Does it make sense to disallow SHA-224 and SHA-256 to defend against quantum computers?

From Australia’s Guidelines for Cryptography:

For most purposes, a hashing algorithm with an output size of 224 bits provides 112 bits of effective security strength, with larger output sizes providing more bits of effective security stre… Continue reading Does it make sense to disallow SHA-224 and SHA-256 to defend against quantum computers?

Is a Three-Layer Post-Quantum Safe VPN Hidden Within Regular IPsec Effective Against Eavesdroppers?

I’m working on designing a VPN that is post-quantum safe while avoiding detection that it uses post-quantum cryptography. The goal is to make the use of post-quantum cryptography indistinguishable to an eavesdropper, who might otherwise st… Continue reading Is a Three-Layer Post-Quantum Safe VPN Hidden Within Regular IPsec Effective Against Eavesdroppers?

Impact of quantum computers on password security [closed]

I wrote an article on the impacts of sufficiently capable quantum computers on password strength and attacks.
The basic premise is that Grover’s algorithm halves the protective strength of password hashes and passwords, plus any additional… Continue reading Impact of quantum computers on password security [closed]

What ssh-keygen algorithm, or solutions, may be short-term future-proof effective for quantum computing attacks? [closed]

This thread is for how ssh-keygen relates to quantum computing attacks.
What are the strengths and weaknesses of the ssh-keygen algorithms as related to quantum computing, which from my understanding will be able to potentially crack them … Continue reading What ssh-keygen algorithm, or solutions, may be short-term future-proof effective for quantum computing attacks? [closed]