Your ML-KEM Keypairs
Below are your quantum-safe ML-KEM keypairs (512, 768, 1024). Use them with our encryption and decryption tools.
Algorithm | Security Level | Public Key | Private Key |
---|---|---|---|
ML-KEM-512 | 1 | Download | Download |
ML-KEM-768 | 3 | Download | Download |
ML-KEM-1024 | 5 | Download | Download |
Refresh to generate new keypairs. Share the Public Key; keep the Private Key secure.
How to Use This Tool
Use Scenario: Bob wants to encrypt data for Alice in a quantum-safe manner. Alice generates her own ML-KEM keypair using this tool (generate ML-KEM keypairs) and shares her public key with Bob. Bob then uses Alice's public key and his data with our encryption tool to generate encrypted data that only Alice can decrypt with her private key.
Tips for UK Users Following NCSC Guidance
The NCSC recommends ML-KEM-768 for most use cases, balancing security (Level 3) and efficiency, though ML-KEM-512 and 1024 suit specific needs (e.g., low-power or high-security data). For optimal quantum-safe protection, we suggest selecting ML-KEM-768 unless your requirements differ. Pair your keypair with a secure protocol, like our encryption tool, and a quantum-safe signature (e.g., ML-DSA) signature tool for authentication, as advised by the NCSC. Keys are generated with NIST-approved randomness via liboqs and /dev/urandom, ensuring cryptographic strength. Plan for future agility by staying updated with NIST's evolving PQC standards.Tips for EU Users Following DORA
Under DORA (EU 2024/1774), financial entities must use quantum-safe cryptography like ML-KEM per Article 6. We recommend ML-KEM-768 for its security/efficiency balance, though all variants (512, 768, 1024) meet NIST standards. Keys are generated with NIST-approved randomness via liboqs and /dev/urandom, ensuring Article 7 compliance. Store private keys securely offline and replace them if compromised, as DORA requires robust key lifecycle management. Pair with our ML-DSA keys for authenticated encryption systems.
Security Assurance
We never save your keys - they are generated and processed entirely in memory. We do not store your data or files. Any zip files we generate are temporarily processed in a secure temporary folder and automatically deleted after you download them. For full details, please visit our Privacy Policy.