Java utility safety can be enhanced by way of a few proposals to withstand quantum computing assaults, one plan involving digital signatures and the opposite key encapsulation.
The 2 proposals reside in the OpenJDK JEP (JDK Enhancement Proposal) index. One proposal, titled “Quantum-Resistant Module-Lattice-Primarily based Digital Signature Algorithm,” requires enhancing the safety of Java functions by offering an implementation of the quantum-resistant Module-Latticed-Primarily based Digital Signature Algorithm (ML-DSA). Digital signatures are used to detect unauthorized modifications to knowledge and to authenticate the identification of signatories. ML-DSA is designed to be safe towards future quantum computing assaults. It has been standardized by the US Nationwide Institute of Requirements and Expertise (NIST) in FIPS 204.
The opposite proposal, “Quantum-Resistant Module-Lattice-Primarily based Key Encapsulation Mechanism,” requires enhancing utility safety by offering an implementation of the quantum-resistant Module-Lattice-Primarily based Key Encapsulation Mechanism (ML-KEM). KEMs are used to safe symmetric keys over insecure communication channels utilizing public key cryptography. ML-KEM is designed to be safe towards future quantum computing assaults and has been standardized by NIST in FIPS 203.