NIST Workshop on Guidance for KEMs

Call for Submissions (submission deadline January 28, 2025)

The initial public draft of NIST Special Publication (SP) 800-227, Recommendations for Key-Encapsulation Mechanisms, is now available for public comment. 

NIST recently published FIPS 203, Module-Lattice-Based Key-Encapsulation Mechanism Standard, to update its cryptographic standards with an algorithm designed to provide protection from quantum attacks.  In addition, NIST will select one or two additional quantum-resistant key-encapsulation mechanisms (KEMs) for standardization. To provide guidance on using KEMs, NIST is introducing SP 800-227, Recommendations for Key Encapsulation Mechanisms.  This draft document describes the basic definitions, properties, and applications of KEMs. It also provides recommendations for implementing and using KEMs in a secure manner. 

The public comment period is open through March 7, 2025. See the publication details for a copy of the draft and instructions for submitting comments. 

IETF Perspective on SP 800-227
Mike Ounsworth (Entrust), Deirdre Connolly (SandboxAQ)

ML-KEM is Great! What’s Missing?
John Preuß Mattsson, Erik Thormarker, Göran Selander, Santeri Paavolainen, Sini Ruohomaa, Juha Sääskilahti, Taylor Hartley, Helena Vahidi Mazinani, Mohsin Kahn (Ericsson)

Building Post-Quantum Cloud Services: Deploying FIPS 203:ML-KEM at AWS
Dr. Jake Massimo, Dr. Matthew Campagna, Panos Kampanakis, Dr. Dusan Kostic, Dr. Mila Anastasova (Amazon Web Services)

Updates to ETSI's Quantum-Safe Hybrid Key Establishment Standards and New European Standardization Initiative
Matthew Campagna (Amazon Web Services)

Misbinding KEMs
Sophie Schmieg (Google), Deidre Connolly (SandboxAQ)

Advanced FO Concepts: Verifiable Decapsulation, Multi-user Security, and Rejection Modes
Lewis Glabush (EPFL), Felix Günther (IBM Research Europe – Zurich), Kathrin Hövelmanns (Eindhoven University of Technology), Mikhail Kudinov (Eindhoven University of Technology), and Douglas Stebila (University of Waterloo)

Split-key PRFs and a new notion for hybrid KEM security
Lise Millerjord (NTNU), Douglas Stebila (University of Waterloo), and Camryn Steckel (University of Waterloo)

Kemeleon: Elligator-like Obfuscation for ML-KEM
Felix Günther (IBM Research Europe – Zurich), Michael Rosenberg (Cloudflare), Douglas Stebila (University of Waterloo), Shannon Veitch (ETH Zurich)

These two papers were merged into one presentation: KEM-based Certificate Signing Request Protocol and Key Exchange Protocol
A Dual-usage Certificate Signing Request Protocol for Digital Signature Algorithm and Key Encapsulation Mechanism
Abel C. H. Chen (Chunghwa Telecom Laboratories), Mike Ounsworth (Entrust),  James W. H. Tung (Chunghwa Telecom Laboratories), John Gray (Entrust), and Austin B. Y. Lin (Chunghwa Telecom Laboratories)

Post-Quantum Cryptography-Based Bidirectional Authentication Key Exchange Protocol and Industry Applications: A Case Study of Instant Messaging
Abel C. H. Chen (Chunghwa Telecom Laboratories), James W. H. Tung (Chunghwa Telecom Laboratories), Austin B. Y. Lin (Chunghwa Telecom Laboratories), Chin-Ling Chen (Chaoyang University of Technology), Ching-Chun Chang (National Institute of Informatics), Chin-Chen Chang (Feng Chia University)

 

Selected Presentations
February 25, 2025 Type
10:05 AM Draft SP 800-227, Recommendations for KEMs
Gorjan Alagic - NIST / UMD
Presentation
10:40 AM IETF Perspective on SP 800-227
Mike Ounsworth - Entrust
Deirdre Connolly - SandboxAQ
Presentation
11:05 AM ML-KEM is Great! What’s Missing?
John Preuß Mattsson - Ericsson
Presentation
11:30 AM Building Post-Quantum Cloud Services: Deploying FIPS 203:ML-KEM at AWS
Jake Massimo - Amazon Web Services
Presentation
11:55 AM Updates to ETSI's Quantum-Safe Hybrid Key Establishment Standards and New European Standardization Initiative
Matt Campagna - Amazon Web Services
Presentation
1:20 PM CAVP / CMVP Perspective on KEMs
Chris Celi - NIST
Presentation
February 26, 2025 Type
10:00 AM KEM-based Certificate Signing Request Protocol and Key Exchange Protocol
John Gray - Entrust
Austin B. Y. Lin - Chunghwa Telecom Laboratories
Abel C. H. Chen - Chunghwa Telecom Laboratories
Presentation
10:35 AM Misbinding KEMs
Deirdre Connolly - SandboxAQ
Sophie Schmieg - Google
Presentation
11:00 AM Advanced FO Concepts: Verifiable Decapsulation, Multi-user Security, and Rejection Modes
Lewis Glabush - EPFL
Presentation
11:25 AM Split-key PRFs and a new notion for hybrid KEM security
Lise Millerjord - NTNU
Camryn Steckel - University of Waterloo
Presentation
11:50 AM Kemeleon: Elligator-like Obfuscation for ML-KEM
Shannon Veitch - ETH Zurich
Michael Rosenburg - Cloudflare
Presentation

Event Details

Starts: February 25, 2025 - 10:00 AM EST
Ends: February 26, 2025 - 03:00 PM EST

Format: Virtual Type: Workshop

Agenda

Attendance Type: Open to public
Audience Type: Industry,Government,Academia,Other


Location

Virtual

Parent Project

See: Post-Quantum Cryptography

Related Topics

Security and Privacy: post-quantum cryptography

Created October 29, 2024, Updated February 28, 2025