In a first, a ransomware family is confirmed to be quantum-safe

Auto-Generated

What Happened

A relatively new ransomware family is using a novel approach to hype the strength of the encryption used to scramble files—making, or at least claiming, that it is protected against attacks by quantum computers.

Why It Matters

Kyber, as the ransomware is called, has been around since at least last September and quickly attracted attention for the claim that it used ML-KEM, short for Module Lattice-based Key Encapsulation Mechanism and is a standard shepherded by the National Institute of Standards and Technology.

Key Details

  • The Kyber ransomware name comes from the alternate name for ML-KEM, which is also Kyber.
  • For the rest of the article, Kyber refers to the ransomware; the algorithm is referred to as ML-KEM.
  • It's all about marketing ML-KEM is an asymmetric encryption method for exchanging keys.
  • It involves problems based on lattices, a structure in mathematics that quantum computers have no advantage in solving over classic computing.

Background Context

A relatively new ransomware family is using a novel approach to hype the strength of the encryption used to scramble files—making, or at least claiming, that it is protected against attacks by quantum computers. Kyber, as the ransomware is called, has been around since at least last September and quickly attracted attention for the claim that it used ML-KEM, short for Module Lattice-based Key Encapsulation Mechanism and is a standard shepherded by the National Institute of Standards and Technology. The Kyber ransomware name comes from the alternate name for ML-KEM, which is also Kyber. For the rest of the article, Kyber refers to the ransomware; the algorithm is referred to as ML-KEM. It's a

What To Watch Next

Track official statements, independent verification, and regional impact updates in the next 24 to 48 hours.

Editorial Next Step

Add your local context, fact checks, quotes, and analysis before or after publication.

Source: Ars Technica – All contentOriginal Link

Source: Ars Technica – All content

Leave a Reply

Your email address will not be published. Required fields are marked *