Back to articles
EngineeringArs Technica - Technology Lab

In a first, a ransomware family is confirmed to be quantum-safe

Technically speaking, there's no practical benefit to use PQC. So why is it being used?

This source only provides an excerpt in its RSS feed. FlowMarket displays all content available from the feed and keeps the original publication link for attribution.

In a first, a ransomware family is confirmed to be quantum-safe

A relatively new ransomware family is using a novel approach to hype the strength of the encryption used to scramble files—making, or at least claiming, that it is protected against attacks by quantum computers.

Kyber, as the ransomware is called, has been around since at least last September and quickly attracted attention for the claim that it used ML-KEM , short for Module Lattice-based Key Encapsulation Mechanism and is a standard shepherded by the National Institute of Standards and Technology. The Kyber ransomware name comes from the alternate name for ML-KEM, which is also Kyber. For the rest of the article, Kyber refers to the ransomware; the algorithm is referred to as ML-KEM.

It's all about marketing

ML-KEM is an asymmetric encryption method for exchanging keys. It involves problems based on lattices, a structure in mathematics that quantum computers have no advantage in solving over classic computing. ML-KEM is designed to replace Elliptic Curve and RSA cryptosystems, both of which are based on problems that quantum computers with sufficient strength can tackle.

Read full article

Comments

Need an n8n workflow or help installing it?

After the briefing, move to execution: find an n8n template or a creator who can adapt it to your tools.

Source

Ars Technica - Technology Lab - arstechnica.com

View original publication
In a first, a ransomware family is confirmed to be quantum-safe | FlowMarket