OpenSSH Post-Quantum Cryptography
13 days ago
- #OpenSSH
- #Post-Quantum Cryptography
- #Cybersecurity
- OpenSSH supports post-quantum key agreement algorithms to protect against quantum computer attacks.
- Default post-quantum algorithms since OpenSSH 9.0 include sntrup761x25519-sha512 and mlkem768x25519-sha256 (since 9.9).
- OpenSSH 10.1 warns users when non post-quantum key agreement schemes are used, encouraging migration to stronger algorithms.
- Quantum computers could break current cryptographic algorithms, posing a 'store now, decrypt later' threat to SSH sessions.
- Post-quantum cryptography in OpenSSH safeguards against future decryption by quantum computers.
- OpenSSH's post-quantum algorithms are hybrids, combining classical and post-quantum methods for added security.
- Users are advised to update servers to support post-quantum algorithms or selectively disable warnings if necessary.
- Signature algorithms are also at risk from quantum computers, but OpenSSH plans to add post-quantum signature support in the future.
- The adoption of post-quantum algorithms is a precautionary measure with benefits regardless of quantum computing's eventual feasibility.