The development of the quantum computer is advancing so fast that, although a cryptographically significant quantum computer does not yet exist and, according to the most optimistic forecasts, can only be expected in about a decade, some of the vulnerable cryptographic building blocks used to protect data today need to be replaced now. This paper is an overview of key encapsulation mechanisms (KEMs), which are quantum-secure algorithms for key agreement. In the paper, we will discuss the threat quantum computers pose to traditional cryptography, present the general operation of KEM algorithms and specific algorithms for which we will present their security properties, and perform an analysis of their performance. Finally, we will present some examples of KEM algorithms or hybrid solutions that combine traditional and post-quantum cryptography in commonly used protocols.

Authors

  • Marko Kompara Fakulteta za elektrotehniko, računalništvo in informatiko, Univerza v Mariboru
  • Marko Hölbl University of Maribor, Faculty of electrical engineering and computer science

DOI:

https://doi.org/10.31449/upinf.248

Keywords:

KEM, key encapsulation mechanism, post-quantum cryptography, analysis

Abstract

The development of the quantum computer is advancing so fast that, although a cryptographically significant quantum computer does not yet exist and, according to the most optimistic forecasts, can only be expected in about a decade, some of the vulnerable cryptographic building blocks used to protect data today need to be replaced now. This paper is an overview of key encapsulation mechanisms (KEMs), which are quantum-secure algorithms for key agreement. In the paper, we will discuss the threat quantum computers pose to traditional cryptography, present the general operation of KEM algorithms and specific algorithms for which we will present their security properties, and perform an analysis of their performance. Finally, we will present some examples of KEM algorithms or hybrid solutions that combine traditional and post-quantum cryptography in commonly used protocols.

Author Biographies

Marko Kompara, Fakulteta za elektrotehniko, računalništvo in informatiko, Univerza v Mariboru

Marko Kompara is a researcher and teaching assistant at the Faculty of Electrical Engineering, Computer Science and Informatics, where he also obtained his PhD with a thesis on key agreement protocols in constrained environments. Since then, he has been and still is involved in a number of projects in the field of cybersecurity (e.g., CyberSec4Europe, Cyber F-IT, RUKIV, RPUP, AKADIMOS). His research interests are privacy, cryptography, wireless communications, and information systems security.

Marko Hölbl, University of Maribor, Faculty of electrical engineering and computer science

Marko Hölbl's research on cybersecurity and privacy covers a broad area, from cryptography to user aspects of information security and privacy. He is currently Vice Dean for Research at FERI UM, an active member and Secretary General of CEPIS LSI, a member of ECSO (WG6), a member of the Executive Committee of the Slovenian Informatics Society, and a member of the Cyber Security Section of the Slovenian Chamber of Commerce.

Published

2025-08-13

How to Cite

[1]
Kompara, M. and Hölbl, M. 2025. The development of the quantum computer is advancing so fast that, although a cryptographically significant quantum computer does not yet exist and, according to the most optimistic forecasts, can only be expected in about a decade, some of the vulnerable cryptographic building blocks used to protect data today need to be replaced now. This paper is an overview of key encapsulation mechanisms (KEMs), which are quantum-secure algorithms for key agreement. In the paper, we will discuss the threat quantum computers pose to traditional cryptography, present the general operation of KEM algorithms and specific algorithms for which we will present their security properties, and perform an analysis of their performance. Finally, we will present some examples of KEM algorithms or hybrid solutions that combine traditional and post-quantum cryptography in commonly used protocols. Applied Informatics. (Aug. 2025). DOI:https://doi.org/10.31449/upinf.248.

Issue

Section

Scientific articles

Most read articles by the same author(s)