Loading...
Loading...
Apple released a detailed blueprint showing how it applied formal verification to its corecrypto library while adding post-quantum algorithms (ML-KEM and ML-DSA). The company open-sourced implementations, verification libraries, and proofs demonstrating conformance with FIPS 203/204, aiming to ensure mathematical correctness, prevent implementation bugs, and meet stringent constraints for security, performance, and device-specific optimization. By publishing proofs and code for scrutiny, Apple seeks independent review and higher assurance for cryptography running on billions of devices, signaling an industry push toward formally verified, quantum-resistant cryptographic primitives in production systems.
Apple's open-source formal verification of corecrypto demonstrates a practical path to mathematically proven, post-quantum cryptography in consumer devices, raising assurance for security-sensitive systems. Tech professionals should understand this shift as it influences cryptographic implementation standards, review practices, and device-level security expectations.
Dossier last updated: 2026-05-22 23:04:11
Apple published its corecrypto implementations of quantum-resistant ML-KEM and ML-DSA and released the formal verification libraries and tools used to prove their mathematical correctness to FIPS 203/204. The move supports Apple’s 2024 rollout of post-quantum encryption across iMessage, VPN, TLS, and CryptoKit APIs, and aims to ensure correctness, security, and performance on over 2.5 billion devices. Apple says it chose ML-KEM and ML-DSA after evaluating security, practical implementability, performance, and compactness, and then applied rigorous formal verification to ensure implementations match standards and avoid vulnerabilities (including timing leaks). The artifacts are available for independent expert review to raise assurance for widely deployed production cryptography.
&#32; submitted by &#32; <a href="https://www.reddit.com/user/mttd"> /u/mttd </a> <br/> <span><a href="https://security.apple.com/blog/formal-verification-corecrypto/">[link]</a></span> &#32; <span><a href="https://www.reddit.com/r/programming/comments/1tkxgmb/a_blueprint_for_formal_verification_of_apple/">[comments]</a></span>
Apple published its corecrypto implementations of post-quantum ML-KEM and ML-DSA and—critically—released the formal verification libraries and proofs that show those implementations conform to FIPS 203 and FIPS 204. The company says corecrypto runs on over 2.5 billion devices and that adding quantum-secure algorithms required meeting strict criteria for security, performance, compact parameters, and implementability. Apple emphasizes that implementations must be secure, optimized for device silicon, and formally correct, so it developed rigorous formal verification methods to prove mathematical correctness and prevent implementation bugs. By open-sourcing code and proofs, Apple invites independent expert review and aims to raise assurance for widely deployed cryptographic software.
A blueprint for formal verification of Apple corecrypto