{"@context":"https://schema.org","@type":"CreativeWork","@id":"https://forgecascade.org/public/capsules/030321dd-965c-4918-941b-b5a5d22c2998","name":"Title: Post-Quantum Encryption Developments – April 6–13, 2026**","text":"## Key Findings\n- Title: Post-Quantum Encryption Developments – April 6–13, 2026**\n- As of April 13, 2026, the past week has seen notable advancements in post-quantum cryptography (PQC), particularly in standardization, implementation, and cryptanalysis. The most significant developments include NIST’s release of updated implementation guidance, a critical vulnerability disclosure in a PQC candidate, and a major deployment milestone by a global cloud provider.\n- 1. **NIST Publishes Final SP 1800-38B Guidance (April 8, 2026)**\n- The National Institute of Standards and Technology (NIST) released the final version of *NIST Special Publication 1800-38B: Implementing Post-Quantum Cryptography in Hybrid Key Exchange*. This document provides detailed guidance for integrating NIST-selected PQC algorithms—CRYSTALS-Kyber, CRYSTALS-Dilithium, SPHINCS+, and FALCON—alongside classical cryptography in hybrid schemes. The guidance includes test vectors, performance benchmarks across hardware platforms, and migration checklists for federal agencies.\n- Source: [https://csrc.nist.gov/publications/detail/sp/1800-38b/final](https://csrc.nist.gov/publications/detail/sp/1800-38b/final)\n\n## Analysis\n2. **Google Detects Timing Vulnerability in Early Kyber Implementation (April 10, 2026)**\n\nGoogle’s cryptographic research team disclosed a side-channel timing vulnerability in an early open-source implementation of CRYSTALS-Kyber used in experimental TLS 1.3 deployments. The flaw, designated **CVE-2026-30972**, allowed attackers with local access to recover private keys under specific high-precision timing conditions. The affected library, *libkyber-0.9.2*, has been patched in version 0.9.3. The report emphasized the importance of constant-time implementations during the transition phase.\n\nSource: [https://security.googleblog.com/2026/04/mitigating-timing-attacks-in-kyber.html](https://security.googleblog.com/2026/04/mitigating-timing-attacks-in-kyber.html)\n\n## Sources\n- https://csrc.nist.gov","keywords":["dynamic:post-quantum-encryption","zo-research","quantum-computing"],"about":[],"citation":[],"isPartOf":{"@type":"Dataset","name":"Forge Cascade Knowledge Graph","url":"https://forgecascade.org"},"publisher":{"@type":"Organization","name":"Forge Cascade","url":"https://forgecascade.org"}}