https://github.com/open-quantum-safe/liboqs-go
https://github.com/open-quantum-safe/liboqs-python
https://github.com/open-quantum-safe/liboqs-cpp
https://github.com/open-quantum-safe/liboqs-rust
Library backend code still remains in C, but the projects listed above allow you to call the functions from different languages.
Sure.
Maybe and same can be said about hardened-sign
automatically adding signature algorithms, hardened-sum
could have additional output such as:
7/10 checksums verified successfuly
1 CHECKSUM FAILED THIS IS BAD OBVIOUS COMPROMISE (can’t think of anything better on the fly)
1 unknown hashing algorithm - imaginary-algorithm512
1 algorithm not present in digests file - madeup-algorithm512
Similar output could exist for hardened-sign
. There are still other issues (mainly key files for signing) with this idea and possibly error prone, so for the sake of stability there could be static list of algorithms that are today considered safe and just use those, hardened-sum
could retain --dynamic
argument for standalone digests - not intended for signing.
Post-quantum algorithms seem to be chosen already and I don’t know the last time new hashing algorithm was added to openssl
so maybe dynamic idea may be obsolete.
Overall currently needs more thinking.