Significant attack on post-quantum KEM Kyber published before Nov 2026
Basic
3
Ṁ35
2026
53%
chance

Resolves Yes, if, before November 2026, an attack on quantum or conventional computer of the Key Encapsulation Mechanism Kyber (1) is published (preprint, journal article or conference proceeding), that leads to NIST dropping the algorithm from its post-quantum standard, or discouraging its use; or alternatively, if multiple recognized/leading cryptographers recommend against its use.

This algorithm is notably used in Signal (2), and downstream adopters of the Signal protocol (though it is coupled with elliptic curve key exchange such that attacks on both are necessary for key interception)

I reserve the right to discuss in the comments, temporarily halt trading, and possibly even resolve N/A on ambiguity. Suggestions and comments on resolution criteria are welcome if made well in advance of the resolving event

(1) https://en.m.wikipedia.org/wiki/Kyber

(2) https://signal.org/blog/pqxdh/

Get
Ṁ1,000
and
S3.00
Sort by:

Paper that claims to break Ring LWE on a quantum compute: https://eprint.iacr.org/2024/555.pdf

Relevant passage:

If an attack on the ML-KEM-512 parameter set is published (for example), leading to its retraction, but the other parameter sets remain secure/recommended, would that still be a No?

@Retr0id That would most definitely resolve Yes

if multiple recognized/leading cryptographers recommend against its use.

Can we discount DJB from this?

@Retr0id I'm not up to date on drama, regrettably. I specified "multiple" exactly because people might hold different opinions on who is a credible expert.

© Manifold Markets, Inc.Terms + Mana-only TermsPrivacyRules