Learn
0%
Workshop
0%

KMS & PQC Key Management

Master PQC key management patterns: envelope encryption with ML-KEM, hybrid key wrapping, and cross-provider KMS strategies.

Post-quantum cryptography fundamentally changes how organizations manage keys. establishes that is a Key Encapsulation Mechanism only — it cannot sign. Similarly, is for signatures only — it cannot encapsulate. This strict algorithm separation replaces the dual-use nature of , which could both encrypt and sign.

“A KEM can only establish a shared secret, not directly encrypt arbitrary data. Applications that relied on RSA PKCS#1 v1.5 or RSA-OAEP for direct encryption must adopt an envelope encryption pattern when migrating to ML-KEM.”

— NIST SP 800-227, Recommendations for Key-Encapsulation Mechanisms

Classical: RSA Dual-Use
  • • RSA-OAEP: direct encryption of data/keys
  • • RSA-PSS: digital signatures
  • • One key pair serves both purposes
  • • Simple key inventory: 1 key pair per entity
PQC: Strict Separation
  • • ML-KEM: key encapsulation only (KEM)
  • • ML-DSA: digital signatures only
  • • Two key pairs per entity minimum
  • • Key inventory doubles during transition
Key Size Comparison
AlgorithmPublic KeyPrivate KeySig / CTSecurity
RSA-2048256 B1,192 B256 BLevel 1 (classical)
RSA-3072384 B1,766 B384 BLevel 1 (classical)
ECDSA P-25665 B32 B64 BLevel 1 (classical)
ML-KEM-512800 B1,632 B768 BNIST Level 1
ML-KEM-7681,184 B2,400 B1,088 BNIST Level 3
ML-KEM-10241,568 B3,168 B1,568 BNIST Level 5
ML-DSA-441,312 B2,560 B2,420 BNIST Level 2
ML-DSA-651,952 B4,032 B3,309 BNIST Level 3
ML-DSA-872,592 B4,896 B4,627 BNIST Level 5

PQC keys are significantly larger than classical equivalents — 4–10× vs RSA baselines, and up to 40× vs ECDSA P-256 — impacting HSM storage, certificate sizes, and network bandwidth during key distribution.

Related Resources

Design key hierarchies, visualize envelope encryption, and plan PQC rotation strategies.

Check off all sections and mark this reading done.