Post-quantum cryptographic solutions refers to a range of public-key cryptographic solutions that are considered secure in the quantum setting. Many of these algorithms are currently going through a standardization process being held by the National Institute for Standards and Technology (NIST). A few other institutions like the European Telecommunications Standards Institute (ETSI) and the Internet Engineering Task Force (IETF) are also developing their own standards, but the majority of the focus is on NIST’s post-quantum standardization process (NIST PQS). This process was officially announced in late 2016 and has recently came to a final stage with some winners and alternate algorithms that at PQSecure we proudly developed side-channel resistant IPs for them.

Post-Quantum Public Key Exchange

Post-quantum public key exchange refers to a set of algorithms designed to create a shared secret key over a public (unsecure) network, which are perceived to be quantum-safe. The NIST PQS process is currently standardizing some of these algorithms. The mathematical categories of these algorithms include isogeny-based, lattice-based, and code-based. There are pros and cons to each of these and thus NIST is expected to standardize more than one algorithm before the process is complete. PQSecure is working with each of these algorithms to develop high quality solutions once the standards are announced.

Post-Quantum Digital Signatures

Post-quantum digital signature algorithms are designed to not only verify the sender of the information, but also to validate the contents have not been changed, all while being quantum-safe. There are a few examples of post-quantum digital signatures that are already standardized (XMSS and LMS NIST FIPS 186), but the NIST PQS process hopes to standardize a few more of these algorithms to offer a wider range of possible solutions.

Post-Quantum Solutions

PQSecure offers a broad set of hardware IP cores that implement both post-quantum and classical cryptographic algorithms, aligned with NIST standards and CNSA 2.0 recommendations. These IPs are designed with configurable security and performance options, enabling seamless integration into ASICs, FPGAs, and secure embedded systems. Each core is available with optional side-channel protections, and all certifiable components have passed ACVP validation where applicable. The following table summarizes the supported algorithms, core functions, standards, and unique security features.

Algorithms/Primitive Functionality Standard Features
ML-KEM + ML-DSA KeyGen, Encaps/Decaps, Sign/Verify NIST FIPS 203 & 204 Integrated Kyber + Dilithium cores, DPA-hardened, flexible profiles
ML-KEM (Kyber) KeyGen, Encapsulation, Decapsulation NIST FIPS 203 ML-KEM-512/768/1024, CCA-secure, masking & shuffling
ML-DSA (Dilithium) KeyGen, Sign, Verify NIST FIPS 204 ML-DSA-44/65/87, constant-time, threshold masking, DPA-safe
SLH-DSA (SPHINCS+) KeyGen, Sign, Verify NIST FIPS 205 Stateless, parameterizable, masking-supported
LMS / HSS KeyGen, Sign, Verify RFC 8554, CNSA 2.0, ACVP SP NIST 800-208 CNSA-recommended, ACVP certified, DPA-hardened
XMSS KeyGen, Sign, Verify RFC 8391 SP NIST 800-208 RFC-compliant, DPA-protected
Ascon KeyGen (sym.), AEAD Encrypt/Decrypt, Hash NIST SP 800-232 Lightweight AEAD and hashing algorithm standardized by NIST; includes masking and DPA resistance
Hybrid ECC + PQC KeyGen, Key Exchange, Sign, Verify CNSA 2.0 ECC + PQC integration, dual-mode, constant-time
AES-GCM / AES-CTR KeyGen (sym.), Encrypt/Decrypt FIPS 197, SP 800-38D Side-channel protected AES cores
SHA-2 Hash FIPS 180-4 Pipelined, constant-latency, timing-safe
SHA-3 Hash, SHAKE FIPS 202 Keccak core with domain separation
HMAC-SHA2 KeyGen, MAC FIPS 198-1 SHA2-based HMAC with masking
HMAC-SHA3 KeyGen, MAC SP 800-185 Domain-separated HMAC, DPA-safe
SP 800-90A DRBG (Hash, HMAC, CTR) Deterministic Random Bit Generation NIST SP 800-90A Rev.1 Hardware DRBG cores based on SHA2, HMAC, or AES; entropy reseeding and health tests included; DPA-resistant
SP 800-90B Conditioner (AES CBC-MAC) Entropy Conditioning / Whitening NIST SP 800-90B AES CBC-MAC-based conditioning for TRNG entropy sources; compliant with FIPS 140-3 health tests
TRNG Entropy Generation SP 800-90B/C, FIPS 140-3 Online testing, entropy conditioned (optional AES CBC-MAC module)
Trivium PRNG / Stream Cipher NIST SP 800-232 IPD Lightweight PRNG used for DPA randomness only (not for compliance-grade entropy)

PQSecure offers a wide range of hardware solutions and software solutions for every need from high-end servers to low-end embedded devices with side-channel countermeasures added by design.