Protect your systems against future quantum computer attacks with NIST-standardized post-quantum cryptographic algorithms.
Get Started →Quantum computers pose an existential threat to current public-key cryptography. Algorithms like RSA, ECDSA, and even Ed25519 rely on mathematical problems (factoring, discrete logarithm) that quantum computers can solve efficiently using Shor's algorithm.
"Harvest now, decrypt later" attacks are already happening: adversaries collect encrypted data today to decrypt it once quantum computers become powerful enough.
The time to act is now. Organizations must transition to quantum-resistant cryptography before it's too late.
Cryptographic keys are the foundation of digital security. They protect:
Without quantum-resistant cryptography, all of these security guarantees collapse when large-scale quantum computers emerge.
After an 8-year evaluation process, NIST has standardized post-quantum cryptographic algorithms designed to resist attacks from both classical and quantum computers:
NIST begins post-quantum cryptography standardization project with 82 initial submissions.
Seven finalists selected after three rounds of evaluation based on security, performance, and implementation.
NIST publishes FIPS 203 (ML-KEM), FIPS 204 (ML-DSA), and FIPS 205 (SLH-DSA) as official standards.
ML-DSA is NIST's primary recommendation for post-quantum digital signatures. It's based on the hardness of lattice problems, which remain secure against quantum attacks.
Based on Module Learning With Errors (M-LWE) problem over polynomial rings
NIST FIPS 204 (August 2024), previously known as CRYSTALS-Dilithium
ML-DSA-44, ML-DSA-65, ML-DSA-87 (equivalent to AES-128, AES-192, AES-256)
Fast signing and verification, larger key/signature sizes than classical algorithms
Reference: NIST FIPS 204 — Module-Lattice-Based Digital Signature Standard
We support ML-DSA key generation through our API, powered by Cloudflare's production-grade CIRCL library:
Implements FIPS 204 specification exactly as standardized by NIST.
Uses hardware-backed random number generation for key creation.
Built on Cloudflare's CIRCL library, used in production at scale.
Support for ML-DSA-44, ML-DSA-65, and ML-DSA-87 security parameters.
GET /api/crypto/mldsa?level=65
Parameters:
level — Security level: 44, 65 (default), or 87{
"algorithm": "ML-DSA-65",
"security_level": 65,
"public_key": "...",
"private_key": "...",
"public_key_size": 1952,
"private_key_size": 4032
}
Start generating ML-DSA keys with our API. Free tier includes 1,000 requests per month.
Create Free Account →