OpenSSL Position and Plans on Private Key Formats for the ML-KEM and ML-DSA Post-quantum (PQ) Algorithms

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



The anticipated future arrival of cryptographically relevant quantum computers
(CRQCs), that could undermine the algorithms that underlie the currently most
widely used public key algorithms (ECDHE, ECDSA, DH and RSA), has led to the
development and recent standardisation of new "post-quantum" (PQ) algorithms,
that are believed to not be vulnerable to CRQC attack. Two of the first
algorithms standardized are ML-KEM (for key agreement) and ML-DSA (for digital
signatures). These algorithms are standardized by NIST in FIPS 203 and FIPS
204.



URL: https://openssl-library.org/post/2025-01-21-blog-positionandplans/

-- 
You received this message because you are subscribed to the Google Groups "openssl-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to openssl-users+unsubscribe@xxxxxxxxxxx.
To view this discussion visit https://groups.google.com/a/openssl.org/d/msgid/openssl-users/5883edfe-dd07-4a4f-aa8b-30239539cd2b%40localhost.



[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux