NIST-standardized post-quantum algorithms via REST API. ML-KEM (Kyber), ML-DSA (Dilithium), SLH-DSA (SPHINCS+), and hybrid encryption — no cryptography expertise required.
Nation-state adversaries are collecting encrypted traffic today to decrypt once quantum computers arrive. RSA-2048 encrypted today may be readable in 5–10 years.
NIST published FIPS 203, 204, and 205 in August 2024. The algorithms are final — there is no reason to wait before starting migration.
Cryptographic migrations across codebases, dependencies, and protocols take years. Starting now gives you the runway to migrate safely.
| Algorithm | Standard | Type | Security Level | Public Key Size |
|---|---|---|---|---|
| ML-KEM-512 | FIPS 203 | KEM | 128-bit | 800 bytes |
| ML-KEM-768 | FIPS 203 | KEM | 192-bit | 1184 bytes |
| ML-KEM-1024 | FIPS 203 | KEM | 256-bit | 1568 bytes |
| ML-DSA-44 | FIPS 204 | Signature | 128-bit | 1312 bytes |
| ML-DSA-65 | FIPS 204 | Signature | 192-bit | 1952 bytes |
| ML-DSA-87 | FIPS 204 | Signature | 256-bit | 2592 bytes |
| SLH-DSA-SHA2-128s | FIPS 205 | Signature | 128-bit | 64 bytes |
/pqc/kem/generateGenerate an ML-KEM key pair (Kyber). Supports ML-KEM-512, ML-KEM-768, and ML-KEM-1024 per NIST FIPS 203.
/pqc/kem/encapsulateEncapsulate a shared secret using a recipient's ML-KEM public key. Returns ciphertext and shared secret.
/pqc/kem/decapsulateRecover the shared secret from a ciphertext using the ML-KEM private key.
/pqc/signSign a message using ML-DSA (CRYSTALS-Dilithium) or SLH-DSA (SPHINCS+). Returns a digital signature.
/pqc/verifyVerify a post-quantum digital signature against a message and public key.
/pqc/hybrid/encryptCombine ML-KEM key encapsulation with AES-256-GCM symmetric encryption for hybrid post-quantum encryption.
/pqc/scanAnalyze code for vulnerable classical cryptography (RSA, ECDSA, DH) and get migration recommendations.
Free tier includes 1,500 requests/month. No credit card required.
Get Free API Key on RapidAPI