As Quantum Computing Threats Loom, Microsoft Updates Its Core Crypto Library (arstechnica.com)
- Reference: 0174980057
- News link: https://tech.slashdot.org/story/24/09/12/0624230/as-quantum-computing-threats-loom-microsoft-updates-its-core-crypto-library
- Source link: https://arstechnica.com/security/2024/09/microsoft-adds-quantum-resistant-algorithms-to-its-core-crypto-library/
> Microsoft has [1]updated a key cryptographic library with two new encryption algorithms designed to withstand attacks from quantum computers. The updates were made last week to [2]SymCrypt , a core cryptographic code library for handing cryptographic functions in Windows and Linux. The library, started in 2006, provides operations and algorithms developers can use to safely implement secure encryption, decryption, signing, verification, hashing, and key exchange in the apps they create. The library supports federal certification requirements for cryptographic modules used in some governmental environments. Despite the name, SymCrypt supports both symmetric and asymmetric algorithms. It's the main cryptographic library Microsoft uses in products and services including Azure, Microsoft 365, all supported versions of Windows, Azure Stack HCI, and Azure Linux. The library provides cryptographic security used in email security, cloud storage, web browsing, remote access, and device management. Microsoft documented the update in [3]a post on Monday. The updates are the first steps in implementing a massive overhaul of encryption protocols that incorporate a new set of algorithms that aren't vulnerable to attacks from quantum computers. [...]
>
> The first new algorithm Microsoft added to SymCrypt is called ML-KEM. Previously known as CRYSTALS-Kyber, ML-KEM is one of three post-quantum standards [4]formalized last month by the National Institute of Standards and Technology (NIST). The KEM in the new name is short for key encapsulation. KEMs can be used by two parties to negotiate a shared secret over a public channel. Shared secrets generated by a KEM can then be used with symmetric-key cryptographic operations, which aren't vulnerable to [5]Shor's algorithm when the keys are of a sufficient size. [...] The other algorithm added to SymCrypt is the NIST-recommended XMSS. Short for [6]eXtended Merkle Signature Scheme , it's based on "stateful hash-based signature schemes." These algorithms are useful in very specific contexts such as firmware signing, but are not suitable for more general uses. Monday's post said Microsoft will add additional post-quantum algorithms to SymCrypt in the coming months. They are ML-DSA, a lattice-based digital signature scheme, previously called Dilithium, and SLH-DSA, a stateless hash-based signature scheme previously called SPHINCS+. Both became NIST standards last month and are formally referred to as FIPS 204 and FIPS 205.
In Monday's post, Microsoft Principal Product Manager Lead Aabha Thipsay wrote: "PQC algorithms offer a promising solution for the future of cryptography, but they also come with some trade-offs. For example, these typically require larger key sizes, longer computation times, and more bandwidth than classical algorithms. Therefore, implementing PQC in real-world applications requires careful optimization and integration with existing systems and standards."
[1] https://arstechnica.com/security/2024/09/microsoft-adds-quantum-resistant-algorithms-to-its-core-crypto-library/
[2] https://github.com/microsoft/SymCrypt
[3] https://techcommunity.microsoft.com/t5/security-compliance-and-identity/microsoft-s-quantum-resistant-cryptography-is-here/ba-p/4238780
[4] https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards
[5] https://en.wikipedia.org/wiki/Shor's_algorithm
[6] https://www.rfc-editor.org/info/rfc8391
NIST? Oh good. (Score:1)
> The first new algorithm Microsoft added to SymCrypt is called ML-KEM. Previously known as CRYSTALS-Kyber, ML-KEM is one of three post-quantum standards formalized last month by the National Institute of Standards and Technology (NIST).
[1]womp [wired.com] [2]womp [wikipedia.org]. Who still trusts NIST? Microsoft is part of PRISM and their operating system is an essential component of the spying systems of [3]Five Eyes [wikipedia.org], so their opinion is worse than worthless.
[1] https://www.wired.com/2013/09/nsa-backdoor/
[2] https://en.wikipedia.org/wiki/Dual_EC_DRBG
[3] https://en.wikipedia.org/wiki/Five_Eyes
Looms? (Score:3)
It has been looming for twenty years, and chances are it will still be looming in twenty years time.
Re: (Score:3)
"Chances," as in what percentage chances? Breaking all fielded cryptography is a doomsday scenario. A 1% risk of it happening easily cost-justifies developing and pre-staging software countermeasures. Moreover if it does happen, we will likely not know for sure that has happened for years afterwards.
Miltary algorithms first (Score:2)
How about the military just publicizes the secret algorithms they use since an algorithm being secret is apparently not a valid reason for security.
Or perhaps everyone is starting to see the real issue which is using public algorithms that super computers have pre-loaded attack vectors ready to go against.
Since supposedly keeping the algorithms secret doesnt help, lets get the military to share theirs. Since all the security is in the key why not? Tee hee
Threat to past messages (Score:3)
Attackers are recording your encrypted messages today along with the key negotiation. If a quantum computer is built in 5 years that can break the key negotiation then the attacker can read your messages. If your messages where commands and authorizations then it doesn't matter. You would have to change any passwords that you used. If I'm a government though, these secrets could be very embarrassing and I would have to get any spies or other assets out of harms way.
The other problem is, that if quantum computers become available in 5 years that break key negotiations and signatures and we don't have a new system in place then all our privacy and authentication is broken and recovering at that time would be very difficult since we would be relying on the internet to negotiate a solution for the compromised internet.
What threats? (Score:2)
Seriously. This idiocy has to stop.
Re: (Score:2)
We get one of these stories a week. The thesis has been on the table at least since the movie Sneakers came out a zillion years ago (NO MORE SECRETS). What it proves is that IT journos have very little creativity and could be replaced by a ChatGPT script.