Jump to content

Recommended Posts

Posted (edited)

I would like to inform MSFN members that Chrome 124  (and Edge 124) has enabled the "X25519Kyber768Draft00" Hybrid Post Quantum Key + QUIC to default.

It will almost certainly be enabled by default in future versions of Firefox as well.
In Firefox Nightly it is already at default.

I remind you that QUIC is already enabled by default in Firefox.

Test:

https://pq.cloudflareresearch.com/

Some problems:

https://www.bleepingcomputer.com/news/security/google-chromes-new-post-quantum-cryptography-may-break-tls-connections/

I have been experimenting with the Hybrid Post Quantum Key since Jan. 19, 2024, even in Firefox, and have yet to detect any problems loading websites.

I also performed CPU + Layout/sec measurements of website loading with the Hybrid Post Quantum Secure Key + QUIC.

MSFN members who do not like the Hybrid Post Quantum Key enabled + QUIC are required to set the flags to the "disabled" value.

 

 

Edited by Sampei.Nihira
  • Sampei.Nihira changed the title to "X25519Kyber768Draft00" Hybrid Post Quantum Secure Key

Posted
4 hours ago, Sampei.Nihira said:

I have been experimenting with the Hybrid Post Quantum Key since Jan. 19, 2024

Oh, not again! Kyber has been obsolete and outdated for ages, I warned you, you don't listen, I honestly don't understand why. D.Draker never gives bad advice.

On the link below, you can enjoy the precise instructions on bruteforcing that weak "encryption" method.

"Challenge 1: Breaking baby Kyber."

"After a couple of hours (or way less depending on your configurations), we obtain the following solution..." Decrypting the communications:

"From this point, having recovered the four server private keys (one for each communication), the rest of the challenge is straightforward. Having access to the ciphertext from the pcap file, we can use the OQS_KEM_kyber_NS_decaps function to recover the 32-byte shared secret. Here is the example code for the case NS5"

https://blog.quarkslab.com/sandboxaq-ctf-2024.html

 
  • 4 weeks later...
Posted

A bit "laxed" requirements for mobile users.

"For older Chrome or on Mobile, you need to toggle TLS 1.3 hybridized Kyber support (enable-tls13-kyber) in chrome://flags."

I don't see such flag in "older" Chrome 113.

Posted
8 hours ago, Dixel said:

A bit "laxed" requirements for mobile users.

"For older Chrome or on Mobile, you need to toggle TLS 1.3 hybridized Kyber support (enable-tls13-kyber) in chrome://flags."

I don't see such flag in "older" Chrome 113.

The new version of that "Modern Kyber Cipher" is broken, again.

https://msfn.org/board/topic/186243-beware-new-quic-kyber768-quantum-resistant-mechanism-is-broken-workaround-to-disable-it-in-chrome-124

  • 5 months later...
  • Sampei.Nihira changed the title to X25519MLKEM768 Post Quantum Secure Key
  • 4 weeks later...
Posted
12 hours ago, D.Draker said:

It says it's OBSOLETE, yes, written in Capslock.

https://browserleaks.com/tls

 

Oh yeah, the standard changes almost every month:buehehe:, and they also say "enabling both Kyber and ML-KEM simultaneously (e.g., as an interim phase until Kyber768 is completely removed) would mean the client sends an additional 2,432 bytes (1,216 for each plus 32 bytes for a fallback X25519 keyshare)."

https://www.netmeister.org/blog/tls-hybrid-kex.html

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...