Post-Quantum Cryptography
Using Moore’s Law, a computer 20 years into the future is predicted to be around 10,000 times more capable than today’s computation capabilities. Geoff Huston explores some practical implications.
Using Moore’s Law, a computer 20 years into the future is predicted to be around 10,000 times more capable than today’s computation capabilities. Geoff Huston explores some practical implications.
Investigating the EDNS0 option for DNS, focusing on the specified maximum UDP packet size and its practical implications in the modern Internet.
What are the UDP buffer sizes used in recursive resolver queries to nameservers, and how effective is truncation in today’s DNS?
Measuring DNS resolver compliance with UDP response truncation standards.
How extensively is QUIC being used on today’s Internet?
Let’s talk about the ‘Unfortunate History of Transient Numeric Identifiers’.
Guest Post: There are several ways attackers can force TCP to fragment for inclusion in IP fragmentation attacks.
Guest Post: How much of a problem are large DNS responses over UDP, in the wild?
Encrypted transport headers, transport protocol meddling, and content vs carriage.
Guest Post: Leveraging different components of the end-to-end networking infrastructure to prevent disruptions from releases.