• Menu
  • Skip to right header navigation
  • Skip to main content
  • Skip to primary sidebar

DigiBanker

Bringing you cutting-edge new technologies and disruptive financial innovations.

  • Home
  • Pricing
  • Features
    • Overview Of Features
    • Search
    • Favorites
  • Share!
  • Log In
  • Home
  • Pricing
  • Features
    • Overview Of Features
    • Search
    • Favorites
  • Share!
  • Log In

NIST’s ML-KEM-768 standard replaces X25519 and RSA key exchange with lattice-based post-quantum cryptography, protecting banking and healthcare data from “harvest now, decrypt later” attacks ahead of Q-day

October 1, 2025 //  by Finnovate

Quantum experts are heralding the arrival of a new cryptographic algorithm, Module-Lattice-Based Key-Encapsulation Mechanism, or put more simply: ML-KEM. ML-KEM is the recently standardized alternative to ECC or RSA key agreement schemes, with ML-KEM-768 chosen as the primary parameter set to replace widely used algorithms such as X25519. The pressure is on for quantum experts to guarantee that this set of algorithms will protect important data when “Q-day” arrives — the anticipated moment when quantum computers are powerful enough to break today’s encryption. “ML-KEM is considered secure enough to protect government data,” Lily Chen, mathematician at the NIST, said. In the transition to PQC, cryptography architects have a choice between pure and hybrid algorithms. Pure PQC migration replaces all previous algorithms with quantum-resistant ones, whereas hybrid migration combines traditional public key algorithms with PQC algorithms. ML-KEM can be deployed with either option. “Now that we have ML-KEM, we still standardized groups that use ML-KEM in this hybrid scenario, it was basically very simple to switch to ML-KEM from Kyber.” Chen added that developing hybrid mode algorithms in alignment with current standards is necessary to prevent people from using unsafe, ad hoc hybrid algorithms. The goal is to meet companies’ needs while staying within the NIST framework.

Read Article

Category: Cybersecurity, Innovation Topics

Previous Post: « Harness integrates Qwiet AI’s Code Property Graph-based scanning into its application security platform, eliminating 90% of open-source vulnerability alerts through attacker reachability analysis and AI-powered code fixes
Next Post: FBI warns “phantom hacker” scam exploiting WhatsApp’s screen-sharing feature has stolen over $1 billion since 2024, with attackers viewing passwords, OTPs, and bank details in real-time through encrypted video calls »

Copyright © 2025 Finnovate Research · All Rights Reserved · Privacy Policy
Finnovate Research · Knyvett House · Watermans Business Park · The Causeway Staines · TW18 3BA · United Kingdom · About · Contact Us · Tel: +44-20-3070-0188

We use cookies to provide the best website experience for you. If you continue to use this site we will assume that you are happy with it.