The algorithms behind PQCaaS
The algorithms that power ExeQuantum's API
Introduction
ExeQuantum leverages cutting-edge post-quantum cryptographic (PQC) algorithms to provide robust security solutions in an API format. Two key algorithms that form the backbone of ExeQuantum's cryptographic offerings are ML-KEM (Module Lattice Key Encapsulation Mechanism) and ML-DSA (Module Lattice Digital Signature Algorithm). These algorithms are designed to withstand quantum attacks and ensure long-term data security.
ML-KEM: Post-Quantum Key Encapsulation
Overview
ML-KEM is a lattice-based key encapsulation mechanism (KEM) that enables secure key exchange between parties without vulnerability to quantum computers. It is a finalist in the NIST Post-Quantum Cryptography Standardisation Process, making it a strong candidate for widespread adoption in post-quantum security applications.
Features
Quantum-Resistant Security: Based on structured lattice problems that are infeasible for both classical and quantum computers to solve.
Efficient Key Exchange: Provides strong security while maintaining practical performance suitable for high-speed applications.
Scalability: Supports integration into various encryption protocols without significant computational overhead.
Use Cases
Secure communication channels
Quantum-safe TLS handshake mechanisms
Encrypted cloud storage
ML-KEM in ExeQuantum's API
ExeQuantum provides ML-KEM as an API endpoint, allowing developers to integrate post-quantum secure key exchange into their applications. The API functions include:
Key Generation: Generates public-private key pairs.
Encapsulation: Produces a shared secret and encapsulated key.
Decapsulation: Recovers the shared secret from the encapsulated key.
ML-DSA: Post-Quantum Digital Signatures
Overview
ML-DSA is a post-quantum digital signature algorithm based on module lattices. It provides quantum-resistant authentication mechanisms, ensuring data integrity and non-repudiation in digital transactions.
Features
Strong Security: Resistant to quantum attacks, ensuring long-term validity of signed documents.
Low Computational Overhead: Optimised for efficiency, making it suitable for real-world deployments.
Versatility: Can be used in various digital authentication systems.
Use Cases
Secure firmware updates
Blockchain and cryptocurrency transactions
Digital identity verification
ML-DSA in ExeQuantum's API
ExeQuantum offers ML-DSA as an API service, making it easy to integrate quantum-secure digital signatures into existing systems. The API functionalities include:
Key Generation: Creates public-private key pairs for signing and verification.
Signing: Generates secure digital signatures for messages.
Verification: Validates signatures against public keys to ensure authenticity.
Why ExeQuantum?
ExeQuantum's API-based approach allows businesses to integrate ML-KEM and ML-DSA seamlessly without needing in-depth cryptographic expertise. Our platform provides:
Scalability: Ready-to-use APIs with minimal integration effort.
Compliance: Alignment with emerging post-quantum security standards.
Performance Optimisation: Efficient implementations designed for real-world applications.
With quantum computing on the rise, transitioning to post-quantum cryptographic solutions is essential. ExeQuantum simplifies this process by offering ML-KEM and ML-DSA as API services, ensuring businesses stay ahead of emerging security threats. By integrating these algorithms, organisations can achieve quantum-resistant encryption and authentication, securing their digital assets for the future.
Last updated