By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
The Tech DiffThe Tech DiffThe Tech Diff
  • Home
  • Shop
  • Computers
  • Phones
  • Technology
  • Wearables
Reading: “Ransomware Family Becomes First to Achieve Quantum-Safe Status”
Share
Font ResizerAa
The Tech DiffThe Tech Diff
Font ResizerAa
  • Computers
  • Phones
  • Technology
  • Wearables
Search
  • Home
  • Shop
  • Computers
  • Phones
  • Technology
  • Wearables
Follow US
  • Shop
  • About
  • Contact
  • Terms & Conditions
  • Privacy Policy
© Copyright 2022. All Rights Reserved By The Tech Diff.
The Tech Diff > Blog > Technology > “Ransomware Family Becomes First to Achieve Quantum-Safe Status”
Technology

“Ransomware Family Becomes First to Achieve Quantum-Safe Status”

Admin
Last updated: April 26, 2026 1:51 am
Admin
Share
“Ransomware Family Becomes First to Achieve Quantum-Safe Status”
SHARE

The Surprising Use of Post-Quantum Cryptography in Ransomware

In an intriguing development within the world of cybersecurity, some ransomware developers are adopting post-quantum cryptography (PQC) techniques, specifically through the use of the Kyber key-exchange algorithm. However, experts suggest that the practical benefits of this choice may be negligible given the current technological landscape.

Contents
The Surprising Use of Post-Quantum Cryptography in RansomwareUnderstanding the Timing of Quantum Computing RisksDissecting Claims Surrounding ML-KEMAn Insight into Marketing StrategiesThe Technical DetailsThe Broader Implications of PQC in Ransomware

Understanding the Timing of Quantum Computing Risks

The Kyber ransom notes indicate that victims have one week to respond to payment demands. Notably, quantum computers capable of executing Shor’s algorithm—the algorithm that threatens RSA and elliptic curve cryptography (ECC)—are estimated to be at least three years away from practical implementation, and likely much further. This raises questions about the necessity and effectiveness of employing a PQC key-exchange algorithm at this stage in the game.

-25% Uliptz Bluetooth Headphones: 65H Playtime & 6 EQ Modes!
Headphones

Uliptz Bluetooth Headphones: 65H Playtime & 6 EQ Modes!

$19.99 Original price was: $19.99.$14.99Current price is: $14.99.
Buy Now
-20% Chic Pink Laptop Stand: Stylish Office Essential with Drawer!
Computer & Accessories

Chic Pink Laptop Stand: Stylish Office Essential with Drawer!

$22.99 Original price was: $22.99.$18.39Current price is: $18.39.
Buy Now
-43% TECKNET Bluetooth Trucker Headset: 50Hrs, Noise Cancelling!
Headphones

TECKNET Bluetooth Trucker Headset: 50Hrs, Noise Cancelling!

$79.99 Original price was: $79.99.$45.99Current price is: $45.99.
Buy Now
Maximize Comfort & Sound: N18 Bluetooth 5.2 Earbuds!
Headphones

Maximize Comfort & Sound: N18 Bluetooth 5.2 Earbuds!

$25.99
Buy Now

Dissecting Claims Surrounding ML-KEM

Some ransomware variants that reportedly employ ML-KEM, a technique associated with Kyber, have come under scrutiny. Rapid7, a cybersecurity firm, revealed that these variants actually utilize RSA with 4096-bit keys, a method that would take substantially longer for Shor’s algorithm to compromise. Anna Širokova, a senior security researcher at Rapid7, commented that the claims of using ML-KEM might serve as a marketing gimmick rather than as a genuine security enhancement. She noted, “the implementation required relatively little work by Kyber developers.”

An Insight into Marketing Strategies

Spirova elaborated on the psychological tactics employed by these ransomware operators. In an email, she stated:

“First, it’s marketing to the victim. ‘Post-quantum encryption’ sounds a lot scarier than ‘we used AES,’ especially to non-technical decision-makers who might be evaluating whether to pay. It’s a psychological trick. They’re not worried about someone breaking the encryption a decade from now. They want payment within 72 hours.”

The Technical Details

Moreover, Širokova highlighted that implementing Kyber1024 libraries, which have been rebranded to ML-KEM, is a simple process. Ransomware operators don’t encrypt files directly using Kyber1024 due to speed limitations. Instead, they typically follow these steps:

  1. Generate a random AES key.
  2. Use that AES key to encrypt the files (quickly).
  3. Encrypt the AES key using Kyber1024, ensuring that only the attacker can decrypt it.

This process highlights how easily developers can adapt existing libraries, particularly in programming languages like Rust, where relevant Kyber1024 libraries are well-documented and readily available, making them accessible even to less experienced developers.

The Broader Implications of PQC in Ransomware

Despite the underlying hype, the adoption of post-quantum cryptography by ransomware developers seems to be more about perception than protective capacity. Kyber’s associations might attract attention from less technically skilled attorneys and executives facing ransom demands, potentially swaying their decision to pay based on an impression of superior security. However, experts caution that the actual implementation doesn’t necessarily provide the impenetrable defense it suggests.

Ultimately, as the technology evolves and quantum computing approaches a more accessible state, the cybersecurity community must remain vigilant and critical of how encryption is marketed and implemented in a rapidly changing landscape.

For further insights and details on this evolving topic in cybersecurity, click here.

Image Credit: arstechnica.com

You Might Also Like

“Anthropic Launches Innovative Marketplace for Agent-on-Agent Transactions”

“Communication Declines: Researchers Find We’re Talking Less Than Ever”

“India Startup Pronto Secures $200M Valuation Backed by Lachy Groom”

“Top University Websites Unintentionally Serve Adult Content Due to Poor Maintenance”

“China’s DeepSeek Unveils AI Model, Challenging US Competitors Again”

Share This Article
Facebook Twitter Copy Link Print
Previous Article Google Photos AI Enhance Launches for All Users Worldwide Google Photos AI Enhance Launches for All Users Worldwide
Next Article Motorola Edge 70 Fusion Champions Curved-Screen Smartphones Motorola Edge 70 Fusion Champions Curved-Screen Smartphones
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Product categories

  • Computer & Accessories
  • Headphones
  • Laptops
  • Phones
  • Wearables

Trending Products

  • TAGRY Bluetooth Earbuds: 60H Playtime & LED Charge Display! TAGRY Bluetooth Earbuds: 60H Playtime & LED Charge Display! $39.99
  • Discover the BiggerFive Smart Watch: Adventure Awaits! Discover the BiggerFive Smart Watch: Adventure Awaits! $36.99
  • TECKNET Wireless Headset: 50H Playtime & AI Noise Cancelling! TECKNET Wireless Headset: 50H Playtime & AI Noise Cancelling! $39.99 Original price was: $39.99.$36.99Current price is: $36.99.
  • Discover Koss KTXPRO1 Headphones: Sound & Control On-the-Go! Discover Koss KTXPRO1 Headphones: Sound & Control On-the-Go! $19.99
  • Hands-Free Neck Phone Holder for GoPro & Vlogging Fun! Hands-Free Neck Phone Holder for GoPro & Vlogging Fun! $24.99 Original price was: $24.99.$18.99Current price is: $18.99.

You Might also Like

Bob Iger Returns to Thrive Capital as Advisor Following Disney Departure
Technology

Bob Iger Returns to Thrive Capital as Advisor Following Disney Departure

Admin Admin 3 Min Read
Microsoft Urgently Updates macOS and Linux to Address ASP.NET Vulnerability
Technology

Microsoft Urgently Updates macOS and Linux to Address ASP.NET Vulnerability

Admin Admin 3 Min Read
“Iranian Women ‘Saved’ by Trump: Reality vs. AI Fabrication”
Technology

“Iranian Women ‘Saved’ by Trump: Reality vs. AI Fabrication”

Admin Admin 4 Min Read

About Us

At The Tech Diff, we believe technology is more than just innovation—it’s a lifestyle that shapes the way we work, connect, and explore the world. Our mission is to keep readers informed, inspired, and ahead of the curve with fresh updates, expert insights, and meaningful stories from across the digital landscape.

Useful Link

  • Shop
  • About
  • Contact
  • Terms & Conditions
  • Privacy Policy

Categories

  • Computers
  • Phones
  • Technology
  • Wearables

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

We don’t spam! Read our privacy policy for more info.

Check your inbox or spam folder to confirm your subscription.

The Tech DiffThe Tech Diff
Follow US
© Copyright 2022. All Rights Reserved By The Tech Diff.
Welcome Back!

Sign in to your account

Lost your password?