<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Whaaat!</title>
    <description>The latest articles on DEV Community by Whaaat! (@whaaat_9819bdb68eccf5b8a).</description>
    <link>https://dev.to/whaaat_9819bdb68eccf5b8a</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2983096%2F60842898-0729-4f45-a3e5-d52b271d2afe.jpg</url>
      <title>DEV Community: Whaaat!</title>
      <link>https://dev.to/whaaat_9819bdb68eccf5b8a</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/whaaat_9819bdb68eccf5b8a"/>
    <language>en</language>
    <item>
      <title>Why Your Secret Sharing Tool Needs Post-Quantum Cryptography Today</title>
      <dc:creator>Whaaat!</dc:creator>
      <pubDate>Mon, 12 Jan 2026 21:24:02 +0000</pubDate>
      <link>https://dev.to/whaaat_9819bdb68eccf5b8a/why-your-secret-sharing-tool-needs-post-quantum-cryptography-today-20j3</link>
      <guid>https://dev.to/whaaat_9819bdb68eccf5b8a/why-your-secret-sharing-tool-needs-post-quantum-cryptography-today-20j3</guid>
      <description>&lt;h2&gt;
  
  
  The "Harvest Now, Decrypt Later" Threat
&lt;/h2&gt;

&lt;p&gt;Quantum computers capable of breaking RSA and ECC encryption don't exist yet. But here's the problem: adversaries are already collecting encrypted data today, planning to decrypt it once quantum computers arrive.&lt;/p&gt;

&lt;p&gt;For sensitive data that needs to remain confidential for years, this is a real threat.&lt;/p&gt;

&lt;h2&gt;
  
  
  What is Post-Quantum Cryptography?
&lt;/h2&gt;

&lt;p&gt;Post-quantum cryptography (PQC) uses mathematical problems that are hard for both classical AND quantum computers to solve. In August 2024, NIST standardized three PQC algorithms:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;ML-KEM (Kyber)&lt;/strong&gt; - Key encapsulation&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;ML-DSA (Dilithium)&lt;/strong&gt; - Digital signatures&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;SLH-DSA (SPHINCS+)&lt;/strong&gt; - Hash-based signatures&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Implementing PQC in a Web Application
&lt;/h2&gt;

&lt;p&gt;I recently added PQC support to &lt;a href="https://notrust.now" rel="noopener noreferrer"&gt;NoTrust.now&lt;/a&gt;, a zero-knowledge secret sharing tool. Here's how:&lt;/p&gt;

&lt;h3&gt;
  
  
  Key Exchange with ML-KEM-768
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight javascript"&gt;&lt;code&gt;&lt;span class="c1"&gt;// Using crystals-kyber-js library&lt;/span&gt;
&lt;span class="k"&gt;import&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt; &lt;span class="nx"&gt;MlKem768&lt;/span&gt; &lt;span class="p"&gt;}&lt;/span&gt; &lt;span class="k"&gt;from&lt;/span&gt; &lt;span class="dl"&gt;'&lt;/span&gt;&lt;span class="s1"&gt;crystals-kyber-js&lt;/span&gt;&lt;span class="dl"&gt;'&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;

&lt;span class="c1"&gt;// Receiver generates keypair&lt;/span&gt;
&lt;span class="kd"&gt;const&lt;/span&gt; &lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="nx"&gt;publicKey&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="nx"&gt;privateKey&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="k"&gt;await&lt;/span&gt; &lt;span class="nx"&gt;MlKem768&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;generateKeyPair&lt;/span&gt;&lt;span class="p"&gt;();&lt;/span&gt;

&lt;span class="c1"&gt;// Sender encapsulates a shared secret&lt;/span&gt;
&lt;span class="kd"&gt;const&lt;/span&gt; &lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="nx"&gt;ciphertext&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="nx"&gt;sharedSecret&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="k"&gt;await&lt;/span&gt; &lt;span class="nx"&gt;MlKem768&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;encapsulate&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nx"&gt;publicKey&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;

&lt;span class="c1"&gt;// Receiver decapsulates to get the same shared secret&lt;/span&gt;
&lt;span class="kd"&gt;const&lt;/span&gt; &lt;span class="nx"&gt;decryptedSecret&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="k"&gt;await&lt;/span&gt; &lt;span class="nx"&gt;MlKem768&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;decapsulate&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nx"&gt;ciphertext&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="nx"&gt;privateKey&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  Hybrid Approach
&lt;/h3&gt;

&lt;p&gt;For defense in depth, combine PQC with classical crypto:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Generate ephemeral X25519 keypair (classical)&lt;/li&gt;
&lt;li&gt;Generate ephemeral ML-KEM-768 keypair (post-quantum)&lt;/li&gt;
&lt;li&gt;Combine both shared secrets: &lt;code&gt;finalKey = HKDF(x25519Secret || kyberSecret)&lt;/code&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;This ensures security even if one algorithm is broken.&lt;/p&gt;

&lt;h2&gt;
  
  
  Try It Out
&lt;/h2&gt;

&lt;p&gt;You can test PQC secret sharing at &lt;a href="https://notrust.now/createpqc" rel="noopener noreferrer"&gt;NoTrust.now/createpqc&lt;/a&gt;. The encryption happens entirely in your browser - zero-knowledge architecture means the server never sees your plaintext.&lt;/p&gt;

&lt;h2&gt;
  
  
  Resources
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.nist.gov/pqcrypto" rel="noopener noreferrer"&gt;NIST PQC Standards&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/aspect-security/crystals-kyber-js" rel="noopener noreferrer"&gt;crystals-kyber-js&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://blog.cloudflare.com/post-quantum-cryptography-for-developers/" rel="noopener noreferrer"&gt;Post-Quantum Cryptography for Developers&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;What do you think about PQC adoption? Too early or just in time? Let me know in the comments.&lt;/p&gt;

</description>
      <category>security</category>
      <category>cryptography</category>
      <category>webdev</category>
      <category>privacy</category>
    </item>
  </channel>
</rss>
