More and more companies are starting to incorporate post-quantum cryptography (PQC) in their products and infrastructure. These algorithms provide much needed security against future attacks by a cryptographically relevant quantum computer (CRQC). However, new implementers often have questions about the differences in key sizes, as well as use of the new KEM algorithm type.
While classical algorithms have security strengths that correspond to specific bit lengths, PQC algorithms have security strengths corresponding to NIST security categories. These security categories are intended to compare the difficulty of breaking an algorithm with a given parameter set to the difficulty of breaking a comparable classical algorithm. See additional details here.
NIST security categories can be summarized as follows:
With the publication of the NIST standard for ML-KEM, NIST introduced the concept of Key Encapsulation Mechanisms (KEMs) for key establishment. KEMs differ from Key Agreement Schemes (KASs), as briefly outlined below.
In general, PQC algorithms for digital signatures have much larger parameters than corresponding classical algorithms, as detailed below:
As with digital signatures, PQC algorithms for key establishment (KEMs) have much larger parameters than classical algorithms (KASs), as detailed below:
Although PQC algorithms have larger parameters and introduce a new key establishment methodology, using them is well worth the effort. Classical asymmetric algorithms will not be able to provide security against the growing threat of quantum computers. And while large parameter sizes may require implementation adjustments, PQC algorithms can often be as fast or faster than classical algorithms.
To get started today with SafeLogic’s PQC products, reach out to our sales team here. Or learn more from our recent blog post here.