Quantum - Resistant Cryptography

Search documents
SEALSQ Announces QVault TPM Compliance with Highest-Security Key Lengths for Post-Quantum Protection in Defense, IoT, and Automotive
Globenewswireยท 2025-05-07 13:20
Core Viewpoint - SEALSQ Corp's QVault Trusted Platform Module (TPM) achieves compliance with the highest-security parameter sets of NIST-standardized CRYSTALS-Dilithium and CRYSTALS-Kyber algorithms, reinforcing its position in quantum-resistant security solutions for various markets [1][2][8] Group 1: Technology and Compliance - QVault TPM is compliant with ML-DSA-87 and ML-KEM-1024, which are the most robust variants of post-quantum cryptography algorithms standardized by NIST [2][3] - ML-DSA-87 features a public key size of 1,952 bytes and a signature size of 4,595 bytes, targeting security equivalent to AES-256, making it suitable for applications requiring long-term data integrity [7] - ML-KEM-1024 has a public key size of 1,568 bytes and a ciphertext size of 1,568 bytes, also achieving AES-256-equivalent security for robust key exchange [7] Group 2: Market Demand and Industry Trends - The demand for quantum-resistant cryptography is increasing due to advancements in quantum computing, with predictions of relevant quantum computers emerging within a decade [4] - Industry leaders like IBM emphasize the importance of these standards for protecting encrypted data, with expectations of significant adoption in products for government and financial services [5] - Cloudflare reported that nearly 2% of TLS 1.3 connections were PQC-secured by early 2024, with expectations of double-digit adoption by year-end [5] Group 3: Applications and Use Cases - QVault TPM supports a range of applications, including secure firmware signing, quantum-safe authentication for IoT devices, and secure vehicle-to-everything communications [8][13] - The integration of ML-DSA-87 and ML-KEM-1024 into QVault TPM provides a tamper-resistant environment for cryptographic operations and key storage [8] - SEALSQ's technology is designed to address urgent security challenges posed by quantum computing across various sectors, including defense, IoT, and automotive [10]