{"id":36787,"date":"2022-07-29T17:23:18","date_gmt":"2022-07-29T22:23:18","guid":{"rendered":"http:\/\/huewhite.com\/umb\/?p=36787"},"modified":"2022-07-29T17:23:18","modified_gmt":"2022-07-29T22:23:18","slug":"in-case-you-need-a-spot-of-cash","status":"publish","type":"post","link":"https:\/\/huewhite.com\/umb\/2022\/07\/29\/in-case-you-need-a-spot-of-cash\/","title":{"rendered":"In Case You Need A Spot Of Cash"},"content":{"rendered":"<p>Edward Parker and Michael Vermeer want a contest!<\/p>\n<blockquote><p>NIST [U.S. National Institute for Standards and Technology] and others in the cryptography community are carefully analyzing several PQC [post-quantum cryptography] algorithms to try to catch any potential vulnerabilities. But it\u2019s almost impossible to mathematically prove the security of most cryptography algorithms. In practice, the <a href=\"https:\/\/www.schneier.com\/blog\/archives\/2011\/04\/schneiers_law.html\">strongest evidence<\/a> for an algorithm\u2019s security is simply that\u00a0many experts have tried and failed to break it. The more people try to attack the new PQC algorithms and fail, the more likely it is that they are secure.<\/p>\n<p>One possible option for further crowdsourcing the analysis of NIST\u2019s final candidate PQC algorithms would be a contest in which the general public is invited to try to break them. As <a href=\"https:\/\/www.bugcrowd.com\/bug-bounty-list\/\">hundreds of companies<\/a>\u00a0that offer public bug bounties have discovered, crowdsourced penetration testing can be a very useful tool for improving cybersecurity. The U.S. Departments of <a href=\"https:\/\/www.dhs.gov\/news\/2022\/04\/22\/hack-dhs-program-successfully-concludes-first-bug-bounty-program\">Homeland Security<\/a> and <a href=\"https:\/\/hackerone.com\/hack-us-h1c\">Defense<\/a> have also recently experimented with offering bug bounties to anyone who discovers cyber vulnerabilities in the departments\u2019 systems. A public contest certainly can\u2019t replace a mathematical security analysis, but it could be a useful complement that provides additional evidence of the algorithms\u2019 security.<em> [<a href=\"https:\/\/www.lawfareblog.com\/hack-post-quantum-cryptography-now-so-bad-actors-dont-do-it-later\" target=\"_blank\" rel=\"noopener\"><strong>Lawfare<\/strong><\/a>]<\/em><\/p><\/blockquote>\n<p>Parker and Vermeer address and repudiate the usual objections to such a contest, and I tend to agree &#8211; let &#8220;the public,&#8221; a necessarily self-selecting group of mathematicians, both professional and amateurs, have a go at it. Both cash and notoriety will accrue to anyone who actually finds a weakness in any of the algorithms.<\/p>\n<p>And may result in the development of new mathematical techniques and tools. Win-win?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Edward Parker and Michael Vermeer want a contest! NIST [U.S. National Institute for Standards and Technology] and others in the cryptography community are carefully analyzing several PQC [post-quantum cryptography] algorithms to try to catch any potential vulnerabilities. But it\u2019s almost impossible to mathematically prove the security of most cryptography algorithms. \u2026 <a class=\"continue-reading-link\" href=\"https:\/\/huewhite.com\/umb\/2022\/07\/29\/in-case-you-need-a-spot-of-cash\/\"> Continue reading <span class=\"meta-nav\">&rarr; <\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-36787","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/posts\/36787","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/comments?post=36787"}],"version-history":[{"count":1,"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/posts\/36787\/revisions"}],"predecessor-version":[{"id":36788,"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/posts\/36787\/revisions\/36788"}],"wp:attachment":[{"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/media?parent=36787"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/categories?post=36787"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/tags?post=36787"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}