• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
google cloud kms adds quantum safe digital signatures to defend against

Google Cloud KMS Adds Quantum-Safe Digital Signatures to Defend Against Future Threats

You are here: Home / General Cyber Security News / Google Cloud KMS Adds Quantum-Safe Digital Signatures to Defend Against Future Threats
February 24, 2025

Google Cloud has announced quantum-safe digital signatures in Google Cloud Key Management Service (Cloud KMS) for software-based keys as a way to bulletproof encryption systems against the threat posed by cryptographically-relevant quantum computers.

The feature, currently in preview, coexists with the National Institute of Standards and Technology’s (NIST) post-quantum cryptography (PQC) standards, the final versions of which were formalized in August 2024.

Cybersecurity

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“Our Cloud KMS PQC roadmap includes support for the NIST post-quantum cryptography standards (FIPS 203, FIPS 204, FIPS 205, and future standards), in both software (Cloud KMS) and hardware (Cloud HSM),” the company’s cloud division noted.

“This can help customers perform quantum-safe key import and key exchange, encryption and decryption operations, and digital signature creation.”

The tech giant said its underlying software implementations of these standards – FIPS 203 (aka ML-KEM), FIPS 204 (aka CRYSTALS-Dilithium or ML-DSA), and FIPS 205 (aka Sphincs+ or SLH-DSA) – would be available as open-source software.

Furthermore, it’s working with Hardware Security Module (HSM) vendors and Google Cloud External Key Manager (EKM) partners to enable quantum-safe cryptography across the platform.

By adopting PQC early on, the idea is to secure systems against a threat called Harvest Now, Decrypt Later (HNDL) that involves threat actors harvesting encrypted sensitive data today with the goal of decrypting them at some point in the future when a quantum computer powerful enough to break existing key exchange protocols and algorithms become a reality.

Cybersecurity

“While that future may be years away, those deploying long-lived roots-of-trust or signing firmware for devices managing critical infrastructure should consider mitigation options against this threat vector now,” Google Cloud’s Jennifer Fernick and Andrew Foster said.

“The sooner we’re able to secure these signatures, the more resilient the digital world’s foundation of trust becomes.”

Quantum-safe digital signatures in Cloud KMS is available in preview for both ML-DSA-65 (FIPS 204) and SLH-DSA-SHA2-128S (FIPS 205), with API support for hybridization schemes planned for future rollout if the cryptographic community arrives at a broader consensus.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «becoming ransomware ready: why continuous validation is your best defense Becoming Ransomware Ready: Why Continuous Validation Is Your Best Defense
Next Post: ⚡ THN Weekly Recap: From $1.5B Crypto Heist to AI Misuse & Apple’s Data Dilemma ⚡ thn weekly recap: from $1.5b crypto heist to ai»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.