Join us

Google Introduces Quantum-Safe KEMs in Cloud KMS for Future Security

Google Introduces Quantum-Safe KEMs in Cloud KMS for Future Security

TL;DR

Google introduces quantum-safe KEMs in Cloud KMS to counter future quantum computing threats, urging organizations to transition to post-quantum cryptography.

Key Points

Highlight key points with color coding based on sentiment (positive, neutral, negative).

Google has introduced quantum-safe Key Encapsulation Mechanisms (KEMs) in Cloud Key Management Service (Cloud KMS) to help organizations prepare for future security threats posed by quantum computing.

Transitioning to post-quantum cryptography involves significant architectural changes and managing increased key sizes, which can impact application performance, particularly in resource-constrained environments like IoT devices.

A hybrid approach combining classical and post-quantum algorithms is recommended to mitigate risks associated with the novelty of post-quantum cryptographic algorithms and to ensure a safer transition.

Post-quantum cryptographic operations result in substantially larger public keys and ciphertexts, which can affect bandwidth, storage, and memory usage, necessitating careful planning and adaptation by developers.

Google provides tools like the Tink library to facilitate the integration of post-quantum algorithms, offering support for Hybrid Public Key Encryption (HPKE) to simplify the transition for developers across various programming languages.

Key Numbers

Present key numerics and statistics in a minimalist format.
18 times

A standard ML-KEM-768 key is larger than a P-256 key.

1568 bytes

Key size used by ML-KEM-1024

1184 bytes

Key size used by ML-KEM-768

1568 bytes

Ciphertext size for ML-KEM-1024

1088 bytes

Ciphertext size for ML-KEM-768

2011

Year NIST deprecated SHA-1 hashing algorithms

2030

Year NIST recommends complete phase-out of SHA-1

2016

Year Google began testing PQC in Chrome

2022

Year Google began using PQC to protect internal communications

2024

Year Chrome enabled ML-KEM by default for TLS 1.3 and QUIC on desktop

2026

Year post-quantum cryptography is expected to be fully available in Google Cloud

Stakeholder Relationships

An interactive diagram mapping entities directly or indirectly involved in this news. Drag nodes to rearrange them and see relationship details.

Organizations

Key entities and stakeholders, categorized for clarity: people, organizations, tools, events, regulatory bodies, and industries.
Google Technology Company

Google is the primary organization behind the development and deployment of quantum-safe Key Encapsulation Mechanisms in Cloud KMS.

Tools

Key entities and stakeholders, categorized for clarity: people, organizations, tools, events, regulatory bodies, and industries.
Cloud Key Management Service (Cloud KMS) Cloud Service

Cloud KMS is the platform where Google has integrated quantum-safe Key Encapsulation Mechanisms to enhance security.

BoringCrypto Cryptographic Library

BoringCrypto is an open-source cryptographic library used by Google to provide implementations of the new quantum-safe KEMs.

Tink Cryptographic Library

Tink is another open-source cryptographic library involved in the implementation of Google's quantum-safe KEMs.

Regulatory

Key entities and stakeholders, categorized for clarity: people, organizations, tools, events, regulatory bodies, and industries.
FIPS 203 Cryptographic Standard

FIPS 203 is a standard published by NIST that Google's quantum-safe KEMs are based on.

Industries

Key entities and stakeholders, categorized for clarity: people, organizations, tools, events, regulatory bodies, and industries.
Finance Industry

The finance industry is a key stakeholder as it needs to ensure data security against future quantum threats.

Healthcare Industry

The healthcare industry must transition to quantum-safe cryptography to protect sensitive data.

Government Industry

Government sectors are stakeholders in adopting quantum-safe cryptography to secure their data.

Timeline of Events

Timeline of key events and milestones.
2011 NIST deprecated SHA-1 hashing algorithms
2016 Google began testing post-quantum cryptography in Chrome
2022 Google started using PQC to protect internal communications
2024-05 Chrome enabled ML-KEM by default for TLS 1.3 and QUIC on desktop
2024-08-13 NIST released three finalized standards for post-quantum cryptography
2025-10-08 Google announced quantum-safe KEMs in Cloud KMS
End of 2025 Support for HPKE in Tink expected to be ready for some languages
2026 Google Cloud's infrastructure expected to fully use post-quantum cryptography

This will apply to all connections within Google Cloud.

Google's latest move to integrate quantum-safe Key Encapsulation Mechanisms (KEMs) into its Cloud Key Management Service (Cloud KMS) is a big leap forward in the race to protect data from future quantum computing threats. This isn't just a tech upgrade; it's a strategic shift towards post-quantum cryptography, a necessary defense against the looming "Harvest Now, Decrypt Later" attacks. These attacks are a bit like a ticking time bomb, where adversaries grab encrypted data today, hoping to crack it open in the future when quantum computers become powerful enough to break current encryption methods.

But let's not sugarcoat it—transitioning to post-quantum cryptography is no walk in the park. One of the main hurdles is the architectural overhaul required. Post-quantum KEMs don't just slot in where traditional asymmetric encryption methods used to be. Developers have to wrap their heads around a new cryptographic model where the shared secret is generated during the KEM's encapsulation process, rather than being picked by the sender. This means rethinking how encryption is implemented and managed, which is no small feat.

And then there's the issue of size. Post-quantum cryptography comes with larger public keys and ciphertexts, which can be a real headache for application performance, bandwidth, storage, and memory usage. This is especially tricky for IoT devices, which often operate in resource-constrained environments. To navigate these choppy waters, a hybrid approach is recommended. By combining classical and post-quantum algorithms, organizations can mitigate risks and ensure a smoother transition.

Google's Cloud KMS now features several KEM algorithms, like ML-KEM-768 and ML-KEM-1024, based on the Module-Lattice standard from NIST. For general-purpose applications, a hybrid approach using the X-Wing KEM is suggested, blending classical and post-quantum algorithms. Google is also gearing up its infrastructure to use post-quantum cryptography for connections, with full availability expected by 2026. The message is clear: start preparing now, even though practical large-scale quantum computers are still a few years away. Organizations are urged to boost their cryptographic agility by understanding their current cryptographic usage, regularly testing key rotation, and using abstraction layers like Google's Tink library to ease the transition.

Enjoyed it?

Get weekly updates delivered straight to your inbox, it only takes 3 seconds!

Subscribe to our weekly newsletter DevOpsLinks to receive similar updates for free!

What is FAUN.news()?

Let's keep in touch!

Stay updated with my latest posts and news. I share insights, updates, and exclusive content.

Unsubscribe anytime. By subscribing, you share your email with @devopslinks and accept our Terms & Privacy.

Give a Pawfive to this post!


Only registered users can post comments. Please, login or signup.

Start writing about what excites you in tech — connect with developers, grow your voice, and get rewarded.

Join other developers and claim your FAUN.dev() account now!

FAUN.dev()
FAUN.dev()

FAUN.dev() is a developer-first platform built with a simple goal: help engineers stay sharp without wasting their time.

Avatar

DevOpsLinks #DevOps

FAUN.dev

@devopslinks
DevOps Weekly Newsletter, DevOpsLinks. Curated DevOps news, tutorials, tools and more!
Developer Influence
1

Influence

1

Total Hits

25

Posts