<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:admin="http://webns.net/mvcb/"
	xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
	xmlns:content="http://purl.org/rss/1.0/modules/content/">

	<channel>

	<title>&#45; CircleID</title>
	<link>https://www.circleid.com/blogs/</link>
	<description>Postings from  on CircleID</description>
	<dc:language>en</dc:language>
	<dc:rights>Copyright 2026, unless where otherwise noted.</dc:rights>
	<dc:date>2026-03-31T21:29:00+00:00</dc:date>

	
	<item>
		<title> Verisign Provides Open Source Implementation of Merkle Tree Ladder Mode (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20240104-verisign-provides-open-source-implementation-of-merkle-tree-ladder-mode</guid>
		<link>https://circleid.com/posts20240104-verisign-provides-open-source-implementation-of-merkle-tree-ladder-mode</link>
		<description><![CDATA[The quantum computing era is coming, and it will change everything about how the world connects online. While quantum computing will yield tremendous benefits, it will also create new risks, so it's essential that we prepare our critical internet infrastructure for what's to come. That's why we're so pleased to share our latest efforts in this area, including technology that we're making available as an open source implementation to help internet operators worldwide prepare. <a href="https://circleid.com/posts20240104-verisign-provides-open-source-implementation-of-merkle-tree-ladder-mode">More...</a>]]></description>
		<dc:date>2026-03-31T14:29:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Next Steps in Preparing for Post-Quantum DNSSEC (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20230720-next-steps-in-preparing-for-post-quantum-dnssec</guid>
		<link>https://circleid.com/posts20230720-next-steps-in-preparing-for-post-quantum-dnssec</link>
		<description><![CDATA[In 2021, we discussed a potential future shift from established public-key algorithms to so-called "post-quantum" algorithms, which may help protect sensitive information after the advent of quantum computers. We also shared some of our initial research on how to apply these algorithms to the Domain Name System Security Extensions, or DNSSEC. In the time since that blog post, we've continued to explore ways to address the potential operational impact of post-quantum algorithms on DNSSEC, while also closely tracking industry research and advances in this area. <a href="https://circleid.com/posts20230720-next-steps-in-preparing-for-post-quantum-dnssec">More...</a>]]></description>
		<dc:date>2026-03-31T14:29:00-07:00</dc:date>
	</item>
	
	<item>
		<title> The Test of Time at Internet Scale: Verisign's Danny McPherson Recognized with ACM SIGCOMM Award (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20210827-test-of-time-at-internet-scale-verisigns-danny-mcpherson-recognized-with-acm-sigcomm-award</guid>
		<link>https://circleid.com/posts20210827-test-of-time-at-internet-scale-verisigns-danny-mcpherson-recognized-with-acm-sigcomm-award</link>
		<description><![CDATA[The global internet, from the perspective of its billions of users, has often been envisioned as a cloud -- a shapeless structure that connects users to applications and to one another, with the internal details left up to the infrastructure operators inside. From the perspective of the infrastructure operators, however, the global internet is a network of networks. It's a complex set of connections among network operators, application platforms, content providers and other parties. <a href="https://circleid.com/posts20210827-test-of-time-at-internet-scale-verisigns-danny-mcpherson-recognized-with-acm-sigcomm-award">More...</a>]]></description>
		<dc:date>2026-03-31T14:29:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Information Protection for the Domain Name System: Encryption and Minimization (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20210127-information-protection-for-the-dns-encryption-and-minimization</guid>
		<link>https://circleid.com/posts20210127-information-protection-for-the-dns-encryption-and-minimization</link>
		<description><![CDATA[In previous posts in this series, I've discussed a number of applications of cryptography to the DNS, many of them related to the Domain Name System Security Extensions (DNSSEC). In this final blog post, I'll turn attention to another application that may appear at first to be the most natural, though as it turns out, may not always be the most necessary: DNS encryption. (I've also written about DNS encryption as well as minimization in a separate post on DNS information protection.) <a href="https://circleid.com/posts20210127-information-protection-for-the-dns-encryption-and-minimization">More...</a>]]></description>
		<dc:date>2026-03-31T14:29:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Securing the DNS in a Post-Quantum World: Hash-Based Signatures and Synthesized Zone Signing Keys (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20210122-securing-the-dns-in-a-post-quantum-world-hash-based-signatures</guid>
		<link>https://circleid.com/posts20210122-securing-the-dns-in-a-post-quantum-world-hash-based-signatures</link>
		<description><![CDATA[In my last article, I described efforts underway to standardize new cryptographic algorithms that are designed to be less vulnerable to potential future advances in quantum computing. I also reviewed operational challenges to be considered when adding new algorithms to the DNS Security Extensions (DNSSEC). In this post, I'll look at hash-based signatures, a family of post-quantum algorithms that could be a good match for DNSSEC from the perspective of infrastructure stability. <a href="https://circleid.com/posts20210122-securing-the-dns-in-a-post-quantum-world-hash-based-signatures">More...</a>]]></description>
		<dc:date>2026-03-31T14:29:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Securing the DNS in a Post-Quantum World: New DNSSEC Algorithms on the Horizon (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20210119-securing-dns-in-a-post-quantum-world-new-dnssec-algorithms</guid>
		<link>https://circleid.com/posts20210119-securing-dns-in-a-post-quantum-world-new-dnssec-algorithms</link>
		<description><![CDATA[One of the "key" questions cryptographers have been asking for the past decade or more is what to do about the potential future development of a large-scale quantum computer. If theory holds, a quantum computer could break established public-key algorithms including RSA and elliptic curve cryptography (ECC), building on Peter Shor's groundbreaking result from 1994. <a href="https://circleid.com/posts20210119-securing-dns-in-a-post-quantum-world-new-dnssec-algorithms">More...</a>]]></description>
		<dc:date>2026-03-31T14:29:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Newer Cryptographic Advances for the Domain Name System: NSEC5 and Tokenized Queries (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20210114-newer-cryptographic-advances-for-domain-name-system-nsec5</guid>
		<link>https://circleid.com/posts20210114-newer-cryptographic-advances-for-domain-name-system-nsec5</link>
		<description><![CDATA[In my last post, I looked at what happens when a DNS query renders a "negative" response -- i.e., when a domain name doesn't exist. I then examined two cryptographic approaches to handling negative responses: NSEC and NSEC3. In this post, I will examine a third approach, NSEC5, and a related concept that protects client information, tokenized queries. The concepts I discuss below are topics we've studied in our long-term research program as we evaluate new technologies. <a href="https://circleid.com/posts20210114-newer-cryptographic-advances-for-domain-name-system-nsec5">More...</a>]]></description>
		<dc:date>2026-03-31T14:29:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Cryptographic Tools for Non-Existence in the Domain Name System: NSEC and NSEC3 (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20210113-cryptographic-tools-for-non-existence-in-dns-nsec-and-nsec3</guid>
		<link>https://circleid.com/posts20210113-cryptographic-tools-for-non-existence-in-dns-nsec-and-nsec3</link>
		<description><![CDATA[In my previous post, I described the first broad scale deployment of cryptography in the DNS, known as the Domain Name System Security Extensions (DNSSEC). I described how a name server can enable a requester to validate the correctness of a "positive" response to a query -- when a queried domain name exists -- by adding a digital signature to the DNS response returned. <a href="https://circleid.com/posts20210113-cryptographic-tools-for-non-existence-in-dns-nsec-and-nsec3">More...</a>]]></description>
		<dc:date>2026-03-31T14:29:00-07:00</dc:date>
	</item>
	
	<item>
		<title> The Domain Name System: A Cryptographer's Perspective (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20210111-the-domain-name-system-a-cryptographers-perspective</guid>
		<link>https://circleid.com/posts20210111-the-domain-name-system-a-cryptographers-perspective</link>
		<description><![CDATA[As one of the earliest protocols in the internet, the DNS emerged in an era in which today's global network was still an experiment. Security was not a primary consideration then, and the design of the DNS, like other parts of the internet of the day, did not have cryptography built in. Today, cryptography is part of almost every protocol, including the DNS. And from a cryptographer's perspective, as I described in my talk at last year's International Cryptographic Module Conference (ICMC20), there's so much more to the story than just encryption. <a href="https://circleid.com/posts20210111-the-domain-name-system-a-cryptographers-perspective">More...</a>]]></description>
		<dc:date>2026-03-31T14:29:00-07:00</dc:date>
	</item>
	
	<item>
		<title> A Balanced DNS Information Protection Strategy: Minimize at Root, TLD; Encrypt When Needed Elsewhere (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20201208-balanced-dns-information-protection-strategy-minimize-at-root-tld</guid>
		<link>https://circleid.com/posts20201208-balanced-dns-information-protection-strategy-minimize-at-root-tld</link>
		<description><![CDATA[Over the past several years, questions about how to protect information exchanged in the DNS have come to the forefront. One of these questions was posed first to DNS resolver operators in the middle of the last decade, and is now being brought to authoritative name server operators: "to encrypt or not to encrypt?" It's a question that Verisign has been considering for some time as part of our commitment to security, stability and resiliency of our DNS operations and the surrounding DNS ecosystem. <a href="https://circleid.com/posts20201208-balanced-dns-information-protection-strategy-minimize-at-root-tld">More...</a>]]></description>
		<dc:date>2026-03-31T14:29:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Authenticated Resolution and Adaptive Resolution: Security and Navigational Enhancements to the DNS (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20201119-authenticated-resolution-and-adaptive-resolution-security-dns</guid>
		<link>https://circleid.com/posts20201119-authenticated-resolution-and-adaptive-resolution-security-dns</link>
		<description><![CDATA[The Domain Name System (DNS) has become the fundamental building block for navigating from names to resources on the internet. DNS has been employed continuously ever since its introduction in 1983, by essentially every internet-connected application and device that wants to interact online. Emerging from an era where interconnection rather than information security was the primary motivation, DNS has gradually improved its security features. <a href="https://circleid.com/posts20201119-authenticated-resolution-and-adaptive-resolution-security-dns">More...</a>]]></description>
		<dc:date>2026-03-31T14:29:00-07:00</dc:date>
	</item>
	
	<item>
		<title> DNS: An Essential Component of Cloud Computing (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20200714-dns-an-essential-component-of-cloud-computing</guid>
		<link>https://circleid.com/posts20200714-dns-an-essential-component-of-cloud-computing</link>
		<description><![CDATA[The evolution of the internet is anchored in the phenomenon of new technologies replacing their older counterparts. But technology evolution can be just as much about building upon what is already in place, as it is about tearing down past innovations. Indeed, the emergence of cloud computing has been powered by extending an unlikely underlying component: the more than 30-year-old global Domain Name System (DNS). <a href="https://circleid.com/posts20200714-dns-an-essential-component-of-cloud-computing">More...</a>]]></description>
		<dc:date>2026-03-31T14:29:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Recognizing Lessons Learned From the First DNSSEC Key Rollover, a Year Later (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20191126_recognizing_lessons_learned_from_the_first_dnssec_key_rollover</guid>
		<link>https://circleid.com/posts20191126_recognizing_lessons_learned_from_the_first_dnssec_key_rollover</link>
		<description><![CDATA[A year ago, under the leadership of the Internet Corporation for Assigned Names and Numbers (ICANN), the internet naming community completed the first-ever rollover of the cryptographic key that plays a critical role in securing internet traffic worldwide. The ultimate success of that endeavor was due in large part to outreach efforts by ICANN and Verisign which, when coupled with the tireless efforts of the global internet measurement community, ensured that this significant event did not disrupt internet name resolution functions for billions of end users. <a href="https://circleid.com/posts20191126_recognizing_lessons_learned_from_the_first_dnssec_key_rollover">More...</a>]]></description>
		<dc:date>2026-03-31T14:29:00-07:00</dc:date>
	</item>
	
	<item>
		<title> In Network Security Design, It's About the Users (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20151124_in_network_security_design_its_about_the_users</guid>
		<link>https://circleid.com/posts20151124_in_network_security_design_its_about_the_users</link>
		<description><![CDATA[One of the longstanding goals of network security design is to be able to prove that a system -- any system -- is secure. Designers would like to be able to show that a system, properly implemented and operated, meets its objectives for confidentiality, integrity, availability and other attributes against the variety of threats the system may encounter. A half century into the computing revolution, this goal remains elusive. <a href="https://circleid.com/posts20151124_in_network_security_design_its_about_the_users">More...</a>]]></description>
		<dc:date>2026-03-31T14:29:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Thinking Ahead on Privacy in the Domain Name System (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20150930_thinking_ahead_on_privacy_in_the_domain_name_system</guid>
		<link>https://circleid.com/posts20150930_thinking_ahead_on_privacy_in_the_domain_name_system</link>
		<description><![CDATA[Earlier this year, I wrote about a recent enhancement to privacy in the Domain Name System (DNS) called qname-minimization. Following the principle of minimum disclosure, this enhancement reduces the information content of a DNS query to the minimum necessary to get either an authoritative response from a name server, or a referral to another name server. <a href="https://circleid.com/posts20150930_thinking_ahead_on_privacy_in_the_domain_name_system">More...</a>]]></description>
		<dc:date>2026-03-31T14:29:00-07:00</dc:date>
	</item>
	

	</channel>
</rss>