-
Introduction to the CMVP and CAVP
Please enjoy our quick primer on CMVP, CAVP and ESV testing.
-
XDRGB – Random Bit Generator using any XOF
Resulting from a joint collaboration between John Kelsey (NIST), Stefan Lucks (Bauhaus-Universität Weimar, Germany) and Stephan Müller (atsec information security), a new deterministic random bit generator (DRBG) is published. The XDRBG was publicly presented at the 30th Fast Software Encryption Conference 2024 in Leuven, Belgium. The XDRBG uses…
-
A FIPS 140-3 compliant hybrid KEM algorithm
n addition to the sole use of Kyber KEM, a hybrid mechanism using X25519 can be devised that acts as a drop-in replacement for Kyber KEM.
-
PQC: Kyber and Dilithium – State of the (Draft) Standards
On August 24 2023 NIST published the first drafts of: On November 15 2023 NIST announced that the three algorithms will be available for testing at the ACVP Demo service. During the course of the development of both Kyber and Dilithium reference implementations, NIST developers reached out to…
-
First Post-Quantum Algorithm Certificate issued by CAVP3
On July 14, atsec obtained the first validation certificate for a post-quantum cryptographic algorithm: A4204. We used the Automated Cryptographic Validation Protocol (ACVP) to verify the correctness of the LMS (Leighton-Micali Signature) key pair generation, signature generation, and signature verification implementations in the QASM Hardware Security Module, developed…
-
CNSA 2.0 and Quantum Resistant Encryption Algorithms
The National Security Agency (NSA) has released the Commercial National Security Algorithm (CNSA) Suite 2.0 and Frequently Asked Questions detailing future quantum resistant (QR) algorithm requirements for National Security Systems (NSS). CNSA 1.0 was published in 2016 to replace NSA Suite B and standardized the use of the…
-
Protocol Rule Enforcement & Module Scope
Stephan Müller’s presentation at the 2022 ICMC.
-
atsec attended the 20th International Conference on Applied Cryptography and Network Security (ACNS)
Last week, employees from atsec Germany and atsec Italy attended the 20th International Conference on Applied Cryptography and Network Security (ACNS) in Rome, Italy. As the name implies, ACNS highlights academic and industry research in the areas of applied cryptography and network security. Accepted papers are published in…
-
Distinguishing encrypted from non-encrypted data
Our colleague Quentin Gouchet, together with Eric Järpe, authored an article on distinguishing encrypted from non-encrypted data. We invite you to read the article here. Introduction:The discrimination of encrypted data from other kinds of data is of interest in many areas of application. For instance for making other…