Skip to main content

Post-Quantum Cryptography

Bringing quantum-resistance to AWS services and customers

What is post-quantum cryptography at AWS?

At AWS, the confidentiality, integrity, and authenticity of our customers' data is a top priority. Today's widely-used public-key cryptographic schemes rely on mathematical problems - like integer factoring and discrete logarithms - that could be efficiently solved by future quantum computers. To address this challenge, AWS is deploying new NIST-standardized post-quantum cryptographic algorithms that are designed to resist both classical and quantum computing attacks. These algorithms, including the Module-Lattice-based Key-Encapsulation Mechanism (ML-KEM) and Module-Lattice-based Digital Signature Algorithm (ML-DSA), are based on different mathematical foundations that are believed to be resistant to quantum computing attacks.

AWS has already deployed post-quantum cryptography across several key services. AWS Key Management Service (AWS KMS), AWS Secrets Manager, and AWS Certificate Manager have implemented post-quantum hybrid key establishment combining Elliptic Curve Diffie-Hellman (ECDH) with ML-KEM to protect against "harvest now, decrypt later" attacks. At the foundation of these implementations is AWS-LC, our FIPS-140-3-validated cryptographic library, which was the first open-source cryptographic module to include ML-KEM in its FIPS validation.

Missing alt text value

Migration to quantum-resistant cryptography

Through our PQC migration strategy, AWS is ensuring that customers’ security needs are met not just for today, but well into the quantum computing era. We continue to work closely with our customers, global standards organizations and the cryptographic community to advance the development and deployment of quantum-safe technologies. 

The AWS Post-Quantum team interfaces with the global cryptographic community by participating in international conferences, the open literature, and standards organizations with a goal of leading the adoption of quantum-resistant cloud-scale cryptographic technology. We are participating in projects and working groups on quantum-resistant cryptography, including the Internet Engineering Task Force (IETF)ETSI Quantum Safe Cryptography Technical CommitteeNIST’s National Cybersecurity Center of Excellence (NCCoE) Migration to Post-Quantum Cryptography projectMITRE Post-Quantum Cryptography CoalitionPost-Quantum Cryptography Alliance (PQCA), and the Open Quantum Safe initiative.

Standards and industry collaborations

We're working with researchers around the world to help author the following standards:

NIST

The NIST Post-Quantum Cryptography standardization effort is a process to solicit, evaluate, and standardize one or more quantum-resistant public-key cryptographic algorithms. The new public-key cryptography standards will specify one or more additional digital signatures, public-key encryption, and key encapsulation mechanisms (KEM) algorithms to augment Federal Information Processing Standard (FIPS) 186-4, Digital Signature Standard (DSS), as well as NIST Special Publication 800-56A Revision 3. NIST has outlined an estimated timeline of 2024 for the completion of this process, at which point the draft standards and call for public comments will be released.

Of the submissions remaining in the standardization process that are either to be standardized, or advancing onto further rounds of analysis, AWS team members have contributed to the key encapsulation mechanisms ML-KEM and the signature algorithms ML-DSA and SLH-DSA

Missing alt text value

IETF

The standardization of hybrid key exchange in TLS 1.3. This IETF draft is motivated by the transition to quantum-resistant cryptography, in particular, defining more explicitly how we will navigate the transitional phase from classical to post-quantum algorithms in the Transport Layer Security (TLS) protocol version 1.3.

The standardization of the SPHINCS+ Signature Algorithm in the Cryptographic Message Syntax (CMS). CMS is the IETF's standard for cryptographically protected messages. It can be used to digitally sign, digest, authenticate or encrypt any form of digital data. This standard will provide the quantum-resistant algorithm SPHINCS+ into CMS.

The standardization of ML-DSA Algorithm Identifiers for X.509 Public Key Infrastructure and ML-KEM Algorithm Identifiers for X.509 Public Key Infrastructure. These are two IETF drafts to describe the conventions for using ML-DSA and ML-KEM quantum-resistant signature and KEM respectively in Internet X.509 certificates and certificate revocation lists. The conventions for the associated post-quantum signatures, subject public keys, and private key are also described.

The standardization of Post-Quantum Hybrid Key Exchange in Secure Shell that extends the SSH Transport Layer Protocol with post-quantum hybrid key exchange methods.

Missing alt text value

ETSI

The European Telecommunications Standards Institute (ETSI) plays a leading role in the standardization of quantum-safe cryptography through its Technical Committee on Quantum-Safe Cryptography. The group focuses on identifying, evaluating, and standardizing post-quantum cryptographic algorithms and protocols, offering practical implementation guidelines to support a secure transition to quantum-resistant systems.In collaboration with academia, industry leaders, and governments, ETSI addresses the security impact of quantum computing, defines requirements for post-quantum algorithms, and provides best practices for deploying quantum-safe infrastructures.

Its work helps ensure interoperability, scalability, and performance in real-world applications. ETSI has published extensive technical reports and specifications on the transition to quantum-safe systems, including Technical Report TR 103 619 defining migration strategies and recommendations for Quantum-Safe schemes, and TS 103 744 on Quantum-Safe Hybrid Key Exchanges.

For more information, visit the ETSI Quantum-Safe Cryptography webpage.

Missing alt text value

Open source contributions

AWS Libcrypto (AWS-LC) is a general-purpose cryptographic library maintained by the AWS Cryptography team for AWS and our customers. Based on code from the Google BoringSSL project and OpenSSL project. AWS-LC contains the post-quantum Key Encapsulation Mechanism ML-KEM, and the post-quantum Digital Signature Algorithm ML-DSA. Read more here.

Learn more about AWS Lib

The PQ Code Package (PQCP) project is an open source project that aims to build high-assurance software implementations of standards-track post-quantum cryptography algorithms. The PQCP is a project within the Linux Foundation as part of the Post-Quantum Cryptography Alliance. See pq-code-package/repositories for the list of repositories under the PQCP, including ML-KEM and ML-DSA

s2n-tls is a C99 implementation of the TLS/SSL protocols that is designed to be simple, small, fast, and with security as a priority. s2n-tls supports post-quantum key exchange for TLS1.3. See more about post quantum support in s2n-tls here.

Learn more about s2n-tls

Learn more about AWS open source security and AWS open source cryptography contributions.

The ETSI Quantum-safe Hybrid Key Exchanges (QHKEX) project is part of ETSI Forge, an open-source repository for ETSI standards. The QHKEX project provides reference implementations and known answer tests for Technical Specification (TS) 103 744 CYBER; Quantum-Safe Cryptography (QSC); Quantum-safe Hybrid Key Establishment techniques.

Interested?

To learn more about post-quantum cryptography with AWS

Contact us