What ssh-keygen algorithm, or solutions, may be short-term future-proof effective for quantum computing attacks? [closed]

This thread is for how ssh-keygen relates to quantum computing attacks.
What are the strengths and weaknesses of the ssh-keygen algorithms as related to quantum computing, which from my understanding will be able to potentially crack them … Continue reading What ssh-keygen algorithm, or solutions, may be short-term future-proof effective for quantum computing attacks? [closed]

CDS partners with Post-Quantum to provide post-quantum encryption algorithms for super yachts

A wide range of organizations from defence to banking are preparing for ‘Y2Q’, the moment when a sufficiently developed quantum computer emerges that can break today’s encryption. As a trusted cyber security supplier to ultra high net worth individuals… Continue reading CDS partners with Post-Quantum to provide post-quantum encryption algorithms for super yachts

Are "non-quantum" cryptographically secure random number generators vulnerable to quantum attacks? [closed]

These days a lot of vendors are agressively marketing their Quantum Random Number Generators (QRNG), citing emerging/potential threat from quantum computers. I was wondering, are the existing state-of-the-art CSRNGs (hardware or software) … Continue reading Are "non-quantum" cryptographically secure random number generators vulnerable to quantum attacks? [closed]

Why are LMS and XMSS no candidates in the Post-Quantum Cryptography Standardization process?

Why are Leighton-Micali Signature Scheme (LMS) and eXtended Merkle Signature Scheme (XMSS) no candidates in the NIST Post-Quantum Cryptography Standardization process?
Both are mentioned in the final draft of Recommendation for Stateful Ha… Continue reading Why are LMS and XMSS no candidates in the Post-Quantum Cryptography Standardization process?

What is the simplest post-quantum asymmetric cryptographic algorithm?

This question has been burning in the back of my head for the past few days, and a quick Google search doesn’t yield any usable results.
As the title suggests: What is the easiest-to-understand post-quantum asymmetric cryptographic algorit… Continue reading What is the simplest post-quantum asymmetric cryptographic algorithm?