logoalt Hacker News

prashantk_today at 7:24 AM5 repliesview on HN

I am seeing more Post Quantum safety measures suddenly, than ever before. I know this was a topic from at least a decade, but it looks like a sudden interest across industry.

Did something change? It looks like there was some breakthrough in quantum computers scaling and everyone if given some time before making it public.

What could be the reason for this?


Replies

ziofilltoday at 10:37 AM

This blog post might answer some of your questions

https://words.filippo.io/crqc-timeline/

bux93today at 7:55 AM

I'm seeing more of a gradual path.

Chrome 124 (april 24) introduced hybrid post-quantum TLS, and Chrome 131 (nov 24) switched to a hybrid using ML-KEM, which was standardized in 2024, just after Firefox 132 (oktober 2024), while openssh introduced a hybrid scheme in release 9.0 (April 2022) and made ML-KEM+25519 default in OpenSSH 10.0 (April 2025).

Hybrid PQ schemes being adopted in other places is people playing catch-up, not the avant garde.

I'd say digital signatures should be the foremost concern, those may need to provide non-repudiation for decades.

Qisiontoday at 7:45 AM

> What could be the reason for this?

Hype

show 1 reply
ignoramoustoday at 8:19 AM

It is NIST's world, we merely live in it.

  As researchers around the world race to build quantum computers that could break current encryption ... NIST is ... developing algorithms to protect our data and systems. 

  NIST has already released three post-quantum cryptography standards that can be implemented now ...

  These Federal Information Processing Standards (FIPS) ... are mandatory for federal systems and adopted by organizations around the world ... 
https://www.nist.gov/pqc / https://archive.vn/1ZDyV
PunchyHamstertoday at 9:03 AM

Long con for NSA to push post quantum algorithms to displace old non quantum one they couldn't find vulnerability in /s

show 1 reply