We believe that the key encapsulation mechanism we have selected, CRYSTALS-Kyber, is built on solid foundations, but to be safe we do not want to simply replace our existing elliptic curve cryptography foundations with a post-quantum public key cryptosystem. Instead, we are augmenting our existing cryptosystems such that an attacker must break both systems in order to compute the keys protecting people’s communications.

Our new protocol is already supported in the latest versions of Signal’s client applications and is in use for chats initiated after both sides of the chat are using the latest Signal software. In the coming months (after sufficient time has passed for everyone using Signal to update), we will disable X3DH for new chats and require PQXDH for all new chats. In parallel, we will roll out software updates to upgrade existing chats to this new protocol.

  • Obinice@lemmy.world
    link
    fedilink
    arrow-up
    6
    ·
    1 year ago

    We believe that the key encapsulation mechanism we have selected, CRYSTALS-Kyber, is built on solid foundations, but to be safe we do not want to simply replace our existing elliptic curve cryptography foundations with a post-quantum public key cryptosystem.

    Does this sound like VX Junkies to anybody else? I feel the need to check on my turbo encabulator 😅

  • kanzalibrary@lemmy.ml
    link
    fedilink
    arrow-up
    8
    arrow-down
    3
    ·
    1 year ago

    I never predict Signal will implement this QuanResist really fast pace than other messenger apps. Applause to the dev team!

  • incompetentboob@lemmy.world
    link
    fedilink
    English
    arrow-up
    3
    arrow-down
    5
    ·
    1 year ago

    Do we still like signal? I remember reading something about why you should stop using signal but this seems contrary to that