Post-Quantum Cryptography
Quantum-safe encryption
εΌηδΊΊι Β· Benefit All Humanity
π KEM
βοΈ Sign
π Hybrid
π‘οΈ Migrate
π Compare
π Key Encapsulation
ML-KEM (Kyber)
π
ML-KEM-512
NIST Level 1
β
Quantum Safe
π
ML-KEM-768
NIST Level 3 (Recommended)
β
Quantum Safe
π‘οΈ
ML-KEM-1024
NIST Level 5
β
Quantum Safe
Public Key
Click "Generate" to create a key pair...
Key Size: --
βοΈ Digital Signatures
ML-DSA (Dilithium)
βοΈ
ML-DSA-44
NIST Level 2
β
Quantum Safe
π
ML-DSA-65
NIST Level 3 (Recommended)
β
Quantum Safe
π²
SLH-DSA
SPHINCS+ (Stateless)
β
Quantum Safe
π¦
FN-DSA
FALCON (Compact)
β
Quantum Safe
π Message
π Hybrid Mode
Classical + PQ
π‘οΈ Defense in Depth
β
PQ weakness β Classical protects
β
Quantum arrives β PQ protects
π‘οΈ Migration
Migrate to PQC
1
Inventory
List all crypto uses
2
Prioritize
Long-lived secrets first
3
Test Hybrid
Deploy hybrid first
4
Full PQC
Pure PQC when ready
π Compare
Classical vs PQC
| Algorithm |
Type |
Key Size |
Quantum |
| RSA-2048 |
Key Exchange |
256 bytes |
β BROKEN |
| ECDH (X25519) |
Key Exchange |
32 bytes |
β BROKEN |
| ML-KEM-768 |
KEM |
2,400 bytes |
β
SAFE |
| ECDSA (P-256) |
Signature |
64 bytes |
β BROKEN |
| ML-DSA-65 |
Signature |
4,032 bytes |
β
SAFE |
| AES-256 |
Symmetric |
32 bytes |
β
SAFE |