/plushcap/analysis/cloudflare/post-quantum-key-encapsulation

Deep dive into a post-quantum key encapsulation algorithm

What's this blog post about?

The text discusses key exchange algorithms, which are essential for secure communication over the internet. These algorithms enable two parties to exchange information without ever having to meet in advance. Key exchange algorithms are based on hard mathematical problems such as integer factorization and the discrete logarithm problem. However, these problems can be efficiently solved by a quantum computer, breaking the secrecy of the communication. The text introduces Key Encapsulation Mechanisms (KEMs) and explains how they work. It also discusses the use of KEMs in modern internet connections and presents an example of a post-quantum KEM called FrodoKEM. The security of FrodoKEM is based on the hardness of the Learning With Errors (LWE) problem over lattices. The text further explains how to build encryption from this mathematical base using Public Key Encryption (PKE) and Key Encapsulation Mechanisms (KEMs). It also mentions other KEMs beyond Frodo, such as Kyber, NTRU, Saber, and Classic McEliece.

Company
Cloudflare

Date published
Feb. 22, 2022

Author(s)
Goutam Tamvada, SofĂ­a Celi

Word count
3341

Language
English

Hacker News points
5


By Matt Makai. 2021-2024.