaboration on open and interoperable standards. This post will describe how Cloudflare contributes to the standardization process to enable incremental innovation and drive long-term architectural change....