Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Upgrade from RSA 1024 to crystals-kyber 1024. #7

Open
Destroyinator69420 opened this issue Jul 13, 2022 · 1 comment
Open

Upgrade from RSA 1024 to crystals-kyber 1024. #7

Destroyinator69420 opened this issue Jul 13, 2022 · 1 comment

Comments

@Destroyinator69420
Copy link

I read your cryptosystem and realized that RSA 1024 may be vulnerable with a high end quantum computer and is pretty much guaranteed to be vulnerable in the near future. Crystals-Kyber was nominated by NIST as the official post quantum cryptography algorithm approved for government use. If it is safe to hide information the people ought to know, then it is safe to protect people using SubEther from state sponsored quantum computer attacks. You can find a javascript implementation at this github repo. (https://github.com/antontutoveanu/crystals-kyber-javascript) It is recommended by the pq-crystals.org website (https://pq-crystals.org/kyber/software.shtml) under the third party implementation section.

@AceZeroX
Copy link
Contributor

Thanks for taking the time @Destroyinator69420 we only used RSA 1024 together with AES 256 in the beginning because it was good enough for generating keys on the client side in the browser using Javascript without crashing the browser. Now that we have worker threads etc we could up the security once there is time and interest for it to continue or further development on the SubEther project towards a v2. I didn't know about the name you shared but I will definitely check it out before I embark on a v2 of this system, thanks!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants