Post-Quantum Cryptography (PQC) - We Have Been Warned!
Post-Quantum Cryptography (SSH) - We Have Been Warned This is just a short note following on from my recent posts on PQC and SSH/TLS and PQC and Signal. In particular I noted for SSH that connections between reasonably recent servers and clients are already protected with post-quantum-cryptography protocols. Today I also discovered while logging into a not-so-up-to-date server (but an up-to-date client) that warnings are now being shown: user@up-do-date:~$ssh no-so-up-to-date.example.org ** WARNING: connection is not using a post-quantum key exchange algorithm. ** This session may be vulnerable to "store now, decrypt later" attacks. ** The server may need to be upgraded. See https://openssh.com/pq.html user@no-so-up-to-date.example.org's password: Which should certainly help encourage maintainers of those not-so-up-to-date systems to get that done.