pretalx.devconf.info/devconf-cz-2025/talk/JHTGT7

Preview meta tags from the pretalx.devconf.info website.

Linked Hostnames

4

Thumbnail

Search Engine Appearance

Google

https://pretalx.devconf.info/devconf-cz-2025/talk/JHTGT7

Post Quantum Crypto in Practice: Real-World Implementation with Firefox, OpenSSL, and Rust-Based Solutions - DevConf.CZ 2025 pretalx

As post-quantum cryptography (PQC) continues to evolve, ensuring a smooth and adaptable transition for end users, developers, and system administrators remains a top priority. Building on discussions from the last DevConf and the latest NIST recommendations, this session presents recent updates in the Fedora ecosystem with cryptographic components, including crypto-policies, demonstrating real-world PQC integration. Our live demo will showcase a familiar user experience — a routine Firefox browsing session — that seamlessly incorporates PQC. By inspecting the security tab when connecting to a web server, we illustrate how the user experience remains intentionally "boring," signaling a successful, non-disruptive deployment of advanced cryptographic protocols. Beneath this simplicity, however, lies a powerful infrastructure of client-side and server-side components. On the client side, we employ a nightly build of Firefox enhanced with PQC authentication and key exchange capabilities, made possible through Qryoptic — a rust based soft-token derived from the Kryoptic project — loaded alongside Firefox's default NSS soft-token. On the server side, we leverage vanilla nginx running over OpenSSL 3.2 with our Aurora provider, a rust written OpenSSL Provider designed to boost cryptographic agility by allowing flexible backend implementations for PQC primitives. While some of these results could be approximated using vanilla Firefox and OpenSSL with the oqsprovider, our approach enhances cryptographic agility through shallow loadable modules — decoupling stable systems from rapidly evolving PQC ecosystems. Beyond the demo, we’ll dive into the experience of writing OpenSSL Providers in Rust and explore how open-source efforts like Kryoptic can be customized to build experimental PKCS#11 soft-tokens, offering valuable tools for developers and security researchers. Concluding the session, we’ll discuss the broader methodology behind these efforts and how shallow loadable modules can empower users, sysadmins, developers, and cryptographers alike to achieve greater flexibility and security in a post-quantum world.



Bing

Post Quantum Crypto in Practice: Real-World Implementation with Firefox, OpenSSL, and Rust-Based Solutions - DevConf.CZ 2025 pretalx

https://pretalx.devconf.info/devconf-cz-2025/talk/JHTGT7

As post-quantum cryptography (PQC) continues to evolve, ensuring a smooth and adaptable transition for end users, developers, and system administrators remains a top priority. Building on discussions from the last DevConf and the latest NIST recommendations, this session presents recent updates in the Fedora ecosystem with cryptographic components, including crypto-policies, demonstrating real-world PQC integration. Our live demo will showcase a familiar user experience — a routine Firefox browsing session — that seamlessly incorporates PQC. By inspecting the security tab when connecting to a web server, we illustrate how the user experience remains intentionally "boring," signaling a successful, non-disruptive deployment of advanced cryptographic protocols. Beneath this simplicity, however, lies a powerful infrastructure of client-side and server-side components. On the client side, we employ a nightly build of Firefox enhanced with PQC authentication and key exchange capabilities, made possible through Qryoptic — a rust based soft-token derived from the Kryoptic project — loaded alongside Firefox's default NSS soft-token. On the server side, we leverage vanilla nginx running over OpenSSL 3.2 with our Aurora provider, a rust written OpenSSL Provider designed to boost cryptographic agility by allowing flexible backend implementations for PQC primitives. While some of these results could be approximated using vanilla Firefox and OpenSSL with the oqsprovider, our approach enhances cryptographic agility through shallow loadable modules — decoupling stable systems from rapidly evolving PQC ecosystems. Beyond the demo, we’ll dive into the experience of writing OpenSSL Providers in Rust and explore how open-source efforts like Kryoptic can be customized to build experimental PKCS#11 soft-tokens, offering valuable tools for developers and security researchers. Concluding the session, we’ll discuss the broader methodology behind these efforts and how shallow loadable modules can empower users, sysadmins, developers, and cryptographers alike to achieve greater flexibility and security in a post-quantum world.



DuckDuckGo

https://pretalx.devconf.info/devconf-cz-2025/talk/JHTGT7

Post Quantum Crypto in Practice: Real-World Implementation with Firefox, OpenSSL, and Rust-Based Solutions - DevConf.CZ 2025 pretalx

As post-quantum cryptography (PQC) continues to evolve, ensuring a smooth and adaptable transition for end users, developers, and system administrators remains a top priority. Building on discussions from the last DevConf and the latest NIST recommendations, this session presents recent updates in the Fedora ecosystem with cryptographic components, including crypto-policies, demonstrating real-world PQC integration. Our live demo will showcase a familiar user experience — a routine Firefox browsing session — that seamlessly incorporates PQC. By inspecting the security tab when connecting to a web server, we illustrate how the user experience remains intentionally "boring," signaling a successful, non-disruptive deployment of advanced cryptographic protocols. Beneath this simplicity, however, lies a powerful infrastructure of client-side and server-side components. On the client side, we employ a nightly build of Firefox enhanced with PQC authentication and key exchange capabilities, made possible through Qryoptic — a rust based soft-token derived from the Kryoptic project — loaded alongside Firefox's default NSS soft-token. On the server side, we leverage vanilla nginx running over OpenSSL 3.2 with our Aurora provider, a rust written OpenSSL Provider designed to boost cryptographic agility by allowing flexible backend implementations for PQC primitives. While some of these results could be approximated using vanilla Firefox and OpenSSL with the oqsprovider, our approach enhances cryptographic agility through shallow loadable modules — decoupling stable systems from rapidly evolving PQC ecosystems. Beyond the demo, we’ll dive into the experience of writing OpenSSL Providers in Rust and explore how open-source efforts like Kryoptic can be customized to build experimental PKCS#11 soft-tokens, offering valuable tools for developers and security researchers. Concluding the session, we’ll discuss the broader methodology behind these efforts and how shallow loadable modules can empower users, sysadmins, developers, and cryptographers alike to achieve greater flexibility and security in a post-quantum world.

  • General Meta Tags

    13
    • title
      Post Quantum Crypto in Practice: Real-World Implementation with Firefox, OpenSSL, and Rust-Based Solutions :: DevConf.CZ 2025 :: pretalx
    • charset
      utf-8
    • title
      Post Quantum Crypto in Practice: Real-World Implementation with Firefox, OpenSSL, and Rust-Based Solutions - DevConf.CZ 2025 pretalx
    • description
      As post-quantum cryptography (PQC) continues to evolve, ensuring a smooth and adaptable transition for end users, developers, and system administrators remains a top priority. Building on discussions from the last DevConf and the latest NIST recommendations, this session presents recent updates in the Fedora ecosystem with cryptographic components, including crypto-policies, demonstrating real-world PQC integration. Our live demo will showcase a familiar user experience — a routine Firefox browsing session — that seamlessly incorporates PQC. By inspecting the security tab when connecting to a web server, we illustrate how the user experience remains intentionally "boring," signaling a successful, non-disruptive deployment of advanced cryptographic protocols. Beneath this simplicity, however, lies a powerful infrastructure of client-side and server-side components. On the client side, we employ a nightly build of Firefox enhanced with PQC authentication and key exchange capabilities, made possible through Qryoptic — a rust based soft-token derived from the Kryoptic project — loaded alongside Firefox's default NSS soft-token. On the server side, we leverage vanilla nginx running over OpenSSL 3.2 with our Aurora provider, a rust written OpenSSL Provider designed to boost cryptographic agility by allowing flexible backend implementations for PQC primitives. While some of these results could be approximated using vanilla Firefox and OpenSSL with the oqsprovider, our approach enhances cryptographic agility through shallow loadable modules — decoupling stable systems from rapidly evolving PQC ecosystems. Beyond the demo, we’ll dive into the experience of writing OpenSSL Providers in Rust and explore how open-source efforts like Kryoptic can be customized to build experimental PKCS#11 soft-tokens, offering valuable tools for developers and security researchers. Concluding the session, we’ll discuss the broader methodology behind these efforts and how shallow loadable modules can empower users, sysadmins, developers, and cryptographers alike to achieve greater flexibility and security in a post-quantum world.
    • application-name
      pretalx
  • Open Graph Meta Tags

    4
    • og:image
      https://pretalx.devconf.info/devconf-cz-2025/talk/JHTGT7/og-image
    • og:title
      Post Quantum Crypto in Practice: Real-World Implementation with Firefox, OpenSSL, and Rust-Based Solutions DevConf.CZ 2025
    • og:description
      As post-quantum cryptography (PQC) continues to evolve, ensuring a smooth and adaptable transition for end users, developers, and system administrators remains a top priority. Building on discussions from the last DevConf and the latest NIST recommendations, this session presents recent updates in the Fedora ecosystem with cryptographic components, including crypto-policies, demonstrating real-world PQC integration. Our live demo will showcase a familiar user experience — a routine Firefox browsing session — that seamlessly incorporates PQC. By inspecting the security tab when connecting to a web server, we illustrate how the user experience remains intentionally "boring," signaling a successful, non-disruptive deployment of advanced cryptographic protocols. Beneath this simplicity, however, lies a powerful infrastructure of client-side and server-side components. On the client side, we employ a nightly build of Firefox enhanced with PQC authentication and key exchange capabilities, made possible through Qryoptic — a rust based soft-token derived from the Kryoptic project — loaded alongside Firefox's default NSS soft-token. On the server side, we leverage vanilla nginx running over OpenSSL 3.2 with our Aurora provider, a rust written OpenSSL Provider designed to boost cryptographic agility by allowing flexible backend implementations for PQC primitives. While some of these results could be approximated using vanilla Firefox and OpenSSL with the oqsprovider, our approach enhances cryptographic agility through shallow loadable modules — decoupling stable systems from rapidly evolving PQC ecosystems. Beyond the demo, we’ll dive into the experience of writing OpenSSL Providers in Rust and explore how open-source efforts like Kryoptic can be customized to build experimental PKCS#11 soft-tokens, offering valuable tools for developers and security researchers. Concluding the session, we’ll discuss the broader methodology behind these efforts and how shallow loadable modules can empower users, sysadmins, developers, and cryptographers alike to achieve greater flexibility and security in a post-quantum world.
    • og:url
      http://pretalx.devconf.info/devconf-cz-2025/talk/JHTGT7/
  • Link Tags

    7
    • alternate
      https://pretalx.devconf.info/api/events/devconf-cz-2025/talks/JHTGT7
    • apple-touch-icon
      /static/common/img/icons/apple-touch-icon-180x180.9cd0735ee8ec.png
    • icon
      /static/common/img/icons/favicon.f79e2b95f18d.ico
    • stylesheet
      /static/CACHE/css/output.432548bd9cbe.css
    • stylesheet
      /devconf-cz-2025/static/event.css

Emails

1

Links

14