Open Destroyinator69420 opened 2 years ago
Thanks for taking the time @Destroyinator69420 we only used RSA 1024 together with AES 256 in the beginning because it was good enough for generating keys on the client side in the browser using Javascript without crashing the browser. Now that we have worker threads etc we could up the security once there is time and interest for it to continue or further development on the SubEther project towards a v2. I didn't know about the name you shared but I will definitely check it out before I embark on a v2 of this system, thanks!
I read your cryptosystem and realized that RSA 1024 may be vulnerable with a high end quantum computer and is pretty much guaranteed to be vulnerable in the near future. Crystals-Kyber was nominated by NIST as the official post quantum cryptography algorithm approved for government use. If it is safe to hide information the people ought to know, then it is safe to protect people using SubEther from state sponsored quantum computer attacks. You can find a javascript implementation at this github repo. (https://github.com/antontutoveanu/crystals-kyber-javascript) It is recommended by the pq-crystals.org website (https://pq-crystals.org/kyber/software.shtml) under the third party implementation section.