InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: Google Chrome switches to ML-KEM for quantum cryptography defense
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > Google Chrome switches to ML-KEM for quantum cryptography defense
Technology

Google Chrome switches to ML-KEM for quantum cryptography defense

September 17, 2024 5 Min Read
Share
Post-Quantum Cryptography Defense
SHARE

Google has announced that it will switch from KYBER to ML-KEM in its Chrome web browser as part of its ongoing efforts to defend against risks posed by cryptographically relevant quantum computers (CRQC).

“Chrome offers key share prediction for hybrid ML-KEM (codepoint 0x11EC),” said David Adrian, David Benjamin, Bob Beck, and Devon O’Brien from the Chrome team. “The PostQuantumKeyAgreementEnabled flag and enterprise policies apply to both Kyber and ML-KEM.”

The change is expected to take effect in Chrome version 131, scheduled for release in early November 2024. Google noted that the two hybrid quantum cryptography key exchange approaches are inherently incompatible, which led it to abandon KYBER.

“Changes to the final version of ML-KEM have made it incompatible with previously deployed Kyber versions,” the company said. “As a result, the TLS code point for the hybrid post-quantum key exchange will change from 0x6399 in Kyber768+X25519 to 0x11EC in ML-KEM768+X25519.”

The development comes on the heels of the National Institute of Standards and Technology (NIST) publishing the final versions of three new encryption algorithms to protect current systems against future attacks using quantum technology, marking the culmination of eight years of work by the lab.

The algorithms in question are FIPS 203 (aka ML-KEM), FIPS 204 (aka CRYSTALS-Dilithium or ML-DSA), and FIPS 205 (aka Sphincs+ or SLH-DSA), which are intended for general encryption and digital signature protection. A fourth algorithm, FN-DSA (originally called FALCON), is due to be finalized later this year.

ML-KEM stands for Modular Lattice-Based Key Encapsulation Mechanism and is derived from the third-round version of CRYSTALS-KYBER KEM, which can be used to establish a shared secret key between two parties communicating over a public channel.

See also  What the release of OpenAI's o1 model says about changing AI strategies and visions

Meanwhile, Microsoft is preparing for the coming of the quantum era by announcing updates to its SymCrypt cryptography library that will add support for ML-KEM and the eXtended Merkle Signature Scheme (XMSS).

“Adding support for post-quantum algorithms to our underlying cryptographic engine is the first step towards a quantum-resistant world,” the Windows maker said, noting that the transition to post-quantum cryptography (PQC) is a “complex, multi-year, iterative process” that requires careful planning.

This disclosure follows the discovery of cryptographic flaws in Infineon SLE78, Optiga Trust M, and Optiga TPM security microcontrollers that could allow extraction of Elliptic Curve Digital Signature Algorithm (ECDSA) private keys from YubiKey hardware authentication devices.

The cryptographic flaws in the libraries provided by Infineon are believed to have gone unnoticed for 14 years and around 80 Common Criteria certification evaluations, the highest level.

Side channel attacks are Euclear (CVE-2024-45678, CVSS score: 4.9) was filed by Thomas Roche of NinjaLab and affects all Infineon security microcontrollers with embedded cryptographic libraries and the following YubiKey devices:

  • YubiKey 5 series versions prior to 5.7
  • YubiKey 5 FIPS Series 5.7 and earlier
  • YubiKey 5 CSPN Series 5.7 and earlier
  • YubiKey Bio Series versions prior to 5.7.2
  • Security Key Series All versions prior to 5.7
  • YubiHSM 2 versions prior to 2.4.0
  • YubiHSM 2 FIPS versions prior to 2.4.0

“An attacker would need physical possession of a YubiKey, security key, or YubiHSM, knowledge of the targeted account, and specialized equipment to carry out the necessary attack,” Yubico, the company that makes the YubiKey, said in the joint advisory.

“Depending on the use case, an attacker may also require additional knowledge such as a username, PIN, account password, or (YubiHSM) authentication key.”

See also  Wall Street remains frozen in place as the countdown continues to Fed rate cuts

However, existing YubiKey devices with vulnerable firmware versions cannot be updated (an intentional design choice to maximize security and avoid introducing new vulnerabilities), making them permanently vulnerable to EUCLEAK.

The company subsequently announced plans to drop support for Infineon’s cryptographic libraries in favor of its own cryptographic libraries as part of firmware versions YubiKey f5.7 and YubiHSM 2.4.

A similar side-channel attack against the Google Titan Security Key was demonstrated by Roche and Victor Lomne in 2021, potentially allowing a malicious attacker to exploit an electromagnetic side channel in a chip embedded in the device to clone the device.

“The (EUCLEAK) attack requires physical access to the secure element (acquiring a local electromagnetic side channel a few times, i.e. a few minutes, is sufficient) in order to extract the ECDSA private key,” Roche said. “In the case of FIDO protocols, this allows cloning of a FIDO device.”

Share This Article
Twitter Copy Link
Previous Article Car Dealer Tycoon Code September 2024 Car Dealer Tycoon Code September 2024
Next Article California Surgeon General sets goal to reduce maternal mortality rate by 50% California Surgeon General sets goal to reduce maternal mortality rate by 50%
Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest News

The Solution is Cyber ​​Hygiene

The Solution is Cyber ​​Hygiene

Cybersecurity in healthcare has never been more urgent. As the…

September 19, 2024
mm

Enterprise LLM API: A top choice for powering LLM applications in 2024

Some big recent news stories have escalated the race for…

September 19, 2024
Authentication Bypass

GitLab fixes critical SAML authentication bypass vulnerability in CE and EE editions

GitLab has released a patch to address a critical flaw…

September 19, 2024
Chinese engineer indicted in US for years of cyberespionage targeting NASA and military

Chinese engineer indicted in US for years of cyberespionage targeting NASA and military

A Chinese national has been indicted in the United States…

September 19, 2024
IoT Botnet

New “Raptor Train” IoT Botnet Compromises Over 200,000 Devices Worldwide

Cybersecurity researchers have discovered a never-before-seen botnet made up of…

September 18, 2024

You Might Also Like

mm
Technology

Asynchronous LLM API calls in Python: A comprehensive guide

13 Min Read
The Remnant 2 archetype featured in the final DLC is the perfect support class
Gaming

The Remnant 2 archetype featured in the final DLC is the perfect support class

3 Min Read
Crypto Mining and Proxyjacking
Technology

Exposed Selenium Grid servers targeted for cryptomining and proxyjacking

3 Min Read
California enacts law restoring Jewish families' rights to Nazi-looted art, despite 9th Circuit ruling
Politics

California enacts law restoring Jewish families’ rights to Nazi-looted art, despite 9th Circuit ruling

8 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?