Post-Quantum Cryptography · ML-DSA · ML-KEM · Rust

Post-Quantum Cryptography
Ready for Tomorrow

NIST-standardized ML-DSA (Dilithium) and ML-KEM (Kyber) implementations in Rust. High-performance, memory-safe, and production-ready for the post-quantum era.

PQC Capabilities

Digital Signatures (ML-DSA)

NIST-standardized Dilithium for post-quantum digital signatures.

ML-DSA-44 (Level 2)ML-DSA-65 (Level 3)ML-DSA-87 (Level 5)+3

Key Encapsulation (ML-KEM)

NIST-standardized Kyber for post-quantum key exchange.

ML-KEM-512 (Level 1)ML-KEM-768 (Level 3)ML-KEM-1024 (Level 5)+3

Rust Implementations

High-performance, memory-safe Rust crates for PQC.

no_std SupportConstant-timeSIMD Optimizations+3

Hybrid Cryptography

Combine classical and post-quantum algorithms.

X25519+ML-KEMEd25519+ML-DSAComposite Algorithms+2

ML-DSA (Dilithium) - Digital Signatures

Digital Signature

ML-DSA-44

NIST Security Level 2 - Balanced performance

FIPS 204
Level 2 (AES-128 equivalent)
Key Sizes
Public: 1.3KBPrivate: 2.5KB
Signature Sizes
Signature: 2.4KB
Performance
KeyGen
50K
Sign
120K
Verify
40K
Use Cases
IoT DevicesMobile AppsTLS Certificates
Digital Signature

ML-DSA-65

NIST Security Level 3 - Enterprise standard

FIPS 204
Level 3 (AES-192 equivalent)
Key Sizes
Public: 2.0KBPrivate: 4.0KB
Signature Sizes
Signature: 3.3KB
Performance
KeyGen
80K
Sign
190K
Verify
60K
Use Cases
Web ServersCode SigningEmail Security
Digital Signature

ML-DSA-87

NIST Security Level 5 - Maximum security

FIPS 204
Level 5 (AES-256 equivalent)
Key Sizes
Public: 2.7KBPrivate: 5.5KB
Signature Sizes
Signature: 4.6KB
Performance
KeyGen
120K
Sign
280K
Verify
90K
Use Cases
Critical InfrastructureGovernmentMilitary

ML-KEM (Kyber) - Key Encapsulation

Key Encapsulation

ML-KEM-512

NIST Security Level 1 - Lightweight KEM

FIPS 203
Level 1 (AES-128 equivalent)
Key Sizes
Public: 800BPrivate: 1.6KB
Performance
KeyGen
40K
Use Cases
IoTEmbeddedLow-power Devices
Key Encapsulation

ML-KEM-768

NIST Security Level 3 - Enterprise standard

FIPS 203
Level 3 (AES-192 equivalent)
Key Sizes
Public: 1.2KBPrivate: 2.4KB
Performance
KeyGen
70K
Use Cases
TLS 1.3VPNsCloud Services
Key Encapsulation

ML-KEM-1024

NIST Security Level 5 - Maximum security

FIPS 203
Level 5 (AES-256 equivalent)
Key Sizes
Public: 1.6KBPrivate: 3.2KB
Performance
KeyGen
100K
Use Cases
Long-term SecretsArchivalCritical Systems

Rust Implementations

pqc-dilithium

Pure Rust ML-DSA (Dilithium)

Features
no_stdConstant-time
Crates
pqc-dilithium
Performance
2-3x faster than C

pqc-kyber

Pure Rust ML-KEM (Kyber)

Features
Stack allocationZero heap
Crates
pqc-kyber
Performance
1.5x faster than C

pqc-hybrid

Hybrid classical/PQC

Features
X25519+KyberEd25519+Dilithium
Crates
pqc-hybrid
Performance
Minimal overhead

pqc-wasm

WebAssembly bindings

Features
Browser readyNode.js
Crates
pqc-wasm
Performance
Near-native speed

Performance Metrics (Rust)

ML-DSA-65
KeyGen
Cycles
80K
Memory
4KB
ML-DSA-65
Sign
Cycles
190K
Memory
8KB
ML-DSA-65
Verify
Cycles
60K
Memory
4KB
ML-KEM-768
KeyGen
Cycles
70K
Memory
3KB
ML-KEM-768
Encaps
Cycles
80K
Memory
4KB
ML-KEM-768
Decaps
Cycles
80K
Memory
4KB

Why Sirraya for Post-Quantum Cryptography

We deliver production-ready PQC implementations with NIST-standard algorithms in memory-safe Rust.

NIST Standard

FIPS 203 (ML-KEM) and FIPS 204 (ML-DSA) compliant

Memory-Safe Rust

Constant-time, no_std, and formally verified

High Performance

AVX2, NEON, and WebAssembly optimizations

Ready to Migrate to Post-Quantum?

Let's implement NIST-standard ML-DSA and ML-KEM in your systems today.

Email Us

No commitment. No sales pitch. Just expert advice on PQC migration.