“Abundance of Caution” is C-suite lingo for “Oopsie, oh flying squirrel”
See last 2022 status

Quantum Superposition when used for computing.
Yes !

Quantum Cryptanalysis
Classical “Forward Secrecy” - old messages not broken by later loss of host key
Generalized: old saved messages not broken by later breakthroughs either.
Realistic threat? ![]()
The goal of post-quantum cryptography (also called quantum-resistant cryptography) is to develop cryptographic systems that are secure against both quantum and classical computers, and can interoperate with existing communications protocols and networks. – NIST
National Institute of Standards & Technology started a multi-round competition, similar to with AES and SHA3 competitions
RSA2048 in play or not? - Chinese academic paper claiming 2k bit RSA within range of current gen NON-fault-tolerant QC, no great surprise given Qubits available and theoretical algorithm size. Schor and Schneier unconvinced - does it actually converge w/o FT? Schneier 2023-01

[2023.02.28] CRYSTALS-Kyber is one of the public-key algorithms currently recommended by NIST as part of its post-quantum cryptography standardization process. Researchers have just published a side-channel attack—using power consumption—against an implementation of the algorithm that was supposed to be resistant against that sort of attack. The algorithm is not “broken” or “cracked”—despite headlines to the contrary—this is just a side-channel attack. What makes this work really interesting is that the researchers used a machine-learning model to train the system to exploit the side channel.
OTOH as seen in TETRA:BURST, a side-channel attack can be used to extract key or algorithm from a piece of equipment that falls into opponent lab.

TL;DR No. It’s happened. (see in notes)
FIPS Allowed: NIST
announced finalized PQC standards for 3 of 4 “winners” (3 more to
come)FIPS Approved.one line summary
blah
The YouTube of this presentation will be linked on BLU.org along with these slides and extended notes etc as 2025-sep as per usual.
Prior
talks in this series - most talks have slides &/or
YouTube attached, sometimes extras.
Alas the YouTube audio pre-pandemic wasn’t great, BLU will need a
donation of a wireless clip-on mike if we ever return to
Hybrid/In-Person meetings. Or we all need to wear a wired or BT headset
while presenting in person?
News and Focus sections have embedded links.
Good security news streams to either research history or to follow
year round are Scneier
Crypto-gram and SANS ISC, the
latter being less cryptologic and more operational in focus – but both
cover the wide span of vulnerabilities, tools, remediations, etc, not
just the cryptologic that I’m cherry-picking here.
Highly recommended.
Start your day with the 5 minute SANS Internet Storm Center
StormCast pod-cast; the Red Team is, so, so should you.
text
See our prior discussions of GEE, VENONA for breaks of One Time Pad↩︎