By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
The Tech DiffThe Tech DiffThe Tech Diff
  • Home
  • Shop
  • Computers
  • Phones
  • Technology
  • Wearables
Reading: “Ransomware Family Becomes First to Achieve Quantum-Safe Status”
Share
Font ResizerAa
The Tech DiffThe Tech Diff
Font ResizerAa
  • Computers
  • Phones
  • Technology
  • Wearables
Search
  • Home
  • Shop
  • Computers
  • Phones
  • Technology
  • Wearables
Follow US
  • Shop
  • About
  • Contact
  • Terms & Conditions
  • Privacy Policy
© Copyright 2022. All Rights Reserved By The Tech Diff.
The Tech Diff > Blog > Technology > “Ransomware Family Becomes First to Achieve Quantum-Safe Status”
Technology

“Ransomware Family Becomes First to Achieve Quantum-Safe Status”

Admin
Last updated: April 26, 2026 1:51 am
Admin
Share
“Ransomware Family Becomes First to Achieve Quantum-Safe Status”
SHARE

The Surprising Use of Post-Quantum Cryptography in Ransomware

In an intriguing development within the world of cybersecurity, some ransomware developers are adopting post-quantum cryptography (PQC) techniques, specifically through the use of the Kyber key-exchange algorithm. However, experts suggest that the practical benefits of this choice may be negligible given the current technological landscape.

Contents
The Surprising Use of Post-Quantum Cryptography in RansomwareUnderstanding the Timing of Quantum Computing RisksDissecting Claims Surrounding ML-KEMAn Insight into Marketing StrategiesThe Technical DetailsThe Broader Implications of PQC in Ransomware

Understanding the Timing of Quantum Computing Risks

The Kyber ransom notes indicate that victims have one week to respond to payment demands. Notably, quantum computers capable of executing Shor’s algorithm—the algorithm that threatens RSA and elliptic curve cryptography (ECC)—are estimated to be at least three years away from practical implementation, and likely much further. This raises questions about the necessity and effectiveness of employing a PQC key-exchange algorithm at this stage in the game.

-43% Experience Freedom: Bone Conduction Bluetooth Headphones
Headphones

Experience Freedom: Bone Conduction Bluetooth Headphones

$45.99 Original price was: $45.99.$26.39Current price is: $26.39.
Buy Now
-22% Maximize Space: Gianotter Dual Monitor Stand & Organizer
Computer & Accessories

Maximize Space: Gianotter Dual Monitor Stand & Organizer

$35.97 Original price was: $35.97.$27.99Current price is: $27.99.
Buy Now
-34% TAGRY True Wireless Earbuds: 60H Playback & IPX5 Waterproof!
Headphones

TAGRY True Wireless Earbuds: 60H Playback & IPX5 Waterproof!

$39.99 Original price was: $39.99.$26.59Current price is: $26.59.
Buy Now
-20% Experience Freedom: Bone Conduction Headphones for Active Lives!
Headphones

Experience Freedom: Bone Conduction Headphones for Active Lives!

$31.99 Original price was: $31.99.$25.59Current price is: $25.59.
Buy Now

Dissecting Claims Surrounding ML-KEM

Some ransomware variants that reportedly employ ML-KEM, a technique associated with Kyber, have come under scrutiny. Rapid7, a cybersecurity firm, revealed that these variants actually utilize RSA with 4096-bit keys, a method that would take substantially longer for Shor’s algorithm to compromise. Anna Širokova, a senior security researcher at Rapid7, commented that the claims of using ML-KEM might serve as a marketing gimmick rather than as a genuine security enhancement. She noted, “the implementation required relatively little work by Kyber developers.”

An Insight into Marketing Strategies

Spirova elaborated on the psychological tactics employed by these ransomware operators. In an email, she stated:

“First, it’s marketing to the victim. ‘Post-quantum encryption’ sounds a lot scarier than ‘we used AES,’ especially to non-technical decision-makers who might be evaluating whether to pay. It’s a psychological trick. They’re not worried about someone breaking the encryption a decade from now. They want payment within 72 hours.”

The Technical Details

Moreover, Širokova highlighted that implementing Kyber1024 libraries, which have been rebranded to ML-KEM, is a simple process. Ransomware operators don’t encrypt files directly using Kyber1024 due to speed limitations. Instead, they typically follow these steps:

  1. Generate a random AES key.
  2. Use that AES key to encrypt the files (quickly).
  3. Encrypt the AES key using Kyber1024, ensuring that only the attacker can decrypt it.

This process highlights how easily developers can adapt existing libraries, particularly in programming languages like Rust, where relevant Kyber1024 libraries are well-documented and readily available, making them accessible even to less experienced developers.

The Broader Implications of PQC in Ransomware

Despite the underlying hype, the adoption of post-quantum cryptography by ransomware developers seems to be more about perception than protective capacity. Kyber’s associations might attract attention from less technically skilled attorneys and executives facing ransom demands, potentially swaying their decision to pay based on an impression of superior security. However, experts caution that the actual implementation doesn’t necessarily provide the impenetrable defense it suggests.

Ultimately, as the technology evolves and quantum computing approaches a more accessible state, the cybersecurity community must remain vigilant and critical of how encryption is marketed and implemented in a rapidly changing landscape.

For further insights and details on this evolving topic in cybersecurity, click here.

Image Credit: arstechnica.com

You Might Also Like

“Anthropic Launches Innovative Marketplace for Agent-on-Agent Transactions”

“Communication Declines: Researchers Find We’re Talking Less Than Ever”

“India Startup Pronto Secures $200M Valuation Backed by Lachy Groom”

“Top University Websites Unintentionally Serve Adult Content Due to Poor Maintenance”

“China’s DeepSeek Unveils AI Model, Challenging US Competitors Again”

Share This Article
Facebook Twitter Copy Link Print
Previous Article Google Photos AI Enhance Launches for All Users Worldwide Google Photos AI Enhance Launches for All Users Worldwide
Next Article Motorola Edge 70 Fusion Champions Curved-Screen Smartphones Motorola Edge 70 Fusion Champions Curved-Screen Smartphones
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Product categories

  • Computer & Accessories
  • Headphones
  • Laptops
  • Phones
  • Wearables

Trending Products

  • Unleash Innovation: Samsung Galaxy S24 Ultra – 200MP, 100x Zoom! Unleash Innovation: Samsung Galaxy S24 Ultra - 200MP, 100x Zoom! $827.50
  • Upgrade Your Sound: Cyber Acoustics USB Speaker Bar CA-2890 Upgrade Your Sound: Cyber Acoustics USB Speaker Bar CA-2890 $34.99 Original price was: $34.99.$19.99Current price is: $19.99.
  • IP68 Fitness Tracker Watch: Step Counter & Sleep Monitor! IP68 Fitness Tracker Watch: Step Counter & Sleep Monitor! $108.49 Original price was: $108.49.$35.99Current price is: $35.99.
  • WavePads by PostureUp: Ergonomic Wrist Rests for Pain Relief WavePads by PostureUp: Ergonomic Wrist Rests for Pain Relief $24.99 Original price was: $24.99.$19.99Current price is: $19.99.
  • Boost Storage: Amazon Basics 256GB Micro SDXC, 100MB/s! Boost Storage: Amazon Basics 256GB Micro SDXC, 100MB/s! $19.79

You Might also Like

Bob Iger Returns to Thrive Capital as Advisor Following Disney Departure
Technology

Bob Iger Returns to Thrive Capital as Advisor Following Disney Departure

Admin Admin 3 Min Read
Microsoft Urgently Updates macOS and Linux to Address ASP.NET Vulnerability
Technology

Microsoft Urgently Updates macOS and Linux to Address ASP.NET Vulnerability

Admin Admin 3 Min Read
“Iranian Women ‘Saved’ by Trump: Reality vs. AI Fabrication”
Technology

“Iranian Women ‘Saved’ by Trump: Reality vs. AI Fabrication”

Admin Admin 4 Min Read

About Us

At The Tech Diff, we believe technology is more than just innovation—it’s a lifestyle that shapes the way we work, connect, and explore the world. Our mission is to keep readers informed, inspired, and ahead of the curve with fresh updates, expert insights, and meaningful stories from across the digital landscape.

Useful Link

  • Shop
  • About
  • Contact
  • Terms & Conditions
  • Privacy Policy

Categories

  • Computers
  • Phones
  • Technology
  • Wearables

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

We don’t spam! Read our privacy policy for more info.

Check your inbox or spam folder to confirm your subscription.

The Tech DiffThe Tech Diff
Follow US
© Copyright 2022. All Rights Reserved By The Tech Diff.
Welcome Back!

Sign in to your account

Lost your password?