Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

One does not place backdoors in hash algorithms. It's much more interesting to place backdoors in key agreement protocols.


How would NSA have "placed" a backdoor in Kyber? NSA didn't write Kyber.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: