• About Us
  • Privacy & Policy
  • Terms Conditions
  • Contact Us
biztoplocation.space
  • Home
  • Tech Trends

    The best deals ahead of the October Big Deal Days sale and everything we know so far

    Google Maps will flag businesses with potentially fake reviews

    DoNotPay ‘robot lawyer’ fined $193K by the FTC for not being a lawyer

    Meta’s Orion holographic avatars will (eventually) be in VR too

    Google files EU antitrust complaint against Microsoft

    California’s ‘click to cancel’ subscription bill is signed into law

    Horizon Zero Dawn Remastered arrives October 31 on PS5 and PC

    Ghost of Yōtei is a Tsushima sequel coming to PS5 in 2025

    The Google Photos video editor is getting AI, because of course it is

  • AI News
    The Quantum Arms Race Isn’t Just About Tech, It’s About Who Controls the Narrative

    “🌀 The Quantum Arms Race: Who Holds the Key to Our Tech Future? 🌍🔑”

    New Survey Finds Balancing AI’s Ease of Use with Trust is Top of Business Leaders Minds

    Navigating the AI Frontier: Balancing Trust and Usability for Business Success 🤝✨

    Benjamin Harvey, Ph.D., Founder & CEO of AI Squared – Interview Series

    Unlocking the Future of AI: Dr. Benjamin Harvey’s Vision with AI Squared 🚀✨

    How to Realize Value from a GenAI-Enabled Workforce

    Maximize Your Business Potential: The Game-Changing Power of GenAI 🚀✨

    How Does AI Use Impact Critical Thinking?

    Navigating the AI Revolution: Boosting Critical Thinking in a Tech-Driven World 🤖✨

    From Evo 1 to Evo 2: How NVIDIA is Redefining Genomic Research and AI-Driven Biological Innovations

    Unlocking the Secrets of Life: How NVIDIA is Revolutionizing Genomic Research with AI 🚀🌟

    Jotform Review: The Best Form Builder or Just Overhyped?

    Unlocking the Truth: Is Jotform the Next Best Thing in Form Building? 🤔🚀✨

    The Road to Better AI-Based Video Editing

    Unlock Your Creative Potential: Explore the Future of AI in Video Editing! 🎥✨🚀

    Post-RAG Evolution: AI’s Journey from Information Retrieval to Real-Time Reasoning

    Unlocking AI’s Future: From Data Fetching to Real-Time Thinking 🤖✨

  • Cyber Security
    Russian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign

    Unmasking the Threat: How APT29 Outsmarts Gmail’s 2FA! 🚨🔍✨

    New Malware Campaign Uses Cloudflare Tunnels to Deliver RATs via Phishing Chains

    Beware the Digital Shadows: How Cloudflare Tunnels Are Fueling Sneaky Malware Attacks! 🌐🚨

    Veeam Patches CVE-2025-23121: Critical RCE Bug Rated 9.9 CVSS in Backup & Replication

    Stay One Step Ahead: Veeam Patches Critical CVE-2025-23121 Vulnerability! 🚨🔒✨

    Backups Are Under Attack: How to Protect Your Backups

    Guard Your Data: Essential Strategies to Defend Your Backups from Ransomware! 🔒🚀

    PyPI, npm, and AI Tools Exploited in Malware Surge Targeting DevOps and Cloud Environments

    Exposing the Shadows: The Rising Malware Menace in PyPI, npm, and AI Tools 🚨🤖💻

    AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar

    Unlock the Secrets to Safeguarding AI Agents! 🚀🔒 Join Our Exclusive Webinar!

    Former Black Basta Members Use Microsoft Teams and Python Scripts in 2025 Attacks

    Unmasking the New Threat: How Ex-Black Basta Hackers Are Targeting Microsoft Teams with Python 🕵️‍♂️⚠️

    295 Malicious IPs Launch Coordinated Brute-Force Attacks on Apache Tomcat Manager

    Exposing the Cyber Underworld: 🚨 295 Malicious IPs Targeting Apache Tomcat Manager! 🛡️💻

    INTERPOL Dismantles 20,000+ Malicious IPs Linked to 69 Malware Variants in Operation Secure

    🌟 Global Cybersecurity Breakthrough: How INTERPOL Took Down 20,000 Malicious IPs! 🌍🔒

  • Apps News
    The Quantum Arms Race Isn’t Just About Tech, It’s About Who Controls the Narrative

    “🌀 The Quantum Arms Race: Who Holds the Key to Our Tech Future? 🌍🔑”

    New Survey Finds Balancing AI’s Ease of Use with Trust is Top of Business Leaders Minds

    Navigating the AI Frontier: Balancing Trust and Usability for Business Success 🤝✨

    Benjamin Harvey, Ph.D., Founder & CEO of AI Squared – Interview Series

    Unlocking the Future of AI: Dr. Benjamin Harvey’s Vision with AI Squared 🚀✨

    How to Realize Value from a GenAI-Enabled Workforce

    Maximize Your Business Potential: The Game-Changing Power of GenAI 🚀✨

    How Does AI Use Impact Critical Thinking?

    Navigating the AI Revolution: Boosting Critical Thinking in a Tech-Driven World 🤖✨

    From Evo 1 to Evo 2: How NVIDIA is Redefining Genomic Research and AI-Driven Biological Innovations

    Unlocking the Secrets of Life: How NVIDIA is Revolutionizing Genomic Research with AI 🚀🌟

    Jotform Review: The Best Form Builder or Just Overhyped?

    Unlocking the Truth: Is Jotform the Next Best Thing in Form Building? 🤔🚀✨

    The Road to Better AI-Based Video Editing

    Unlock Your Creative Potential: Explore the Future of AI in Video Editing! 🎥✨🚀

    Post-RAG Evolution: AI’s Journey from Information Retrieval to Real-Time Reasoning

    Unlocking AI’s Future: From Data Fetching to Real-Time Thinking 🤖✨

  • Events

    Does Cannabis Belong at Business Events?

    Rising Event Costs to Challenge 2025 Budgets

    Event Tech and the Future of In-Person Networking

    Dubai To Invest $2.7 Billion in What Will Become the Largest Exhibition Venue in the Middle East

    The Old Playbook Will Not Work for Today’s Corporate Events

    Why Actual Face Time Beats Screen Time for Gen Z

    Breathe New Life Into Meetings in Whistler

    Oak View Group and OCESA Team Up to Offer Hospitality at Four Mexico City Venues

    Time to Chill: Planners’ Post-Meeting Rituals

No Result
View All Result
  • Home
  • Tech Trends

    The best deals ahead of the October Big Deal Days sale and everything we know so far

    Google Maps will flag businesses with potentially fake reviews

    DoNotPay ‘robot lawyer’ fined $193K by the FTC for not being a lawyer

    Meta’s Orion holographic avatars will (eventually) be in VR too

    Google files EU antitrust complaint against Microsoft

    California’s ‘click to cancel’ subscription bill is signed into law

    Horizon Zero Dawn Remastered arrives October 31 on PS5 and PC

    Ghost of Yōtei is a Tsushima sequel coming to PS5 in 2025

    The Google Photos video editor is getting AI, because of course it is

  • AI News
    The Quantum Arms Race Isn’t Just About Tech, It’s About Who Controls the Narrative

    “🌀 The Quantum Arms Race: Who Holds the Key to Our Tech Future? 🌍🔑”

    New Survey Finds Balancing AI’s Ease of Use with Trust is Top of Business Leaders Minds

    Navigating the AI Frontier: Balancing Trust and Usability for Business Success 🤝✨

    Benjamin Harvey, Ph.D., Founder & CEO of AI Squared – Interview Series

    Unlocking the Future of AI: Dr. Benjamin Harvey’s Vision with AI Squared 🚀✨

    How to Realize Value from a GenAI-Enabled Workforce

    Maximize Your Business Potential: The Game-Changing Power of GenAI 🚀✨

    How Does AI Use Impact Critical Thinking?

    Navigating the AI Revolution: Boosting Critical Thinking in a Tech-Driven World 🤖✨

    From Evo 1 to Evo 2: How NVIDIA is Redefining Genomic Research and AI-Driven Biological Innovations

    Unlocking the Secrets of Life: How NVIDIA is Revolutionizing Genomic Research with AI 🚀🌟

    Jotform Review: The Best Form Builder or Just Overhyped?

    Unlocking the Truth: Is Jotform the Next Best Thing in Form Building? 🤔🚀✨

    The Road to Better AI-Based Video Editing

    Unlock Your Creative Potential: Explore the Future of AI in Video Editing! 🎥✨🚀

    Post-RAG Evolution: AI’s Journey from Information Retrieval to Real-Time Reasoning

    Unlocking AI’s Future: From Data Fetching to Real-Time Thinking 🤖✨

  • Cyber Security
    Russian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign

    Unmasking the Threat: How APT29 Outsmarts Gmail’s 2FA! 🚨🔍✨

    New Malware Campaign Uses Cloudflare Tunnels to Deliver RATs via Phishing Chains

    Beware the Digital Shadows: How Cloudflare Tunnels Are Fueling Sneaky Malware Attacks! 🌐🚨

    Veeam Patches CVE-2025-23121: Critical RCE Bug Rated 9.9 CVSS in Backup & Replication

    Stay One Step Ahead: Veeam Patches Critical CVE-2025-23121 Vulnerability! 🚨🔒✨

    Backups Are Under Attack: How to Protect Your Backups

    Guard Your Data: Essential Strategies to Defend Your Backups from Ransomware! 🔒🚀

    PyPI, npm, and AI Tools Exploited in Malware Surge Targeting DevOps and Cloud Environments

    Exposing the Shadows: The Rising Malware Menace in PyPI, npm, and AI Tools 🚨🤖💻

    AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar

    Unlock the Secrets to Safeguarding AI Agents! 🚀🔒 Join Our Exclusive Webinar!

    Former Black Basta Members Use Microsoft Teams and Python Scripts in 2025 Attacks

    Unmasking the New Threat: How Ex-Black Basta Hackers Are Targeting Microsoft Teams with Python 🕵️‍♂️⚠️

    295 Malicious IPs Launch Coordinated Brute-Force Attacks on Apache Tomcat Manager

    Exposing the Cyber Underworld: 🚨 295 Malicious IPs Targeting Apache Tomcat Manager! 🛡️💻

    INTERPOL Dismantles 20,000+ Malicious IPs Linked to 69 Malware Variants in Operation Secure

    🌟 Global Cybersecurity Breakthrough: How INTERPOL Took Down 20,000 Malicious IPs! 🌍🔒

  • Apps News
    The Quantum Arms Race Isn’t Just About Tech, It’s About Who Controls the Narrative

    “🌀 The Quantum Arms Race: Who Holds the Key to Our Tech Future? 🌍🔑”

    New Survey Finds Balancing AI’s Ease of Use with Trust is Top of Business Leaders Minds

    Navigating the AI Frontier: Balancing Trust and Usability for Business Success 🤝✨

    Benjamin Harvey, Ph.D., Founder & CEO of AI Squared – Interview Series

    Unlocking the Future of AI: Dr. Benjamin Harvey’s Vision with AI Squared 🚀✨

    How to Realize Value from a GenAI-Enabled Workforce

    Maximize Your Business Potential: The Game-Changing Power of GenAI 🚀✨

    How Does AI Use Impact Critical Thinking?

    Navigating the AI Revolution: Boosting Critical Thinking in a Tech-Driven World 🤖✨

    From Evo 1 to Evo 2: How NVIDIA is Redefining Genomic Research and AI-Driven Biological Innovations

    Unlocking the Secrets of Life: How NVIDIA is Revolutionizing Genomic Research with AI 🚀🌟

    Jotform Review: The Best Form Builder or Just Overhyped?

    Unlocking the Truth: Is Jotform the Next Best Thing in Form Building? 🤔🚀✨

    The Road to Better AI-Based Video Editing

    Unlock Your Creative Potential: Explore the Future of AI in Video Editing! 🎥✨🚀

    Post-RAG Evolution: AI’s Journey from Information Retrieval to Real-Time Reasoning

    Unlocking AI’s Future: From Data Fetching to Real-Time Thinking 🤖✨

  • Events

    Does Cannabis Belong at Business Events?

    Rising Event Costs to Challenge 2025 Budgets

    Event Tech and the Future of In-Person Networking

    Dubai To Invest $2.7 Billion in What Will Become the Largest Exhibition Venue in the Middle East

    The Old Playbook Will Not Work for Today’s Corporate Events

    Why Actual Face Time Beats Screen Time for Gen Z

    Breathe New Life Into Meetings in Whistler

    Oak View Group and OCESA Team Up to Offer Hospitality at Four Mexico City Venues

    Time to Chill: Planners’ Post-Meeting Rituals

No Result
View All Result
biztoplocation.space
No Result
View All Result
Home Security

Google Chrome Switches to ML-KEM for Post-Quantum Cryptography Defense

admin by admin
September 17, 2024
in Security
0
0
SHARES
0
VIEWS
Share on FacebookShare on Twitter

[ad_1]

Sep 17, 2024Ravie LakshmananBrowser Security / Quantum Computing

Post-Quantum Cryptography Defense

Google has announced that it will be switching from KYBER to ML-KEM in its Chrome web browser as part of its ongoing efforts to defend against the risk posed by cryptographically relevant quantum computers (CRQCs).

“Chrome will offer a key share prediction for hybrid ML-KEM (codepoint 0x11EC),” David Adrian, David Benjamin, Bob Beck, and Devon O’Brien of the Chrome Team said. “The PostQuantumKeyAgreementEnabled flag and enterprise policy will apply to both Kyber and ML-KEM.”

The changes are expected to take effect in Chrome version 131, which is on track for release in early November 2024. Google noted that the two hybrid post-quantum key exchange approaches are essentially incompatible with each other, prompting it to abandon KYBER.

“The changes to the final version of ML-KEM make it incompatible with the previously deployed version of Kyber,” the company said. “As a result, the codepoint in TLS for hybrid post-quantum key exchange is changing from 0x6399 for Kyber768+X25519, to 0x11EC for ML-KEM768+X25519.”

Cybersecurity

The development comes shortly after the U.S. National Institute of Standards and Technology (NIST) published the final versions of the three new encryption algorithms — to secure current systems against future attacks using quantum technologies, marking the culmination of an eight-year effort from the agency.

The algorithms in question are FIPS 203 (aka ML-KEM), FIPS 204 (aka CRYSTALS-Dilithium or ML-DSA), and FIPS 205 (aka Sphincs+ or SLH-DSA) are meant for general encryption and protecting digital signatures. A fourth algorithm, FN-DSA (originally called FALCON), is slated for finalization later this year.

ML-KEM, short for Module-Lattice-based Key-Encapsulation Mechanism, is derived from the round-three version of the CRYSTALS-KYBER KEM and can be used to establish a shared secret key between two parties communicating over a public channel.

Microsoft, for its part, is also readying for a post-quantum world by announcing an update to its SymCrypt cryptographic library with support for ML-KEM and eXtended Merkle Signature Scheme (XMSS).

“Adding post-quantum algorithm support to the underlying crypto engine is the first step towards a quantum safe world,” the Windows maker said, stating the transition to post-quantum cryptography (PQC) is a “complex, multi-year and iterative process” that requires careful planning.

The disclosure also follows the discovery of a cryptographic flaw in the Infineon SLE78, Optiga Trust M, and Optiga TPM security microcontrollers that could allow for the extraction of Elliptic Curve Digital Signature Algorithm (ECDSA) private keys from YubiKey hardware authentication devices.

The cryptographic flaw within the Infineon-supplied library is believed to have remained unnoticed for 14 years and about 80 highest-level Common Criteria certification evaluations.

The side-channel attack, dubbed EUCLEAK (CVE-2024-45678, CVSS score: 4.9) by NinjaLab’s Thomas Roche, affects all Infineon security microcontrollers embedding the cryptographic library and the following YubiKey devices –

  • YubiKey 5 Series versions prior to 5.7
  • YubiKey 5 FIPS Series prior to 5.7
  • YubiKey 5 CSPN Series prior to 5.7
  • YubiKey Bio Series versions prior to 5.7.2
  • Security Key Series all versions prior to 5.7
  • YubiHSM 2 versions prior to 2.4.0
  • YubiHSM 2 FIPS versions prior to 2.4.0

“The attacker would need physical possession of the YubiKey, Security Key, or YubiHSM, knowledge of the accounts they want to target, and specialized equipment to perform the necessary attack,” Yubico, the company behind YubiKey, said in a coordinated advisory.

Cybersecurity

“Depending on the use case, the attacker may also require additional knowledge including username, PIN, account password, or [YubiHSM] authentication key.”

But because existing YubiKey devices with vulnerable firmware versions can’t be updated – an intentional design choice meant to maximize security and avoid introducing new vulnerabilities – they are permanently susceptible to EUCLEAK.

The company has since announced plans to deprecate support for Infineon’s cryptographic library in favor of its own cryptographic library as part of firmware versions YubiKey f5.7 and YubiHSM 2.4.

A similar side-channel attack against Google Titan security keys was demonstrated by Roche and Victor Lomne in 2021, potentially allowing malicious actors to clone the devices by exploiting an electromagnetic side-channel in the chip embedded in them.

“The [EUCLEAK] attack requires physical access to the secure element (few local electromagnetic side-channel acquisitions, i.e. few minutes, are enough) in order to extract the ECDSA secret key,” Roche said. “In the case of the FIDO protocol, this allows to create a clone of the FIDO device.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.



[ad_2]

Source link

Previous Post

What Exactly Is a Meeting Planner?

Next Post

A Sims movie from Amazon MGM Studios is on the way

admin

admin

Next Post

A Sims movie from Amazon MGM Studios is on the way

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected test

  • 23.9k Followers
  • 99 Subscribers
  • Trending
  • Comments
  • Latest
CERT-UA Warns: Dark Crystal RAT Targets Ukrainian Defense via Malicious Signal Messages

Cybersecurity Under Siege: The Dark Crystal RAT Targets Ukraine’s Defense! 🚨🔒

March 20, 2025
Voyantis Secures $41M to Revolutionize AI-Driven Growth Strategies

Unlocking Growth: How Voyantis’ $41M AI Revolution is Changing the Game for Businesses 🌟💼

February 14, 2025

Oak View Group and OCESA Team Up to Offer Hospitality at Four Mexico City Venues

September 24, 2024
Explore Fully Operational Cockpits and Aircraft with Aerofly FS Global Mobile Flight Simulator

Soar Beyond Limits: Experience the Ultimate Flight Adventure with Aerofly FS Global! ✈️🌍✨

November 22, 2024

Nth Degree Targets Strategic Acquisitions with New Backing from Shamrock Capital

0

5 Best Classic App Store Games

0

Apple Vision Pro Vulnerability Exposed Virtual Keyboard Inputs to Attackers

0

The best iPad accessories for 2024

0
Grab Your Can-Do Attitude and Download Boxville 2

Unleash Your Imagination: Dive into the Whimsical World of Boxville 2! 🎮✨🧩

June 28, 2025
Marvel Mystic Mayhem Arrives on the App Store Featuring Superhero RPG Battles

Unleash Your Inner Hero: Dive into Marvel Mystic Mayhem Now! 🦸‍♀️✨

June 27, 2025
4 Best Brain Training Apps and Games

Unlock Your Brain’s Potential: Top 4 Apps to Supercharge Your Mind! 🧠🚀✨

June 25, 2025
5 Great Cocktail and Drink Apps

Sip, Savor & Shake: Top 5 Cocktail Apps Every Drink Lover Needs! 🍹📲

June 24, 2025

Recent News

Grab Your Can-Do Attitude and Download Boxville 2

Unleash Your Imagination: Dive into the Whimsical World of Boxville 2! 🎮✨🧩

June 28, 2025
Marvel Mystic Mayhem Arrives on the App Store Featuring Superhero RPG Battles

Unleash Your Inner Hero: Dive into Marvel Mystic Mayhem Now! 🦸‍♀️✨

June 27, 2025
4 Best Brain Training Apps and Games

Unlock Your Brain’s Potential: Top 4 Apps to Supercharge Your Mind! 🧠🚀✨

June 25, 2025
5 Great Cocktail and Drink Apps

Sip, Savor & Shake: Top 5 Cocktail Apps Every Drink Lover Needs! 🍹📲

June 24, 2025

Biz Top News

At Biz Top News, we provide the latest updates and insights on technology, from AI and cybersecurity to apps and cryptocurrency. Stay informed with our expert analysis and breaking news.

Browse by Category

  • AI News
  • Apps
  • Crypto
  • Events
  • Security
  • Tech Trends
  • Uncategorized

About

  • About Us
  • Privacy & Policy
  • Terms Conditions
  • Contact Us

    © 2025 Biztoplocation - All rights reserved.

    No Result
    View All Result

    © 2025 Biztoplocation - All rights reserved.