loader from loading.io

Samsung S25 Goes PQC

ASecuritySite Podcast

Release Date: 02/28/2025

World-leaders in Cryptography: Gene Tsudik show art World-leaders in Cryptography: Gene Tsudik

ASecuritySite Podcast

Gene is a Distinguished and ICS Alumni Professor of Computer Science at the University of California, Irvine (UCI) where he has been since 2000.  His research covers areas of security, privacy, and cryptography. From 1991 to 1996, he was a researcher at the IBM Zurich Research Laboratory and then at the Information Science Institute until 2000. He is a Fulbright scholar and a Fellow of the ACM, IEEE, AAAS, and IFIP. From 2009 to 2015, he was the editor-in-chief of the ACM Transactions on Privacy and Security (TOPS). Over the years, Gene has received a number of awards,...

info_outline
World-leaders in Technology: Vint Cerf show art World-leaders in Technology: Vint Cerf

ASecuritySite Podcast

Vint is seen as one of the founding fathers of the Internet, and along with Robert Kahn, was award the ACM AM Turing Prize - the Nobel Prize of Computer Science - in 2004. Vint contributed to many areas in the creation of the Internet, including writing many RFCs (Requests For Comment) drafts, and in 1974 published the classic paper of  "A Protocol for Packet Network  Intercommunication" in the IEEE Transactions on Communications. This paper basically defined the IP and TCP protocols that would eventually be used to build the Internet.   Along with the A.M. Turing Award, he...

info_outline
Panel Discussion: The Quantum clock countdown to Y2Q show art Panel Discussion: The Quantum clock countdown to Y2Q

ASecuritySite Podcast

Panel Discussion: The Quantum clock countdown to Y2Q ​, CEO Scottish Centre of Excellence in Digital Trust and DLT ​, Founder and CEO ACubed.IT ​, Founder CyberSeQ ​J , Senior Researcher Cybernetica Estonia

info_outline
Post Quantum Cryptography and Other Crypto with Daniel J Bernstein show art Post Quantum Cryptography and Other Crypto with Daniel J Bernstein

ASecuritySite Podcast

A chat in the International Conference on PQC and AI. Daniel is a world-renowned computer scientist, one of the most influential figures in modern cryptography and a pioneer in post-quantum security.https://luma.com/9lxiupu6https://luma.com/9lxiupu6https://luma.com/9lxiupu6

info_outline
Cryptography Experts: Professor Martin Albrecht show art Cryptography Experts: Professor Martin Albrecht

ASecuritySite Podcast

Martin Albrecht is a Professor of Cryptography at King's College London and a Principal Research Scientist at SandboxAQ. He works broadly across the field of cryptography. His work focuses on the analysis of deployed or soon-to-be deployed cryptographic solutions and he has responsibly disclosed severe vulnerabilities to various public and private stakeholders such as OpenSSH, Amazon EC2, Apple, Telegram, Jitsi and Matrix. He further works on designing advanced cryptographic solutions. He is well known for analysing the security of lattice-based cryptography against classical and quantum...

info_outline
World-leaders in Cryptography: Gilles Brassard show art World-leaders in Cryptography: Gilles Brassard

ASecuritySite Podcast

Gilles has been a full Professor at the Université de Montréal for more than 45 years. He laid the foundations of quantum cryptography at a time when no one could have predicted that the quantum information revolution would usher in a multi-billion-dollar industry, much less that the United Nations would proclaim 2025 to be the International Year of Quantum Science and Technology. He is also among the inventors of quantum teleportation, which is one of the most fundamental pillars of the theory of quantum information. In addition to this, his research focuses on areas of classical...

info_outline
World-leaders in Cryptography: Christof Paar show art World-leaders in Cryptography: Christof Paar

ASecuritySite Podcast

Christof is a director at the Max Planck Institute for Security and Privacy in Bochum, Germany. He is also, a member of the German National Academy of Sciences Leopoldina and a Fellow of the IACR and IEEE. His research includes areas of light-weight cryptography, efficient cryptographic implementations, cryptographic Trojans and physical layer security. Christof is one of the co-creators of the PRESENT light-weight cipher and of the PRINCE block cipher,  In 2003, he founded Escrypt GmbH together with Willi Mann-heims,  and which was one of the first companies to focus on industrial...

info_outline
Blockchain in Scotland show art Blockchain in Scotland

ASecuritySite Podcast

info_outline
World-leaders in Cryptography: Victor S Miller show art World-leaders in Cryptography: Victor S Miller

ASecuritySite Podcast

Victor is a Senior Research Scientist at Nexus Laboratories. He received his PhD in Mathematics from Harvard University in 1975, and was an assistant professor at the University of Massachusetts Boston from 1973 to 1978. Victor has since worked for the IBM Research Center, The Institute for Defence Analyses in Princeton, Meta Platforms and SRI International. For his research, Victor has focused on areas of computational number theory, data compression and cryptography.  Along with Neal Koblitz, he was the co-creator of Elliptic Curve Cryptography, the inventor of Miller's algorithm and...

info_outline
Fireside Chat: Bruce Schneier show art Fireside Chat: Bruce Schneier

ASecuritySite Podcast

A fireside chat from the International Conference on Digital Trust, AI and the Future. Bruce has created a wide range of cryptographic methods including Skein (hash function), Helix (stream cipher), Fortuna (random number generator), and Blowfish/Twofish/Threefish (block ciphers). Bruce has published 14 books, including best-sellers such as Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. He has also published hundreds of articles, essays, and academic papers. Currently, Bruce is a fellow at the Berkman Center for Internet and Society at Harvard University.

info_outline
 
More Episodes

YouTube: https://youtu.be/hcdk3u2R5Mo

Yesterday, I gave two short presentations on PQC (Post Quantum Cryptography), and next week, I’m in London to give a more focused talk on the subject. And so, it’s great to see that Samsung is driving forward the adoption of PQC methods in their new S25 smartphone.

There are two companies that have a core focus on creating trusted hardware for consumers: Apple and Samsung. Apple has always had a core focus on making sure they use the best cryptography to not only secure their devices but also to make them privacy-aware. Samsung, too, has strived for improved security but, at times, has made a few slip-ups along the way, but always patched around them. Now, Samsung Electronics has integrated PQC into their Galaxy S25 series of devices.

The need for this is that NIST will deprecate all our existing public key methods in 2030, including: RSA for public key encryption; RSA, ECDSA and EdDSA for signatures; and ECDH for key exchange. NIST will then remove them in 2035 from the NIST FIPS 140 standard. Given that a smartphone will have a life of at least five years, it makes sense to build the hardware to support the migration. Along with this, we see the rise of “harvest now, decrypt later” threats, where network traffic could be captured now and then decrypted sometime in the future.

The main integration at the current time involved ML-KEM (FIPS 203, aka Kyber) and ML-DSA (FIPS 204, aka Dilithium). With ML-KEM we replace key exchange and public key encryption methods, while ML-DSA provides us with digital signing:

These methods will be the Samsung Knox Matrix for enhanced data protection — this includes end-to-encryption for back-ups and the recovery of data from the Samsung Cloud. Overall, Samsung devices, like Apple hardware, have a secure enclave to store private and secret keys, and where not even Samsung can get access to them.

The usage of PQC will mean that Samsung devices will be able to communicate with other devices in the future and which are using PQC methods. This ensures not only current compatibility but also future compatibility. An important advancement of the industry is that Samsung will support PQC methods for their backup system to their Cloud.

Conclusions

Of course, the integration will not force applications and services to use PQC, and in most cases, it will still use our traditional methods, as devices that it connects to must support PQC. Thus, we will see a migration towards PQC, rather than a hard switch-over. In cryptography, this is often the case, as we can typically negotiate the cryptography methods that are used in the secure transmission or storage of data. Once all the required services and applications support PQC, our existing public key methods will likely be switched off.