A key-encapsulation mechanism (KEM) is a set of algorithms that, under certain conditions, can be used by two parties to establish a shared secret key over a public channel. A shared secret key that is securely established using a KEM can then be used with symmetric-key cryptographic algorithms to perform basic tasks in secure communications, such as encryption and authentication. This standard specifies a key-encapsulation mechanism called ML-KEM. The security of ML-KEM is related to the com...| csrc.nist.gov
US President Joe Biden looks at a quantum computer as he tours the IBM facility in Poughkeepsie, New York, on October 6, 2022. (Photo by MANDEL NGAN/AFP via Getty Images). | FedScoop
Britain’s Science, Innovation and Technology Secretary Michelle Donelan (R) greets U.S. Commerce Secretary Gina Raimondo during the U.K. Artificial Intelligence (AI) Safety Summit at Bletchley Park, in central England, on Nov. 1, 2023. (Photo by JUSTIN TALLIS/AFP via Getty Images) | FedScoop
Three long-awaited standards from NIST are aimed at ensuring encrypted information stays encrypted in a future quantum age.| FedScoop
(via Getty Images) | FedScoop
Short URL: https://www.nist.gov/pqcrypto For a plain-language introduction to post-quantum cryptography, go to: What Is Post-Quantum Cryptography? The initial public draft of NIST SP 800-227, Recommendations for Key-Encapsulation Mechanisms, is now...| csrc.nist.gov