Generate FIPS 203 ML-KEM Keypairs

Your keys are ready - secure them now for quantum-safe encryption.

Your ML-KEM Keypairs

Below are your quantum-safe ML-KEM keypairs (512, 768, 1024). Use them with our encryption and decryption tools.

Algorithm Security Level Public Key Private Key
ML-KEM-512 1 Download Download
ML-KEM-768 3 Download Download
ML-KEM-1024 5 Download Download

Refresh to generate new keypairs. Share the Public Key; keep the Private Key secure.

How to Use This Tool

Use Scenario: Bob wants to encrypt data for Alice in a quantum-safe manner. Alice generates her own ML-KEM keypair using this tool (generate ML-KEM keypairs) and shares her public key with Bob. Bob then uses Alice's public key and his data with our encryption tool to generate encrypted data that only Alice can decrypt with her private key.

Tips for UK Users Following NCSC Guidance

The NCSC recommends ML-KEM-768 for most use cases, balancing security (Level 3) and efficiency, though ML-KEM-512 and 1024 suit specific needs (e.g., low-power or high-security data). For optimal quantum-safe protection, we suggest selecting ML-KEM-768 unless your requirements differ. Pair your keypair with a secure protocol, like our encryption tool, and a quantum-safe signature (e.g., ML-DSA) signature tool for authentication, as advised by the NCSC. Keys are generated with NIST-approved randomness via liboqs and /dev/urandom, ensuring cryptographic strength. Plan for future agility by staying updated with NIST's evolving PQC standards.

Tips for EU Users Following DORA

Under DORA (EU 2024/1774), financial entities must use quantum-safe cryptography like ML-KEM per Article 6. We recommend ML-KEM-768 for its security/efficiency balance, though all variants (512, 768, 1024) meet NIST standards. Keys are generated with NIST-approved randomness via liboqs and /dev/urandom, ensuring Article 7 compliance. Store private keys securely offline and replace them if compromised, as DORA requires robust key lifecycle management. Pair with our ML-DSA keys for authenticated encryption systems.

Security Assurance

We never save your keys - they are generated and processed entirely in memory. We do not store your data or files. Any zip files we generate are temporarily processed in a secure temporary folder and automatically deleted after you download them. For full details, please visit our Privacy Policy.