What are some reliable and well-maintained Post-Quantum Cryptography (PQC) libraries with Go support? [closed]

I am looking for reputable libraries or solution providers that offer reliable, well-maintained, and well-documented implementations of post-quantum cryptographic (PQC) algorithms. Specifically, I am interested in:

Digital signature schem… Continue reading What are some reliable and well-maintained Post-Quantum Cryptography (PQC) libraries with Go support? [closed]

Does it make sense to disallow SHA-224 and SHA-256 to defend against quantum computers?

From Australia’s Guidelines for Cryptography:

For most purposes, a hashing algorithm with an output size of 224 bits provides 112 bits of effective security strength, with larger output sizes providing more bits of effective security stre… Continue reading Does it make sense to disallow SHA-224 and SHA-256 to defend against quantum computers?

Is a Three-Layer Post-Quantum Safe VPN Hidden Within Regular IPsec Effective Against Eavesdroppers?

I’m working on designing a VPN that is post-quantum safe while avoiding detection that it uses post-quantum cryptography. The goal is to make the use of post-quantum cryptography indistinguishable to an eavesdropper, who might otherwise st… Continue reading Is a Three-Layer Post-Quantum Safe VPN Hidden Within Regular IPsec Effective Against Eavesdroppers?

Impact of quantum computers on password security [closed]

I wrote an article on the impacts of sufficiently capable quantum computers on password strength and attacks.
The basic premise is that Grover’s algorithm halves the protective strength of password hashes and passwords, plus any additional… Continue reading Impact of quantum computers on password security [closed]