Hasty Briefsbeta

OpenSSH Post-Quantum Cryptography

13 days ago
  • #OpenSSH
  • #Post-Quantum Cryptography
  • #Cybersecurity
  • OpenSSH supports post-quantum key agreement algorithms to protect against quantum computer attacks.
  • Default post-quantum algorithms since OpenSSH 9.0 include sntrup761x25519-sha512 and mlkem768x25519-sha256 (since 9.9).
  • OpenSSH 10.1 warns users when non post-quantum key agreement schemes are used, encouraging migration to stronger algorithms.
  • Quantum computers could break current cryptographic algorithms, posing a 'store now, decrypt later' threat to SSH sessions.
  • Post-quantum cryptography in OpenSSH safeguards against future decryption by quantum computers.
  • OpenSSH's post-quantum algorithms are hybrids, combining classical and post-quantum methods for added security.
  • Users are advised to update servers to support post-quantum algorithms or selectively disable warnings if necessary.
  • Signature algorithms are also at risk from quantum computers, but OpenSSH plans to add post-quantum signature support in the future.
  • The adoption of post-quantum algorithms is a precautionary measure with benefits regardless of quantum computing's eventual feasibility.