Remix.run Logo
d1sxeyes 7 hours ago

Basically the idea is use hybrid. AES-GCM-256 or ChaCha20-Poly1305 for symmetric encryption (which is already PQ-safe), and ML-KEM looks set to become the standard for key encapsulation.

ML-KEM-768 is fast as an algorithm, faster than X25519 in terms of pure computation, but uses large keys, so has higher overheads on small payloads. Most of the time, they’re about equal, or the absolute time is so slow it doesn’t matter.

Most folks now are doing hybrid ML-KEM and X25519 to guard against undiscovered flaws in ML-KEM.

purplehat_ 7 hours ago | parent | next [-]

For people reading this, you may want to know the the NSA is allegedly trying to weaken hybrid ML-KEM and X25519 down to just ML-KEM. This is a good thing to pay attention to!

Here is a 6-part article about the topic: https://blog.cr.yp.to/20251004-weakened.html

throw0101a 2 hours ago | parent | next [-]

> Here is a 6-part article about the topic: https://blog.cr.yp.to/20251004-weakened.html

* https://news.ycombinator.com/item?id=45477206

* https://news.ycombinator.com/item?id=45477206#unv_45477799

See various "NSA and IETF":

* https://news.ycombinator.com/from?site=cr.yp.to

5 hours ago | parent | prev [-]
[deleted]
cube2222 4 hours ago | parent | prev | next [-]

It’s worth noting that e.g. the Go stdlib has this hybrid construction built-in via crypto/hpke.

d1sxeyes 2 hours ago | parent | prev [-]

So low not so slow