Call for Submissions (submission deadline January 28, 2025)
The initial public draft of NIST Special Publication (SP) 800-227, Recommendations for Key-Encapsulation Mechanisms, is now available for public comment.
NIST recently published FIPS 203, Module-Lattice-Based Key-Encapsulation Mechanism Standard, to update its cryptographic standards with an algorithm designed to provide protection from quantum attacks. In addition, NIST will select one or two additional quantum-resistant key-encapsulation mechanisms (KEMs) for standardization. To provide guidance on using KEMs, NIST is introducing SP 800-227, Recommendations for Key Encapsulation Mechanisms. This draft document describes the basic definitions, properties, and applications of KEMs. It also provides recommendations for implementing and using KEMs in a secure manner.
The public comment period is open through March 7, 2025. See the publication details for a copy of the draft and instructions for submitting comments.
IETF Perspective on SP 800-227
Mike Ounsworth (Entrust), Deirdre Connolly (SandboxAQ)
ML-KEM is Great! What’s Missing?
John Preuß Mattsson, Erik Thormarker, Göran Selander, Santeri Paavolainen, Sini Ruohomaa, Juha Sääskilahti, Taylor Hartley, Helena Vahidi Mazinani, Mohsin Kahn (Ericsson)
Building Post-Quantum Cloud Services: Deploying FIPS 203:ML-KEM at AWS
Dr. Jake Massimo, Dr. Matthew Campagna, Panos Kampanakis, Dr. Dusan Kostic, Dr. Mila Anastasova (Amazon Web Services)
Updates to ETSI's Quantum-Safe Hybrid Key Establishment Standards and New European Standardization Initiative
Matthew Campagna (Amazon Web Services)
Misbinding KEMs
Sophie Schmieg (Google), Deidre Connolly (SandboxAQ)
Advanced FO Concepts: Verifiable Decapsulation, Multi-user Security, and Rejection Modes
Lewis Glabush (EPFL), Felix Günther (IBM Research Europe – Zurich), Kathrin Hövelmanns (Eindhoven University of Technology), Mikhail Kudinov (Eindhoven University of Technology), and Douglas Stebila (University of Waterloo)
Split-key PRFs and a new notion for hybrid KEM security
Lise Millerjord (NTNU), Douglas Stebila (University of Waterloo), and Camryn Steckel (University of Waterloo)
Kemeleon: Elligator-like Obfuscation for ML-KEM
Felix Günther (IBM Research Europe – Zurich), Michael Rosenberg (Cloudflare), Douglas Stebila (University of Waterloo), Shannon Veitch (ETH Zurich)
These two papers were merged into one presentation: KEM-based Certificate Signing Request Protocol and Key Exchange Protocol
A Dual-usage Certificate Signing Request Protocol for Digital Signature Algorithm and Key Encapsulation Mechanism
Abel C. H. Chen (Chunghwa Telecom Laboratories), Mike Ounsworth (Entrust), James W. H. Tung (Chunghwa Telecom Laboratories), John Gray (Entrust), and Austin B. Y. Lin (Chunghwa Telecom Laboratories)
Post-Quantum Cryptography-Based Bidirectional Authentication Key Exchange Protocol and Industry Applications: A Case Study of Instant Messaging
Abel C. H. Chen (Chunghwa Telecom Laboratories), James W. H. Tung (Chunghwa Telecom Laboratories), Austin B. Y. Lin (Chunghwa Telecom Laboratories), Chin-Ling Chen (Chaoyang University of Technology), Ching-Chun Chang (National Institute of Informatics), Chin-Chen Chang (Feng Chia University)
Selected Presentations | |
---|---|
February 25, 2025 | Type |
10:05 AM
Draft SP 800-227, Recommendations for KEMs Gorjan Alagic - NIST / UMD |
Presentation |
10:40 AM
IETF Perspective on SP 800-227 Mike Ounsworth - Entrust Deirdre Connolly - SandboxAQ |
Presentation |
11:05 AM
ML-KEM is Great! What’s Missing? John Preuß Mattsson - Ericsson |
Presentation |
11:30 AM
Building Post-Quantum Cloud Services: Deploying FIPS 203:ML-KEM at AWS Jake Massimo - Amazon Web Services |
Presentation |
11:55 AM
Updates to ETSI's Quantum-Safe Hybrid Key Establishment Standards and New European Standardization Initiative Matt Campagna - Amazon Web Services |
Presentation |
1:20 PM
CAVP / CMVP Perspective on KEMs Chris Celi - NIST |
Presentation |
February 26, 2025 | Type |
10:00 AM
KEM-based Certificate Signing Request Protocol and Key Exchange Protocol John Gray - Entrust Austin B. Y. Lin - Chunghwa Telecom Laboratories Abel C. H. Chen - Chunghwa Telecom Laboratories |
Presentation |
10:35 AM
Misbinding KEMs Deirdre Connolly - SandboxAQ Sophie Schmieg - Google |
Presentation |
11:00 AM
Advanced FO Concepts: Verifiable Decapsulation, Multi-user Security, and Rejection Modes Lewis Glabush - EPFL |
Presentation |
11:25 AM
Split-key PRFs and a new notion for hybrid KEM security Lise Millerjord - NTNU Camryn Steckel - University of Waterloo |
Presentation |
11:50 AM
Kemeleon: Elligator-like Obfuscation for ML-KEM Shannon Veitch - ETH Zurich Michael Rosenburg - Cloudflare |
Presentation |
Starts: February 25, 2025 - 10:00 AM EST
Ends: February 26, 2025 - 03:00 PM EST
Format: Virtual Type: Workshop
Attendance Type: Open to public
Audience Type: Industry,Government,Academia,Other
Virtual
Security and Privacy: post-quantum cryptography