- Products
- Learn
- Local User Groups
- Partners
- More
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Improve Your Security Posture with
Threat Prevention and Policy Insights
Overlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hello, everyone!
I have seen that one of the new features of R82 is that it now supports ML-KEM (Kyber768) encryption (Post-Quantum Cryptography ), which basically adds an additional layer to traditional VPN encryption.
The documentation explains the changes in accordance with IKEv2 Intermediate Exchange (RFC-9242) and IKEv2 Multiple Key Exchanges (RFC-9370).
However, I still have some questions.
Greetings!!
Yes, I know this came from AI, but I find it useful.
************************************
R82 implements ML-KEM (Kyber-768) inside the IKEv2 key exchange using the IETF extensions that allow either an “intermediate exchange” for large KEM payloads (RFC-9242) and/or multiple key exchanges in a single SA (RFC-9370). That lets the IKEv2 SA derive shared secrets from both a classical DH and one or more PQC KEMs (hybrid). Checkpoint+2RFC Editor+2
Practically: during IKEv2 negotiation the gateways perform additional KEM rounds (Kyber) and combine those secrets with the classical secret to form the SA keys; this can be done so that traffic remains protected even if future quantum computers break classical DH. Checkpoint+1
Future-proofing / harvest-now-decrypt-later protection — packets captured today cannot necessarily be decrypted in the future once large quantum computers exist, because the key exchange includes a quantum-resistant component.
Defense-in-depth — hybrid exchanges (classical + PQC) keep compatibility while adding extra security.
Standards-based interoperability — using the IETF RFCs means other vendors adopting the same RFCs can interoperate. Checkpoint+1
Stronger long-term secrecy for data with long confidentiality requirements.
No immediate change to symmetric ciphers (you keep AES/etc.), only the key-agreement part changes — so performance hit is mostly in the handshake, not per-packet crypto (except for slightly larger keys/IVs if you choose certain modes).
Hybrid mode lets you keep the classical protections you trust while adding PQC safety. Checkpoint+1
To actually use Kyber for the key exchange both peers need to support the same PQC exchange (i.e., an implementation of ML-KEM / the IKEv2 extensions). If the peer does not support PQC, the IKE negotiation will fall back to classical algorithms (unless you force PQC-only and it fails). So: yes — to actively negotiate PQC you need the peer to understand the PQC extension. Checkpoint+1
Many major vendors are already adding PQC support or hybrid modes (Fortinet, Palo Alto, Cisco have public material and features for PQC/hybrid IKEv2). That means cross-vendor PQC VPNs are possible if both sides implement the same RFCs / algorithm sets (common examples: Kyber ML-KEM, RFC-9370 / RFC-9242 / RFC-8784 for related mixing). Check each vendor’s PQC docs for the exact RFCs and parameter sets they support (Kyber-768 is the common NIST-selected KEM level being used). Fortinet Documentation+2Live Community+2
As of Check Point’s published R82 feature set, R82 Quantum/Quantum Firewall Software supports Kyber (ML-KEM-768) for VPNs. For the Quantum Spark (SMB) line: the public roadmap pages and Spark FAQ show many R82 features coming to Spark, but I can’t find a specific, public statement that Quantum Spark already supports PQC right now — the Spark roadmap mentions many items but not explicit Kyber/PQC support. Because Spark has a separate feature cadence and hardware constraints, you should check the Spark release notes / SK articles or open a ticket with Check Point to confirm whether your exact Spark model/firmware build includes ML-KEM support. (Spark roadmap page does not list PQC explicitly as shipped at the time of the R82 announcement.) Check Point Software+2Checkpoint+2
Yes — the peer must support the PQC KEM and the IKEv2 extensions (or an interoperable RFC like RFC-9370 / RFC-9242 / RFC-8784) to complete the PQC key exchange. If the other side does not support PQC, you will either (a) fall back to classical key exchange, or (b) fail negotiation if you require PQC-only. Many vendors already provide hybrid options (classical+PQC) to allow a gradual migration. IETF Datatracker+1
Short answer: Yes — expect more CPU work (mainly at IKE handshakes/rekeys) and larger handshake packets; but the persistent per-packet symmetric crypto cost stays about the same. Test and size accordingly.
Details and guidance:
Handshake cost: Kyber operations add CPU cycles to IKE handshakes and rekeys. Studies and benchmarks show Kyber is much faster than RSA and is reasonably efficient on modern CPUs, but it still requires more CPU than Elliptic Curve DH because of larger poly arithmetic. In practice the cost is concentrated on the initial/rekey exchanges, not steady-state per-packet AES encryption. arXiv+1
Memory / packet size: Kyber keys and ciphertexts are larger (Kyber-768 public key/ciphertext sizes are on the order of ≈1 KB). That can push IKE messages past typical MTU and require fragmentation or the intermediate exchange (RFC-9242). Expect a small increase in memory for the crypto operation state. asecuritysite.com+1
Throughput impact: For long-lived tunnels that rekey infrequently, steady-state throughput is usually not heavily affected because symmetric crypto still does the per-packet work. The main effects are (a) slightly longer IKE/REKEY times and (b) slightly larger control plane traffic. Studies caution that in high-rate rekey scenarios or very short-lived SAs there can be measurable throughput/latency differences. repositorio.ipv.pt+1
Recommended approach / models
Use production Quantum/Quantum-class appliances running R82 or later for the Check Point side — those are the platforms the PQC feature was released for. If you have high throughput (multi-Gbps) VPN aggregation, choose Check Point models sized for high VPN crypto workloads (modern multi-core CPUs). Check Point’s R82 release notes and product pages advertise the feature for Quantum firewall software; for exact appliance-level recommendations check the appliance datasheets or TAC. Checkpoint+1
If you have hardware crypto offload (IPsec accelerators), confirm whether vendors will offload Kyber — many current HW accelerators were built for classical DH/RSA/ECDH and may not accelerate lattice ops, so software CPU will be used for the PQC KEM unless an accelerator supports it. That argues for picking gateways with strong general-purpose CPU performance. Reddit+1
Lab test: before enabling PQC in production, test with real traffic patterns (rekey frequency, tunnel counts) to measure the IKE-CPU load and check if IKE messages fragment on your links (MTU). This is the most important practical step.
Not exactly sure how PQC “works” at a technical level.
Different encryption methods do impact performance, however that varies on a number of factors.
Not sure what impact PQC has specifically.
We only support the relevant algorithms in R82 and, for it to be used, all gateways in the community (third party or otherwise) must support it.
I presume Quantum Spark appliances with R82 will support PQC in the future.
However, I do not know the specific timeline.
Yes, I know this came from AI, but I find it useful.
************************************
R82 implements ML-KEM (Kyber-768) inside the IKEv2 key exchange using the IETF extensions that allow either an “intermediate exchange” for large KEM payloads (RFC-9242) and/or multiple key exchanges in a single SA (RFC-9370). That lets the IKEv2 SA derive shared secrets from both a classical DH and one or more PQC KEMs (hybrid). Checkpoint+2RFC Editor+2
Practically: during IKEv2 negotiation the gateways perform additional KEM rounds (Kyber) and combine those secrets with the classical secret to form the SA keys; this can be done so that traffic remains protected even if future quantum computers break classical DH. Checkpoint+1
Future-proofing / harvest-now-decrypt-later protection — packets captured today cannot necessarily be decrypted in the future once large quantum computers exist, because the key exchange includes a quantum-resistant component.
Defense-in-depth — hybrid exchanges (classical + PQC) keep compatibility while adding extra security.
Standards-based interoperability — using the IETF RFCs means other vendors adopting the same RFCs can interoperate. Checkpoint+1
Stronger long-term secrecy for data with long confidentiality requirements.
No immediate change to symmetric ciphers (you keep AES/etc.), only the key-agreement part changes — so performance hit is mostly in the handshake, not per-packet crypto (except for slightly larger keys/IVs if you choose certain modes).
Hybrid mode lets you keep the classical protections you trust while adding PQC safety. Checkpoint+1
To actually use Kyber for the key exchange both peers need to support the same PQC exchange (i.e., an implementation of ML-KEM / the IKEv2 extensions). If the peer does not support PQC, the IKE negotiation will fall back to classical algorithms (unless you force PQC-only and it fails). So: yes — to actively negotiate PQC you need the peer to understand the PQC extension. Checkpoint+1
Many major vendors are already adding PQC support or hybrid modes (Fortinet, Palo Alto, Cisco have public material and features for PQC/hybrid IKEv2). That means cross-vendor PQC VPNs are possible if both sides implement the same RFCs / algorithm sets (common examples: Kyber ML-KEM, RFC-9370 / RFC-9242 / RFC-8784 for related mixing). Check each vendor’s PQC docs for the exact RFCs and parameter sets they support (Kyber-768 is the common NIST-selected KEM level being used). Fortinet Documentation+2Live Community+2
As of Check Point’s published R82 feature set, R82 Quantum/Quantum Firewall Software supports Kyber (ML-KEM-768) for VPNs. For the Quantum Spark (SMB) line: the public roadmap pages and Spark FAQ show many R82 features coming to Spark, but I can’t find a specific, public statement that Quantum Spark already supports PQC right now — the Spark roadmap mentions many items but not explicit Kyber/PQC support. Because Spark has a separate feature cadence and hardware constraints, you should check the Spark release notes / SK articles or open a ticket with Check Point to confirm whether your exact Spark model/firmware build includes ML-KEM support. (Spark roadmap page does not list PQC explicitly as shipped at the time of the R82 announcement.) Check Point Software+2Checkpoint+2
Yes — the peer must support the PQC KEM and the IKEv2 extensions (or an interoperable RFC like RFC-9370 / RFC-9242 / RFC-8784) to complete the PQC key exchange. If the other side does not support PQC, you will either (a) fall back to classical key exchange, or (b) fail negotiation if you require PQC-only. Many vendors already provide hybrid options (classical+PQC) to allow a gradual migration. IETF Datatracker+1
Short answer: Yes — expect more CPU work (mainly at IKE handshakes/rekeys) and larger handshake packets; but the persistent per-packet symmetric crypto cost stays about the same. Test and size accordingly.
Details and guidance:
Handshake cost: Kyber operations add CPU cycles to IKE handshakes and rekeys. Studies and benchmarks show Kyber is much faster than RSA and is reasonably efficient on modern CPUs, but it still requires more CPU than Elliptic Curve DH because of larger poly arithmetic. In practice the cost is concentrated on the initial/rekey exchanges, not steady-state per-packet AES encryption. arXiv+1
Memory / packet size: Kyber keys and ciphertexts are larger (Kyber-768 public key/ciphertext sizes are on the order of ≈1 KB). That can push IKE messages past typical MTU and require fragmentation or the intermediate exchange (RFC-9242). Expect a small increase in memory for the crypto operation state. asecuritysite.com+1
Throughput impact: For long-lived tunnels that rekey infrequently, steady-state throughput is usually not heavily affected because symmetric crypto still does the per-packet work. The main effects are (a) slightly longer IKE/REKEY times and (b) slightly larger control plane traffic. Studies caution that in high-rate rekey scenarios or very short-lived SAs there can be measurable throughput/latency differences. repositorio.ipv.pt+1
Recommended approach / models
Use production Quantum/Quantum-class appliances running R82 or later for the Check Point side — those are the platforms the PQC feature was released for. If you have high throughput (multi-Gbps) VPN aggregation, choose Check Point models sized for high VPN crypto workloads (modern multi-core CPUs). Check Point’s R82 release notes and product pages advertise the feature for Quantum firewall software; for exact appliance-level recommendations check the appliance datasheets or TAC. Checkpoint+1
If you have hardware crypto offload (IPsec accelerators), confirm whether vendors will offload Kyber — many current HW accelerators were built for classical DH/RSA/ECDH and may not accelerate lattice ops, so software CPU will be used for the PQC KEM unless an accelerator supports it. That argues for picking gateways with strong general-purpose CPU performance. Reddit+1
Lab test: before enabling PQC in production, test with real traffic patterns (rekey frequency, tunnel counts) to measure the IKE-CPU load and check if IKE messages fragment on your links (MTU). This is the most important practical step.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 26 | |
| 19 | |
| 10 | |
| 8 | |
| 6 | |
| 6 | |
| 5 | |
| 5 | |
| 5 | |
| 4 |
Wed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY