{"id":1139939,"date":"2025-05-27T09:00:00","date_gmt":"2025-05-27T16:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/?p=1139939"},"modified":"2025-05-27T07:38:55","modified_gmt":"2025-05-27T14:38:55","slug":"frodokem-a-conservative-quantum-safe-cryptographic-algorithm","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/research\/blog\/frodokem-a-conservative-quantum-safe-cryptographic-algorithm\/","title":{"rendered":"FrodoKEM: A conservative quantum-safe cryptographic algorithm"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1400\" height=\"788\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2025\/05\/FrodoKEM-BlogHeroFeature-1400x788-1.jpg\" alt=\"The image features a gradient background transitioning from blue on the left to pink on the right. In the center, there are three white icons. On the left is a microchip icon that represents quantum computing, in the middle is a shield, and on the right is another microchip with a padlock symbol inside it.\" class=\"wp-image-1140055\" srcset=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2025\/05\/FrodoKEM-BlogHeroFeature-1400x788-1.jpg 1400w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2025\/05\/FrodoKEM-BlogHeroFeature-1400x788-1-300x169.jpg 300w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2025\/05\/FrodoKEM-BlogHeroFeature-1400x788-1-1024x576.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2025\/05\/FrodoKEM-BlogHeroFeature-1400x788-1-768x432.jpg 768w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2025\/05\/FrodoKEM-BlogHeroFeature-1400x788-1-1066x600.jpg 1066w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2025\/05\/FrodoKEM-BlogHeroFeature-1400x788-1-655x368.jpg 655w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2025\/05\/FrodoKEM-BlogHeroFeature-1400x788-1-240x135.jpg 240w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2025\/05\/FrodoKEM-BlogHeroFeature-1400x788-1-640x360.jpg 640w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2025\/05\/FrodoKEM-BlogHeroFeature-1400x788-1-960x540.jpg 960w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2025\/05\/FrodoKEM-BlogHeroFeature-1400x788-1-1280x720.jpg 1280w\" sizes=\"auto, (max-width: 1400px) 100vw, 1400px\" \/><\/figure>\n\n\n\n<p>In this post, we describe FrodoKEM, a key encapsulation protocol that offers a simple design and provides strong security guarantees even in a future with powerful quantum computers.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"the-quantum-threat-to-cryptography\">The quantum threat to cryptography<\/h2>\n\n\n\n<p>For decades, modern cryptography has relied on mathematical problems that are practically impossible for classical computers to solve without a secret key. Cryptosystems like RSA, Diffie-Hellman key-exchange, and elliptic curve-based schemes\u2014which rely on the hardness of the integer factorization and (elliptic curve) discrete logarithm problems\u2014secure communications on the internet, banking transactions, and even national security systems. However, the emergence of<strong> <\/strong>quantum computing poses a significant threat to these cryptographic schemes.<\/p>\n\n\n\n<p>Quantum computers leverage the principles of quantum mechanics to perform certain calculations exponentially faster than classical computers. Their ability to solve complex problems, such as simulating molecular interactions, optimizing large-scale systems, and accelerating machine learning, is expected to have profound and beneficial implications for fields ranging from chemistry and material science to artificial intelligence.<\/p>\n\n\n\n<p>At the same time, quantum computing is poised to disrupt cryptography. In particular, Shor\u2019s algorithm, a quantum algorithm developed in 1994, can efficiently factor large numbers and compute discrete logarithms\u2014the very problems that underpin the security of RSA, Diffie-Hellman, and elliptic curve cryptography. This means that once large-scale, fault-tolerant quantum computers become available, public-key protocols based on RSA, ECC, and Diffie-Hellman will become insecure, breaking a sizable portion of the cryptographic backbone of today\u2019s digital world. Recent advances in quantum computing, such as <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/news.microsoft.com\/source\/features\/innovation\/microsofts-majorana-1-chip-carves-new-path-for-quantum-computing\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft\u2019s Majorana 1<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, the first quantum processor powered by topological qubits, represent major steps toward practical quantum computing and underscore the urgency of transitioning to quantum-resistant cryptographic systems.<\/p>\n\n\n\n<p>To address this looming security crisis, cryptographers and government agencies have been working on post-quantum cryptography (PQC)\u2014new cryptographic algorithms that can resist attacks from both classical and quantum computers.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"the-nist-post-quantum-cryptography-standardization-effort\">The NIST Post-Quantum Cryptography Standardization effort<\/h2>\n\n\n\n<p>In 2017, the U.S. National Institute of Standards and Technology (NIST) launched the <strong><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\/post-quantum-cryptography-standardization\" target=\"_blank\" rel=\"noopener noreferrer\">Post-Quantum Cryptography Standardization project<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/strong> to evaluate and select cryptographic algorithms capable of withstanding quantum attacks. As part of this initiative, NIST sought proposals for two types of cryptographic primitives: key encapsulation mechanisms (KEMs)\u2014which enable two parties to securely derive a shared key to establish an encrypted connection, similar to traditional key exchange schemes\u2014and digital signature schemes.<\/p>\n\n\n\n<p>This initiative attracted submissions from cryptographers worldwide, and after multiple evaluation rounds, NIST selected CRYSTALS-Kyber, a KEM based on structured lattices, and standardized it as <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/doi.org\/10.6028\/NIST.FIPS.203\" target=\"_blank\" rel=\"noopener noreferrer\">ML-KEM<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>. Additionally, NIST selected three digital signature schemes: CRYSTALS-Dilithium, now called ML-DSA; SPHINCS<sup>+<\/sup>, now called SLH-DSA; and Falcon, now called FN-DSA.<\/p>\n\n\n\n<p>While ML-KEM provides great overall security and efficiency, some governments and cryptographic researchers advocate for the inclusion and standardization of alternative algorithms that minimize reliance on algebraic structure. Reducing algebraic structure might prevent potential vulnerabilities and, hence, can be considered a more conservative design choice. One such algorithm is <strong>FrodoKEM<\/strong>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"international-standardization-of-post-quantum-cryptography\">International standardization of post-quantum cryptography<\/h2>\n\n\n\n<p>Beyond NIST, other international standardization bodies have been actively working on quantum-resistant cryptographic solutions. The <strong>International Organization for Standardization (ISO)<\/strong> is leading a global effort to standardize additional PQC algorithms. Notably, European government agencies\u2014including <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/EN\/BSI\/Publications\/TechGuidelines\/TG02102\/BSI-TR-02102-1.pdf?__blob=publicationFile&v=7\" target=\"_blank\" rel=\"noopener noreferrer\">Germany\u2019s BSI<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/publications.tno.nl\/publication\/34643386\/fXcPVHsX\/TNO-2024-pqc-en.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">the Netherlands\u2019 NLNCSA and AIVD<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, and <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/cyber.gouv.fr\/en\/publications\/follow-position-paper-post-quantum-cryptography\" target=\"_blank\" rel=\"noopener noreferrer\">France\u2019s ANSSI<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>\u2014have shown strong support for FrodoKEM, recognizing it as a conservative alternative to structured lattice-based schemes.<\/p>\n\n\n\n<p>As a result,<strong> FrodoKEM is undergoing standardization at ISO.<\/strong> Additionally, ISO is standardizing ML-KEM and a conservative code-based KEM called Classic McEliece. These three algorithms are planned for inclusion in ISO\/IEC 18033-2:2006 as <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/www.iso.org\/standard\/86890.html\" target=\"_blank\" rel=\"noopener noreferrer\">Amendment 2<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"what-is-frodokem\">What is FrodoKEM?<\/h2>\n\n\n\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/project\/frodokem\/\">FrodoKEM<\/a> is a key encapsulation mechanism (KEM) based on the <strong>Learning with Errors (LWE) problem<\/strong>, a cornerstone of lattice-based cryptography. Unlike structured lattice-based schemes such as ML-KEM, FrodoKEM is built on generic, unstructured lattices, i.e., it is based on the <em>plain <\/em>LWE problem.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"why-unstructured-lattices\">Why unstructured lattices?<\/h3>\n\n\n\n<p>Structured lattice-based schemes introduce additional algebraic properties that could potentially be exploited in future cryptanalytic attacks. By using unstructured lattices, FrodoKEM eliminates these concerns, making it a safer choice in the long run, albeit at the cost of larger key sizes and lower efficiency.<\/p>\n\n\n\n<p>It is important to emphasize that no particular cryptanalytic weaknesses are currently known for recommended parameterizations of structured lattice schemes in comparison to plain LWE. However, our current understanding of the security of these schemes could potentially change in the future with cryptanalytic advances.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"lattices-and-the-learning-with-errors-lwe-problem\">Lattices and the Learning with Errors (LWE) problem<\/h2>\n\n\n\n<p>Lattice-based cryptography relies on the mathematical structure of lattices, which are regular arrangements of points in multidimensional space. A lattice is defined as the set of all integer linear combinations of a set of basis vectors. The difficulty of certain computational problems on lattices, such as the Shortest Vector Problem (SVP) and the Learning with Errors (LWE) problem, forms the basis of lattice-based schemes.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"the-learning-with-errors-lwe-problem\">The Learning with Errors (LWE) problem<\/h3>\n\n\n\n<p>The LWE problem is a fundamental hard problem in lattice-based cryptography. It involves solving a system of linear equations where some small random error has been added to each equation, making it extremely difficult to recover the original secret values. This added error ensures that the problem remains computationally infeasible, even for quantum computers. Figure 1 below illustrates the LWE problem, specifically, the search version of the problem.<\/p>\n\n\n\n<p>As can be seen in Figure 1, for the setup of the problem we need a dimension \\(n\\) that defines the size of matrices, a modulus \\(q\\) that defines the value range of the matrix coefficients, and a certain error distribution \\(\\chi\\) from which we sample \\(\\textit{\u201csmall\u201d}\\) matrices. We sample two matrices from \\(\\chi\\), a small matrix \\(\\text{s}\\) and an error matrix \\(\\text{e}\\) (for simplicity in the explanation, we assume that both have only one column); sample an \\(n \\times n\\) matrix \\(\\text{A}\\) uniformly at random; and compute \\(\\text{b} = \\text{A} \\times \\text{s} + \\text{e}\\). In the illustration, each matrix coefficient is represented by a colored square, and the \u201clegend of coefficients\u201d gives an idea of the size of the respective coefficients, e.g., orange squares represent the small coefficients of matrix \\(\\text{s}\\)&nbsp;(small relative to the modulus \\(q\\)). Finally, given \\(\\text{A}\\) and \\(\\text{b}\\), the search LWE problem consists in finding \\(\\text{s}\\). This problem is believed to be hard for suitably chosen parameters (e.g., for dimension \\(n\\) sufficiently large) and is used at the core of FrodoKEM.<\/p>\n\n\n\n<p>In comparison, the LWE variant used in ML-KEM\u2014called Module-LWE (M-LWE)\u2014has additional symmetries, adding mathematical structure that helps improve efficiency. In a setting similar to that of the search LWE problem above, the matrix \\(\\text{A}\\) can be represented by just a single row of coefficients.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1810\" height=\"965\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2025\/05\/Figure-1.jpg\" alt=\"Visualization of the (search) LWE problem.\" class=\"wp-image-1140135\" srcset=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2025\/05\/Figure-1.jpg 1810w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2025\/05\/Figure-1-300x160.jpg 300w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2025\/05\/Figure-1-1024x546.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2025\/05\/Figure-1-768x409.jpg 768w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2025\/05\/Figure-1-1536x819.jpg 1536w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2025\/05\/Figure-1-710x380.jpg 710w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2025\/05\/Figure-1-240x128.jpg 240w\" sizes=\"auto, (max-width: 1810px) 100vw, 1810px\" \/><figcaption class=\"wp-element-caption\"><strong>FIGURE 1:<\/strong> Visualization of the (search) LWE problem.<\/figcaption><\/figure>\n\n\n\n<p>LWE is conjectured to be quantum-resistant, and FrodoKEM\u2019s security is directly tied to its hardness. In other words, cryptanalysts and quantum researchers have not been able to devise an efficient quantum algorithm capable of solving the LWE problem and, hence, FrodoKEM. In cryptography, absolute security can never be guaranteed; instead, confidence in a problem\u2019s hardness comes from extensive scrutiny and its resilience against attacks over time.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"how-frodokem-works\">How FrodoKEM Works<\/h2>\n\n\n\n<p>FrodoKEM follows the standard paradigm of a KEM, which consists of three main operations\u2014key generation, encapsulation, and decapsulation\u2014performed interactively between a sender and a recipient with the goal of establishing a shared secret key:<\/p>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li><strong>Key generation (KeyGen), computed by the recipient<\/strong>\n<ul class=\"wp-block-list\">\n<li>Generates a public key and a secret key.<\/li>\n\n\n\n<li>The public key is sent to the sender, while the private key remains secret.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Encapsulation (Encapsulate), computed by the sender<\/strong>\n<ul class=\"wp-block-list\">\n<li>Generates a random session key.<\/li>\n\n\n\n<li>Encrypts the session key using the recipient&#8217;s public key to produce a ciphertext.<\/li>\n\n\n\n<li>Produces a shared key using the session key and the ciphertext.<\/li>\n\n\n\n<li>The ciphertext is sent to the recipient.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Decapsulation (Decapsulate), computed by the recipient<\/strong>\n<ul class=\"wp-block-list\">\n<li>Decrypts the ciphertext using their secret key to recover the original session key.<\/li>\n\n\n\n<li>Reproduces the shared key using the decrypted session key and the ciphertext.<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n\n\n\n<p>The shared key generated by the sender and reconstructed by the recipient can then be used to establish secure symmetric-key encryption for further communication between the two parties.<\/p>\n\n\n\n<p>Figure 2 below shows a simplified view of the FrodoKEM protocol. As highlighted in red, FrodoKEM uses at its core LWE operations of the form \u201c\\(\\text{b} = \\text{A} \\times \\text{s} + \\text{e}\\)\u201d, which are directly applied within the KEM paradigm.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1845\" height=\"1055\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2025\/05\/Figure-2.jpg\" alt=\"Simplified overview of FrodoKEM.\" class=\"wp-image-1140137\" srcset=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2025\/05\/Figure-2.jpg 1845w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2025\/05\/Figure-2-300x172.jpg 300w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2025\/05\/Figure-2-1024x586.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2025\/05\/Figure-2-768x439.jpg 768w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2025\/05\/Figure-2-1536x878.jpg 1536w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2025\/05\/Figure-2-240x137.jpg 240w\" sizes=\"auto, (max-width: 1845px) 100vw, 1845px\" \/><figcaption class=\"wp-element-caption\"><strong>FIGURE 2:<\/strong> Simplified overview of FrodoKEM.<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"performance-strong-security-has-a-cost\">Performance: Strong security has a cost<\/h2>\n\n\n\n<p>Not relying on additional algebraic structure certainly comes at a cost for FrodoKEM in the form of increased protocol runtime and bandwidth. The table below compares the performance and key sizes corresponding to the FrodoKEM level 1 parameter set (variant called \u201cFrodoKEM-640-AES\u201d) and the respective parameter set of ML-KEM (variant called \u201cML-KEM-512\u201d). These parameter sets are intended to match or exceed the brute force security of AES-128. As can be seen, the difference in speed and key sizes between FrodoKEM and ML-KEM is more than an order of magnitude. Nevertheless, the runtime of the FrodoKEM protocol remains reasonable for most applications. For example, on our benchmarking platform clocked at 3.2GHz, the measured runtimes are 0.97 ms, 1.9 ms, and 3.2 ms for security levels 1, 2, and 3, respectively.<\/p>\n\n\n\n<p>For security-sensitive applications, a more relevant comparison is with Classic McEliece, a post-quantum code-based scheme also considered for standardization. In this case, FrodoKEM offers several efficiency advantages. Classic McEliece\u2019s public keys are significantly larger\u2014well over an order of magnitude greater than FrodoKEM\u2019s\u2014and its key generation is substantially more computationally expensive. Nonetheless, Classic McEliece provides an advantage in certain static key-exchange scenarios, where its high key generation cost can be amortized across multiple key encapsulation executions.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"2236\" height=\"521\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2025\/05\/Figure-3.jpg\" alt=\"Comparison of key sizes and performance on an x86-64 processor for NIST level 1 parameter sets.\" class=\"wp-image-1140140\" srcset=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2025\/05\/Figure-3.jpg 2236w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2025\/05\/Figure-3-300x70.jpg 300w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2025\/05\/Figure-3-1024x239.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2025\/05\/Figure-3-768x179.jpg 768w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2025\/05\/Figure-3-1536x358.jpg 1536w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2025\/05\/Figure-3-2048x477.jpg 2048w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2025\/05\/Figure-3-240x56.jpg 240w\" sizes=\"auto, (max-width: 2236px) 100vw, 2236px\" \/><figcaption class=\"wp-element-caption\"><strong>TABLE 1:<\/strong> Comparison of key sizes and performance on an x86-64 processor for NIST level 1 parameter sets.<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"a-holistic-design-made-with-security-in-mind\">A holistic design made with security in mind<\/h2>\n\n\n\n<p>FrodoKEM&#8217;s design principles support security beyond its reliance on generic, unstructured lattices to minimize the attack surface of potential future cryptanalytic threats. Its parameters have been carefully chosen with additional security margins to withstand advancements in known attacks. Furthermore, FrodoKEM is designed with simplicity in mind\u2014its internal operations are based on straightforward matrix-vector arithmetic using integer coefficients reduced modulo a power of two. These design decisions facilitate simple, compact and secure implementations that are also easier to maintain and to protect against side-channel attacks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"conclusion\">Conclusion<\/h2>\n\n\n\n<p>After years of research and analysis, the next generation of post-quantum cryptographic algorithms has arrived. NIST has chosen strong PQC protocols that we believe will serve Microsoft and its customers well in many applications. For security-sensitive applications, FrodoKEM offers a secure yet practical approach for post-quantum cryptography. While its reliance on unstructured lattices results in larger key sizes and higher computational overhead compared to structured lattice-based alternatives, it provides strong security assurances against potential future attacks. Given the ongoing standardization efforts and its endorsement by multiple governmental agencies, FrodoKEM is well-positioned as a viable alternative for organizations seeking long-term cryptographic resilience in a post-quantum world.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"further-reading\">Further Reading<\/h2>\n\n\n\n<p>For those interested in learning more about FrodoKEM, post-quantum cryptography, and lattice-based cryptography, the following resources provide valuable insights:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The official FrodoKEM website: <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/frodokem.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/frodokem.org\/<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, which contains, among several other resources, FrodoKEM\u2019s specification document.<\/li>\n\n\n\n<li>The official FrodoKEM software library: <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/github.com\/Microsoft\/PQCrypto-LWEKE\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/github.com\/Microsoft\/PQCrypto-LWEKE<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, which contains reference and optimized implementations of FrodoKEM written in C and Python.<\/li>\n\n\n\n<li>NIST\u2019s Post-Quantum Cryptography Project: <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>.<\/li>\n\n\n\n<li>Microsoft\u2019s blogpost on its transition plan for PQC: <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/techcommunity.microsoft.com\/blog\/microsoft-security-blog\/microsofts-quantum-resistant-cryptography-is-here\/4238780\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/techcommunity.microsoft.com\/blog\/microsoft-security-blog\/microsofts-quantum-resistant-cryptography-is-here\/4238780<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>.<\/li>\n\n\n\n<li>A comprehensive survey on lattice-based cryptography: Peikert, C. &#8220;A Decade of Lattice Cryptography.&#8221; Foundations and Trends in Theoretical Computer Science. (2016)<\/li>\n\n\n\n<li>A comprehensive tutorial on modern lattice-based schemes, including ML-KEM and ML-DSA: Lyubashevsky, V. &#8220;Basic Lattice Cryptography: The concepts behind Kyber (ML-KEM) and Dilithium (ML-DSA).&#8221; <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/eprint.iacr.org\/2024\/1287\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/eprint.iacr.org\/2024\/1287<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>. (2024)<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>The recent advances in quantum computing offer many advantages\u2014but also challenge current cryptographic strategies. Learn how FrodoKEM could help strengthen security, even in a future with powerful quantum computers.<\/p>\n","protected":false},"author":43518,"featured_media":1140055,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","msr-author-ordering":[{"type":"user_nicename","value":"Patrick Longa","user_id":"33271"}],"msr_hide_image_in_river":null,"footnotes":""},"categories":[1],"tags":[],"research-area":[243138,13558],"msr-region":[],"msr-event-type":[],"msr-locale":[268875],"msr-post-option":[269148,243984,269142],"msr-impact-theme":[],"msr-promo-type":[],"msr-podcast-series":[],"class_list":["post-1139939","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-research-blog","msr-research-area-quantum","msr-research-area-security-privacy-cryptography","msr-locale-en_us","msr-post-option-approved-for-river","msr-post-option-blog-homepage-featured","msr-post-option-include-in-river"],"msr_event_details":{"start":"","end":"","location":""},"podcast_url":"","podcast_episode":"","msr_research_lab":[],"msr_impact_theme":[],"related-publications":[],"related-downloads":[],"related-videos":[],"related-academic-programs":[],"related-groups":[],"related-projects":[480492],"related-events":[],"related-researchers":[{"type":"user_nicename","value":"Patrick Longa","user_id":33271,"display_name":"Patrick Longa","author_link":"<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/plonga\/\" aria-label=\"Visit the profile page for Patrick Longa\">Patrick Longa<\/a>","is_active":false,"last_first":"Longa, Patrick","people_section":0,"alias":"plonga"}],"msr_type":"Post","featured_image_thumbnail":"<img width=\"960\" height=\"540\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2025\/05\/FrodoKEM-BlogHeroFeature-1400x788-1-960x540.jpg\" class=\"img-object-cover\" alt=\"The image features a gradient background transitioning from blue on the left to pink on the right. In the center, there are three white icons. On the left is a microchip icon that represents quantum computing, in the middle is a shield, and on the right is another microchip with a padlock symbol inside it.\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2025\/05\/FrodoKEM-BlogHeroFeature-1400x788-1-960x540.jpg 960w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2025\/05\/FrodoKEM-BlogHeroFeature-1400x788-1-300x169.jpg 300w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2025\/05\/FrodoKEM-BlogHeroFeature-1400x788-1-1024x576.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2025\/05\/FrodoKEM-BlogHeroFeature-1400x788-1-768x432.jpg 768w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2025\/05\/FrodoKEM-BlogHeroFeature-1400x788-1-1066x600.jpg 1066w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2025\/05\/FrodoKEM-BlogHeroFeature-1400x788-1-655x368.jpg 655w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2025\/05\/FrodoKEM-BlogHeroFeature-1400x788-1-240x135.jpg 240w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2025\/05\/FrodoKEM-BlogHeroFeature-1400x788-1-640x360.jpg 640w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2025\/05\/FrodoKEM-BlogHeroFeature-1400x788-1-1280x720.jpg 1280w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2025\/05\/FrodoKEM-BlogHeroFeature-1400x788-1.jpg 1400w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/>","byline":"<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/plonga\/\" title=\"Go to researcher profile for Patrick Longa\" aria-label=\"Go to researcher profile for Patrick Longa\" data-bi-type=\"byline author\" data-bi-cN=\"Patrick Longa\">Patrick Longa<\/a>","formattedDate":"May 27, 2025","formattedExcerpt":"The recent advances in quantum computing offer many advantages\u2014but also challenge current cryptographic strategies. Learn how FrodoKEM could help strengthen security, even in a future with powerful quantum computers.","locale":{"slug":"en_us","name":"English","native":"","english":"English"},"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/posts\/1139939","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/users\/43518"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/comments?post=1139939"}],"version-history":[{"count":64,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/posts\/1139939\/revisions"}],"predecessor-version":[{"id":1140141,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/posts\/1139939\/revisions\/1140141"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media\/1140055"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=1139939"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/categories?post=1139939"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/tags?post=1139939"},{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=1139939"},{"taxonomy":"msr-region","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-region?post=1139939"},{"taxonomy":"msr-event-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-event-type?post=1139939"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=1139939"},{"taxonomy":"msr-post-option","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-post-option?post=1139939"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=1139939"},{"taxonomy":"msr-promo-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-promo-type?post=1139939"},{"taxonomy":"msr-podcast-series","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-podcast-series?post=1139939"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}