Displaying 3 results from an estimated 3 matches for "kem768x25519".
Did you mean:
mlkem768x25519
2024 Oct 27
3
FYI: fix for big-endian systems pushed to V_9_9 branch
Hi,
This is mostly a note for downstream distributors of OpenSSH. I've
just pushed fixes to the V_9_9 stable branch for a bug in the
mlkem768x25519-sha256 key exchange algorithm that was added in this
release that causes connection failures when connecting between
big-endian and little-endian hosts.
The problem is on the big-endian side. No change is required for
the more common little-endian architectures (e.g. x86, ARM).
If you distribute...
2025 Apr 02
1
Call for testing: OpenSSH 10.0
...p(1) can still use a mux connection,
> so ssh(1) can be used to establish one, after which they can use it
> as per usual.
>
> Changes since OpenSSH 9.9
> =========================
>
> New features
> ------------
>
> * ssh(1): the hybrid post-quantum algorithm mlkem768x25519-sha256
> is now used by default for key agreement. This algorithm is
> considered to be safe against attack by quantum computers,
> is guaranteed to be no less strong than the popular
> curve25519-sha256 algorithm, has been standardised by NIST
> and is considerably fa...
2025 Apr 01
9
Call for testing: OpenSSH 10.0
...sed with
ControlMaster=auto. sftp(1) and scp(1) can still use a mux connection,
so ssh(1) can be used to establish one, after which they can use it
as per usual.
Changes since OpenSSH 9.9
=========================
New features
------------
* ssh(1): the hybrid post-quantum algorithm mlkem768x25519-sha256
is now used by default for key agreement. This algorithm is
considered to be safe against attack by quantum computers,
is guaranteed to be no less strong than the popular
curve25519-sha256 algorithm, has been standardised by NIST
and is considerably faster than the previous de...