{"id":615,"date":"2023-10-15T13:59:34","date_gmt":"2023-10-15T13:59:34","guid":{"rendered":"https:\/\/tonysbit.blog\/?p=615"},"modified":"2023-10-15T14:10:47","modified_gmt":"2023-10-15T14:10:47","slug":"post-quantum-part-1-the-storm-beyond-the-horizon","status":"publish","type":"post","link":"https:\/\/tonysbit.blog\/?p=615","title":{"rendered":"Post Quantum Part 1: The storm beyond the horizon"},"content":{"rendered":"\n
There is a modern cryptography has a slow but looming threat just beyond the horizon, Quantum Computing.<\/strong> Without getting into the nitty gritty, the fundamental maths behind how we share secrets from device to device is at risk of being broken. The risks are especially present for solutions that are vulnerable to store now, decrypt later<\/a>. Messaging apps are especially vulnerable to this type of attack and there are engineers already working to mitigate the risks<\/a>. <\/p>\n\n\n\n Something not talked about frequently are topics such as the risks quantum computing have on modern forms of authentication\/authorization. Most modern authentication\/authorization frameworks (such as OpenIDConnect<\/a>) rely on JWT Tokens and signing algorithms that are not quantum resistant. Once broken, attackers could functionally gain access to the front door by signing their own tokens to impersonate users on any of these systems. More worryingly is the fact that most systems use a single signer which means the encryption exploit can be reused to impersonate any user on that system.<\/p>\n\n\n\n Good news! NIST (National Institute of Standards and Technology) have been hard at work in evolving the backbone of digital freedom. From that very difficult work<\/a> a number of algorithms have been selected for the future standards .<\/p>\n\n\n\n For digital signatures CRYSTALS-Dilithium<\/a>, FALCON<\/a> and SPHINCS+<\/a> was selected.<\/p>\n\n\n\n