Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Google Chrome switches to ML-KEM for post-quantum cryptographic protection
Global Security

Google Chrome switches to ML-KEM for post-quantum cryptographic protection

AdminBy AdminSeptember 17, 2024No Comments4 Mins Read
Post-Quantum Cryptography Defense
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


September 17, 2024Ravi LakshmananBrowser Security / Quantum Computing

Defense against post-quantum cryptography

Google has announced that it is switching from KYBER to ML-KEM in its Chrome web browser as part of its ongoing efforts to protect against the risk posed by cryptographically compliant quantum computers (CRQC).

“Chrome Offers Key Share Prediction for Hybrid ML-KEM (Code Point 0x11EC)” by David Adrian, David Benjamin, Bob Beck, and Devon O’Brien of the Chrome Team said. “PostQuantumKeyAgreementEnabled flag and company policy will apply to both Kyber and ML-KEM.”

The changes are expected to take effect in Chrome version 131, which is available on track for release in early November 2024, Google noted that the two hybrid post-quantum key exchange approaches were fundamentally incompatible with each other, prompting it to abandon KYBER.

“Changes in the final version of ML-KEM make it incompatible with the previously deployed version of Kyber,” the company said. “As a result, the codepoint in TLS for hybrid post-quantum key exchange changes from 0x6399 for Kyber768+X25519 to 0x11EC for ML-KEM768+X25519.”

Cyber ​​security

The development comes shortly after the US National Institute of Standards and Technology (NIST) published final versions of Art three new encryption algorithms — protect current systems from future attacks using quantum technology, the culmination of an eight-year effort by the agency.

Algorithms in question FIPS 203 (aka ML-KEM), FIPS 204 (aka CRYSTALS-Dilithium or ML-DSA), and FIPS 205 (aka Sphincs+ or SLH-DSA) is designed for general encryption and protection of digital signatures. The fourth algorithm, FN-DSA (originally called FALCON), is scheduled for completion this year.

ML-KEM, short for Module-Lattice-based Key-Encapsulation Mechanism, comes from the third-round version CYBER CRYSTALS KEM and can be used to establish a shared secret key between two parties communicating over a public channel.

Microsoft, for its part, is also gearing up for a post-quantum world, announcing an update to its SymCrypt cryptographic library with support for ML-KEM and eXtended Merkle Signature Scheme (XMSS).

“Adding support for post-quantum algorithms to the underlying crypto engine is the first step towards a quantum-secure world,” Windows maker saidstating that the transition to post-quantum cryptography (PQC) is a “complex, multi-year and iterative process” that requires careful planning.

The disclosure also follows the discovery of a cryptographic flaw in the Infineon SLE78, Optiga Trust M, and Optiga TPM security microcontrollers that could allow Elliptic Curve Digital Signature Algorithm (ECDSA) private keys to be extracted from YubiKey hardware authentication devices.

The cryptographic flaw in the Infineon-supplied library is believed to have gone undetected for 14 years and about 80 top-level Common Criteria certification evaluations.

Side Channel Attack, duplicated EUCLICS (CVE-2024-45678, CVSS Score: 4.9) by Thomas Roche of NinjaLab, affects all Infineon security microcontrollers that embed the cryptographic library and the following YubiKey devices –

  • YubiKey Series 5 to 5.7 versions
  • YubiKey 5 series FIPS to 5.7
  • YubiKey 5 series CSPN to 5.7
  • YubiKey Bio Series versions up to 5.7.2
  • All security key versions up to 5.7
  • YubiHSM versions 2 to 2.4.0
  • YubiHSM 2 FIPS versions up to 2.4.0

“An attacker would need physical possession of the YubiKey, the security key or YubiHSM, knowledge of the accounts they want to target, and specialized hardware to carry out the necessary attack,” said Yubico, the company behind the YubiKey. said in a coordinated consultation.

Cyber ​​security

“Depending on the use case, an attacker may also need additional knowledge, including a username, PIN, account password, or (YubiHSM) authentication key.”

But because existing YubiKey devices with vulnerable firmware versions cannot be updated – a deliberate design choice intended to maximize security and avoid introducing new vulnerabilities – they are forever vulnerable to EUCLEAK.

The company has since announced plans to drop support for Infineon’s cryptographic library in favor of its own cryptographic library as part of the YubiKey f5.7 and YubiHSM 2.4 firmware versions.

A similar side-channel attack against Google Titan’s security keys was demonstrated Roche and Victor Lomne in 2021, potentially allowing attackers to clone devices using an electromagnetic side channel in their embedded chip.

“The (EUCLEAK) attack requires physical access to the secure element (a few local electromagnetic side-channels, ie several minutes) to obtain the ECDSA secret key,” Roche. said. “In the case of the FIDO protocol, it allows you to clone a FIDO device.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025

Band

June 13, 2025

Apple Zero Click’s downside in reports to spy on journalists using spyware Paragon software

June 13, 2025

Both Vextrio and affiliates control the global network

June 12, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025

Band

June 13, 2025

Apple Zero Click’s downside in reports to spy on journalists using spyware Paragon software

June 13, 2025

Both Vextrio and affiliates control the global network

June 12, 2025

How to Decide Safety Expanding

June 12, 2025

The new tokenbreak attack combines AI moderation with a one -sided character change

June 12, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.