
Sign up to save your podcasts
Or


The discussion in this podcast provides an extensive audit of the OpenSSL 3.x toolkit, focusing on its architecture, strategic agility, and quantum resilience. It highlights that the shift to the modular Provider concept in OpenSSL 3.x is a critical evolution enabling cryptographic agility, particularly for the transition to Post-Quantum Cryptography (PQC) using hybrid key exchange schemes in TLS 1.3. The analysis identifies that historical failures, such as Heartbleed, stem primarily from low-level C memory safety issues and flaws in protocol state machine handling. Finally, it contrasts OpenSSL’s commitment to API stability and feature richness against security-focused forks like LibreSSL and infrastructure-specific forks like BoringSSL.
 By HelloInfoSec
By HelloInfoSecThe discussion in this podcast provides an extensive audit of the OpenSSL 3.x toolkit, focusing on its architecture, strategic agility, and quantum resilience. It highlights that the shift to the modular Provider concept in OpenSSL 3.x is a critical evolution enabling cryptographic agility, particularly for the transition to Post-Quantum Cryptography (PQC) using hybrid key exchange schemes in TLS 1.3. The analysis identifies that historical failures, such as Heartbleed, stem primarily from low-level C memory safety issues and flaws in protocol state machine handling. Finally, it contrasts OpenSSL’s commitment to API stability and feature richness against security-focused forks like LibreSSL and infrastructure-specific forks like BoringSSL.