ASecuritySite Podcast
Gene is a Distinguished and ICS Alumni Professor of Computer Science at the University of California, Irvine (UCI) where he has been since 2000. His research covers areas of security, privacy, and cryptography. From 1991 to 1996, he was a researcher at the IBM Zurich Research Laboratory and then at the Information Science Institute until 2000. He is a Fulbright scholar and a Fellow of the ACM, IEEE, AAAS, and IFIP. From 2009 to 2015, he was the editor-in-chief of the ACM Transactions on Privacy and Security (TOPS). Over the years, Gene has received a number of awards,...
info_outlineASecuritySite Podcast
Vint is seen as one of the founding fathers of the Internet, and along with Robert Kahn, was award the ACM AM Turing Prize - the Nobel Prize of Computer Science - in 2004. Vint contributed to many areas in the creation of the Internet, including writing many RFCs (Requests For Comment) drafts, and in 1974 published the classic paper of "A Protocol for Packet Network Intercommunication" in the IEEE Transactions on Communications. This paper basically defined the IP and TCP protocols that would eventually be used to build the Internet. Along with the A.M. Turing Award, he...
info_outlineASecuritySite Podcast
Panel Discussion: The Quantum clock countdown to Y2Q , CEO Scottish Centre of Excellence in Digital Trust and DLT , Founder and CEO ACubed.IT , Founder CyberSeQ J , Senior Researcher Cybernetica Estonia
info_outlineASecuritySite Podcast
A chat in the International Conference on PQC and AI. Daniel is a world-renowned computer scientist, one of the most influential figures in modern cryptography and a pioneer in post-quantum security.https://luma.com/9lxiupu6https://luma.com/9lxiupu6https://luma.com/9lxiupu6
info_outlineASecuritySite Podcast
Martin Albrecht is a Professor of Cryptography at King's College London and a Principal Research Scientist at SandboxAQ. He works broadly across the field of cryptography. His work focuses on the analysis of deployed or soon-to-be deployed cryptographic solutions and he has responsibly disclosed severe vulnerabilities to various public and private stakeholders such as OpenSSH, Amazon EC2, Apple, Telegram, Jitsi and Matrix. He further works on designing advanced cryptographic solutions. He is well known for analysing the security of lattice-based cryptography against classical and quantum...
info_outlineASecuritySite Podcast
Gilles has been a full Professor at the Université de Montréal for more than 45 years. He laid the foundations of quantum cryptography at a time when no one could have predicted that the quantum information revolution would usher in a multi-billion-dollar industry, much less that the United Nations would proclaim 2025 to be the International Year of Quantum Science and Technology. He is also among the inventors of quantum teleportation, which is one of the most fundamental pillars of the theory of quantum information. In addition to this, his research focuses on areas of classical...
info_outlineASecuritySite Podcast
Christof is a director at the Max Planck Institute for Security and Privacy in Bochum, Germany. He is also, a member of the German National Academy of Sciences Leopoldina and a Fellow of the IACR and IEEE. His research includes areas of light-weight cryptography, efficient cryptographic implementations, cryptographic Trojans and physical layer security. Christof is one of the co-creators of the PRESENT light-weight cipher and of the PRINCE block cipher, In 2003, he founded Escrypt GmbH together with Willi Mann-heims, and which was one of the first companies to focus on industrial...
info_outlineASecuritySite Podcast
info_outlineASecuritySite Podcast
Victor is a Senior Research Scientist at Nexus Laboratories. He received his PhD in Mathematics from Harvard University in 1975, and was an assistant professor at the University of Massachusetts Boston from 1973 to 1978. Victor has since worked for the IBM Research Center, The Institute for Defence Analyses in Princeton, Meta Platforms and SRI International. For his research, Victor has focused on areas of computational number theory, data compression and cryptography. Along with Neal Koblitz, he was the co-creator of Elliptic Curve Cryptography, the inventor of Miller's algorithm and...
info_outlineASecuritySite Podcast
A fireside chat from the International Conference on Digital Trust, AI and the Future. Bruce has created a wide range of cryptographic methods including Skein (hash function), Helix (stream cipher), Fortuna (random number generator), and Blowfish/Twofish/Threefish (block ciphers). Bruce has published 14 books, including best-sellers such as Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. He has also published hundreds of articles, essays, and academic papers. Currently, Bruce is a fellow at the Berkman Center for Internet and Society at Harvard University.
info_outlineYouTube: https://youtu.be/hcdk3u2R5Mo
Yesterday, I gave two short presentations on PQC (Post Quantum Cryptography), and next week, I’m in London to give a more focused talk on the subject. And so, it’s great to see that Samsung is driving forward the adoption of PQC methods in their new S25 smartphone.
There are two companies that have a core focus on creating trusted hardware for consumers: Apple and Samsung. Apple has always had a core focus on making sure they use the best cryptography to not only secure their devices but also to make them privacy-aware. Samsung, too, has strived for improved security but, at times, has made a few slip-ups along the way, but always patched around them. Now, Samsung Electronics has integrated PQC into their Galaxy S25 series of devices.
The need for this is that NIST will deprecate all our existing public key methods in 2030, including: RSA for public key encryption; RSA, ECDSA and EdDSA for signatures; and ECDH for key exchange. NIST will then remove them in 2035 from the NIST FIPS 140 standard. Given that a smartphone will have a life of at least five years, it makes sense to build the hardware to support the migration. Along with this, we see the rise of “harvest now, decrypt later” threats, where network traffic could be captured now and then decrypted sometime in the future.
The main integration at the current time involved ML-KEM (FIPS 203, aka Kyber) and ML-DSA (FIPS 204, aka Dilithium). With ML-KEM we replace key exchange and public key encryption methods, while ML-DSA provides us with digital signing:

These methods will be the Samsung Knox Matrix for enhanced data protection — this includes end-to-encryption for back-ups and the recovery of data from the Samsung Cloud. Overall, Samsung devices, like Apple hardware, have a secure enclave to store private and secret keys, and where not even Samsung can get access to them.
The usage of PQC will mean that Samsung devices will be able to communicate with other devices in the future and which are using PQC methods. This ensures not only current compatibility but also future compatibility. An important advancement of the industry is that Samsung will support PQC methods for their backup system to their Cloud.
Conclusions
Of course, the integration will not force applications and services to use PQC, and in most cases, it will still use our traditional methods, as devices that it connects to must support PQC. Thus, we will see a migration towards PQC, rather than a hard switch-over. In cryptography, this is often the case, as we can typically negotiate the cryptography methods that are used in the secure transmission or storage of data. Once all the required services and applications support PQC, our existing public key methods will likely be switched off.