Cryptology Annual News Update and Vignette

Bill Ricker
for BLU.org

Sept 11, 2025

  1. Cryptology News Bulletins
  2. Post Quantum Cryptograpy update
  3. Historic Vignette
  4. Bibliography

§1 Cryptology News Bulletins 2024-09 to 2025-09

“Abundance of Caution” is C-suite lingo for “Oopsie, oh flying squirrel”

Title {Item Template}

Potpourri



§2 What’s up with Post Quantum Cryptography?

Review: What’s Quantum Computing?

See last 2022 status

Quantum Superposition when used for computing.

Review: Kinds of Quantum Hardware

Review: We’re discussing PQC before QC?

Yes !

Review: What’s the problem?

Review: Generalization of Forward Secrecy

Review: NIST’s Post-Quantum Cryptography Standards

The goal of post-quantum cryptography (also called quantum-resistant cryptography) is to develop cryptographic systems that are secure against both quantum and classical computers, and can interoperate with existing communications protocols and networks. – NIST

Review: NIST PQC Competition

National Institute of Standards & Technology started a multi-round competition, similar to with AES and SHA3 competitions

Review: Quantum Cracking 2023

[2023.02.28] CRYSTALS-Kyber is one of the public-key algorithms currently recommended by NIST as part of its post-quantum cryptography standardization process. Researchers have just published a side-channel attack—using power consumption—against an implementation of the algorithm that was supposed to be resistant against that sort of attack. The algorithm is not “broken” or “cracked”—despite headlines to the contrary—this is just a side-channel attack. What makes this work really interesting is that the researchers used a machine-learning model to train the system to exploit the side channel.

OTOH as seen in TETRA:BURST, a side-channel attack can be used to extract key or algorithm from a piece of equipment that falls into opponent lab.

REVIEW: Known weaknesses

Isn’t non-random or uniformly-blank Salt an unlikely failure?

TL;DR No. It’s happened. (see in notes)

NIST PQC Timeline

NIST PQC

2025-…

§3 History Vignette - …

one line summary

intro

blah

§4 Bibliography & Footnotes

My talks

The YouTube of this presentation will be linked on BLU.org along with these slides and extended notes etc as 2025-sep as per usual.

Prior talks in this series - most talks have slides &/or YouTube attached, sometimes extras.
Alas the YouTube audio pre-pandemic wasn’t great, BLU will need a donation of a wireless clip-on mike if we ever return to Hybrid/In-Person meetings. Or we all need to wear a wired or BT headset while presenting in person?

News + Focus

News and Focus sections have embedded links.

Good security news streams to either research history or to follow year round are Scneier Crypto-gram and SANS ISC, the latter being less cryptologic and more operational in focus – but both cover the wide span of vulnerabilities, tools, remediations, etc, not just the cryptologic that I’m cherry-picking here.
Highly recommended.
Start your day with the 5 minute SANS Internet Storm Center StormCast pod-cast; the Red Team is, so, so should you.

Cryptologic History - general references

Title {Item Template}

text


  1. See our prior discussions of GEE, VENONA for breaks of One Time Pad↩︎