Hacker Newsnew | past | comments | ask | show | jobs | submitlogin
Mullvad's usage of Kyber is not affected by KyberSlash (mullvad.net)
33 points by amirmasoudabdol on Jan 5, 2024 | hide | past | favorite | 5 comments


I’m very surprised that folks are still building critical security software like this while making elementary mistakes like not using constant time operations. This is a class of vulnerability almost as old as I can remember.


As seen below, this vulnerabilty was also present in the reference C Kyber code

https://symbolic.software/blog/2023-12-19-kyberk2sovariablet...


There was a post a few days ago about how the NSA is wrong in not recommending hybrid quantum+classical cryptography algorithms [0].

And here is Mullvad, using two quantum algorithms together, presumably on top of classical cryptography.

> We use two quantum-secure key encapsulation mechanisms (Kyber and Classic McEliece) and mix the secrets from both. This means that both algorithms must have exploitable vulnerabilities before the security of the VPN tunnel can become affected.

[0] https://news.ycombinator.com/item?id=38844117


Seems to me like this would actually be much more likely to double their chances of being vulnerable, in that a break in either algorithm would lead to a weakness in their system.

I'd need to see some extraordinary evidence for that claim.


Appears to be a hybrid: https://www.wireguard.com/protocol/

If an additional layer of symmetric-key crypto is required (for, say, post-quantum resistance), WireGuard also supports an optional pre-shared key that is mixed into the public key cryptography. When pre-shared key mode is not in use, the pre-shared key value used below is assumed to be an all-zero string of 32 bytes.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: