Svoboda | Graniru | BBC Russia | Golosameriki | Facebook

To install click the Add extension button. That's it.

The source code for the WIKI 2 extension is being checked by specialists of the Mozilla Foundation, Google, and Apple. You could also do it yourself at any point in time.

4,5
Kelly Slayton
Congratulations on this excellent venture… what a great idea!
Alexander Grigorievskiy
I use WIKI 2 every day and almost forgot how the original Wikipedia looks like.
Live Statistics
English Articles
Improved in 24 Hours
Added in 24 Hours
What we do. Every page goes through several hundred of perfecting techniques; in live mode. Quite the same Wikipedia. Just better.
.
Leo
Newton
Brights
Milds

From Wikipedia, the free encyclopedia

In cryptography, Combined Elliptic-Curve and Post-Quantum 2 (CECPQ2) is a quantum secure modification to Transport Layer Security (TLS) 1.3 developed by Google. It is intended to be used experimentally, to help evaluate the performance of post quantum key-exchange algorithms on actual users' devices.[1]

Details

Similarly to its predecessor CECPQ1, CECPQ2 aims to provide confidentiality against an attacker with a large scale quantum computer. It is essentially a plugin for the TLS key-agreement part. CECPQ2 combines two key exchange mechanisms: the classical X25519 and HRSS (Hülsing, Rijneveld, Schanck, and Schwabe) scheme (an instantiation of the NTRU lattice based key exchange primitive).[1] Additionally, Kris Kwiatkowski has implemented and deployed an alternative version of post-quantum key exchange algorithm, titled CECPQ2b. Similarly to CECPQ2, this is also a hybrid post-quantum key exchange scheme, that is based on supersingular isogeny key exchange (SIKE) instead of HRSS. [2]

CECPQ2 uses 32 bytes of shared secret material derived from the classical X25519 mechanism, and 32 bytes of shared secret material derived from the quantum-secure HRSS mechanism. The resulting bytes are concatenated and used as secret key. Concatenation is meant to assure that the protocol provides at least the same security level as widely used X25519, should HRSS be found insecure.

The algorithm was to be deployed on both the server side using Cloudflare's infrastructure, and the client side using Google Chrome Canary.[3] Since both parties need to support the algorithm for it to be chosen, this experiment is available only to Chrome Canary users accessing websites hosted by Cloudflare.

It was estimated that the experiment started mid-2019.[4] It was considered a step in a general program at Cloudflare to transition to post-quantum safe cryptographic primitives.[5]

Support for CECPQ2 was removed from BoringSSL in April 2023.

See also

References

  1. ^ a b Langley, Adam (12 December 2018). "CECPQ2". Imperial Violet. Retrieved 5 January 2020.
  2. ^ Kwiatkowski, Kris; Valenta, Luke (30 October 2019). "The TLS Post-Quantum Experiment". Cloudflare Blog. Retrieved 31 December 2020.
  3. ^ Kwiatkowski, Kris (20 June 2019). "Towards Post-Quantum Cryptography in TLS". The Cloudflare Blog. Retrieved 5 January 2020.
  4. ^ Shankland, Stephen (20 June 2019). "Quantum computers will break today's internet security; Cloudflare wants to fix it". CNET. Retrieved 5 January 2020.
  5. ^ Kwiatkowski, Kris; Faz-Hernández, Armando (20 June 2019). "Introducing CIRCL: An Advanced Cryptographic Library". Cloudflare Blog. Retrieved 5 January 2020.
This page was last edited on 14 August 2023, at 12:15
Basis of this page is in Wikipedia. Text is available under the CC BY-SA 3.0 Unported License. Non-text media are available under their specified licenses. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc. WIKI 2 is an independent company and has no affiliation with Wikimedia Foundation.