Skip to content

liboqs version 0.8.0

Compare
Choose a tag to compare
@dstebila dstebila released this 08 Jun 00:51
· 131 commits to main since this release

liboqs version 0.8.0

About

The Open Quantum Safe (OQS) project has the goal of developing and prototyping quantum-resistant cryptography. More information on OQS can be found on our website: https://openquantumsafe.org/ and on Github at https://github.com/open-quantum-safe/.

liboqs is an open source C library for quantum-resistant cryptographic algorithms. Details about liboqs can be found in README.md. See in particular limitations on intended use.

liboqs can be used with the following Open Quantum Safe application integrations:

  • OQS-OpenSSL 1.1.1: A prototype integration of liboqs-based authentication and key exchange into TLS 1.3 in our fork of OpenSSL 1.1.1; see the OQS-OpenSSL-1_1_1-stable branch of our OpenSSL fork's repository.
  • oqs-provider: A standalone prototype OpenSSL 3 provider enabling liboqs-based quantum-safe and hybrid key authentication and exchange for TLS 1.3, X.509 certificate generation and CMS operations.
  • OQS-BoringSSL: A prototype integration of liboqs-based authentication and key exchange into TLS 1.3 in our fork of BoringSSL; see https://github.com/open-quantum-safe/boringssl.
  • OQS-OpenSSH: A prototype integration of liboqs-based authentication and key exchange into Secure Shell (SSH) version 2 in our fork of OpenSSH; see https://github.com/open-quantum-safe/openssh.

Several demos are available for using the above libraries in applications, including Apache, Chromium, curl, haproxy, nginx, and Wireshark. Performance of liboqs in several settings is measured at https://openquantumsafe.org/benchmarking/.

liboqs can also be used in the following programming languages via language-specific wrappers:

Release notes

This is version 0.8.0 of liboqs. It was released on June 7, 2023.

What's New

This release continues from the 0.7.2 release of liboqs.

This release features many algorithm updates, including removal of algorithms and variants no longer proceeding through NIST standardization and updates to newer versions. See the detailed list of algorithm updates below.

Key encapsulation mechanisms

  • BIKE: updated to Round 4 version.
  • Kyber: 90s variants were removed.
  • NTRU Prime: All variants were removed, except for sntrup761.
  • Saber: removed.

Digital signature schemes

  • Dilithium; AES variants were removed.
  • Falcon: updated to the 2023-02-07 version.
  • Picnic: removed.
  • Rainbow: removed.
  • SPHINCS+: updated to version 3.1; SPHINCS+-Haraka variants were removed; SPHINCS+-SHA256 and SPHINCS+-SHAKE variants were renamed

Other changes

  • Add Cryptographic Bill of Materials (CBOM)
  • Improve building on ARM platforms
  • Improve performance when using OpenSSL 3 for symmetric cryptography
  • Increment shared object library version
  • New configure-time options for algorithm selections
  • pkgconfig file now available

Known issues

  • Issue #1488: 32-bit builds fail in Microsoft Visual C for Falcon AVX code

Detailed changelog

New Contributors

Full Changelog: 0.7.2...0.8.0