Damus
Tim Bouma profile picture
Tim Bouma
@Tim Bouma
After a very successful coding sprint, I am taking a few days to reflect on what I’ve built. This is the outcome of about a year’s worth of prototyping, coding and experimentation. I’ve proven that I can create a secure back-end communication channel between any two npubs to negotiate payments and records transfer.

The past few weeks were dedicated to integrating quantum-safe cryptography where I had to add in an additional protocol handshake to transfer the quantum-safe public key for key encapsulation and generating a shared secret to additionally encrypt the payload.

As you can see from the demo, the user actually sees nothing new, but I did add a message that indicates the quantum-safe key exchange has completed and the record is now safe for transmission.

In the end, it’s a layered approach. I use NIP-44/NIP-59 (symmetric encryption and gift-wrapping). I then further encrypt the encrypted payload using the quantum-safe shared secret. If an attacker manages to crack ECC with Shor’s Algorithm with a quantum computer, they’ll be rewarded with a a payload that is encrypted using the quantum-safe key exchange algorithms.

Is this overkill? You bet. But look at the video - the user won’t notice anything. This basically kills all quantum computer FUD and I honestly don’t believe there is a more secure way to do this in the world. Current ‘quantum-safe’ solutions being pitched, only protect the ‘pipe’ while everything that runs through it is in the clear, with the pipe being broken at each hop. I protect end-to-end the ‘payload’ - no reliance on pipes or friendly hops.
#nostr #safebox

Onward!

14❤️3:yes:1🔥1🤙1
zap2buy · 9w
Amazing to be able to watch this all being developed in the open!