ML-KEM
5 mentions across all digests
NIST-standardized post-quantum key encapsulation mechanism (FIPS-203) implemented by Amazon in a formally verified open-source library to resist future quantum attacks.
A Cryptography Engineer’s Perspective on Quantum Computing Timelines
Google and Oratomic's research drastically accelerates the quantum cryptography threat timeline, pushing the post-quantum migration deadline to 2029 instead of decades away—forcing immediate infrastructure overhaul despite implementation complexity.
Let’s All Agree to Use Seeds as ML-KEM Keys
NIST's ML-KEM post-quantum standard allows storing private keys as 64-byte seeds instead of 3.2 KB expanded format, eliminating validation bugs and ecosystem fragmentation.
Quantum Computers Are Not a Threat to 128-Bit Symmetric Keys
Symmetric cryptography like AES remains quantum-safe due to parallelization constraints limiting Grover's algorithm; only asymmetric crypto (RSA, ECDH) requires post-quantum migration.
Hybrid Constructions: The Post-Quantum Safety Blanket
Google and Cloudflare announce 2029 post-quantum migration targets while cryptographer Soatok argues hybrid key encapsulation mechanisms offer practical protection during the transition, but warns against hybrid signature schemes.
Verifying and optimizing post-quantum cryptography at Amazon
Amazon open-sources formally verified ML-KEM, making post-quantum cryptography production-ready to protect today's encrypted data from retroactive quantum decryption attacks.