Post Quantum Cryptography Reading Time: 5 minutes

How NIST’s New PQC Algorithms Impact You

The National Institute of Standards and Technology (NIST) has officially released the first three post-quantum cryptographic algorithms. The three algorithms are ML-KEM, ML-DSA, and SLH-DSA. Earlier, these algorithms were known as CRYSTALS-Kyber, CRYSTALS-Dilithium, and SPHINCS+. There is also a signature algorithm FN-DSA proposed to be issued as a draft standard at the end of the year, which was earlier known as Falcon.

We have recently received a lot of queries, including can an organization start implementing these PQC-safe algorithms? Are these the finalized algorithms? Are these the ultimate cryptographic algorithms that will secure our systems from a quantum attack?

The finalization of these algorithms means that organizations can now start implementing PQC-safe algorithms into their Public Key Infrastructure (PKI) to help ensure that systems that rely on secure digital identities and the exchange of encrypted data are safe from being broken by quantum computers.

Many organizations have already started developing strategies and roadmaps to migrate to PQC algorithms, and these PQC algorithm releases effectively create a starting point toward PQC readiness. But the truth is that organizations that are only just starting to think about migrating to the new standards are getting a late start in the race to secure the infrastructure that underpins their cryptographic assets.

Now, let’s talk a little more about the PQC Algorithms:

1. ML-KEM: FIPS 203 (Module-Lattice-based Key-Encapsulation Mechanism Standard)

ML-KEM provides a Key-Encapsulation Mechanism for sharing symmetric keys for general encryption. FIPS 203 states that it establishes a shared secret key (Symmetric key) between two users who communicate over a public network.

For more information, read In-Depth Overview of FIPS 203

2. ML-DSA: FIPS 204 (Module-Lattice-Based Digital Signature Standard)

ML-DSA is used to secure digital signatures. This standard outline specific details of algorithms used to generate and verify digital signatures, and “ML-DSA is considered secure, even against adversaries in possession of a large-scale quantum computer.”

The digital signature and the signed data are provided to the intended verifier. The verifying entity verifies the signature using the claimed signatory’s public key. Similar methods may be used to generate and verify signatures for stored and transmitted data.

For more information, read Understanding FIPS 204

3. SLH-DSA: FIPS 205  (Stateless Hash-Based Digital Signature Standard)

A stateless hash-based digital signature algorithm that is also used for data authentication and verification is described in FIPS 205.

For more information, read In-Depth Analysis of FIPS 205

TypeFIPS NameCurrent Specification NameInitial Specification Name
KEMFIPS-203ML-KEMCRYSTALS-Kyber
SignatureFIPS-204SLH-DSACRYSTALS-Dilithium
SignatureFIPS-205SLH-DSASphincs+
SignatureFIPS-206FN-DSAFALCON
Diagram 1. PQC algorithms

It’s Time to prepare for a Post Quantum World

Those who haven’t started preparing for PQC readiness must understand the recommended next steps for PQC readiness.

Strategy for Migration to PQC:

The migration strategy depends on many factors, such as compliance requirements, business requirements, the need to be aligned with industry best practices, and more. However, let’s talk about the key points that will help an organization for a successful migration to PQC

  • Build a comprehensive and ongoing cryptographic inventory or a Cryptographic Bill of Materials (CBOM) and scope the impact of PQC on existing identified systems.
  • Examine the organization’s application ecosystem and identify the legacy systems that cannot support PQC algorithms.
  • Replace or upgrade the identified legacy systems that cannot support PQC algorithms.
  • Prioritize crown jewels systems and data for PQC migration.
  • Select appropriate PQC algorithms for your environment’s needs.
  • Set up a lab environment to test the PQC algorithms.
  • Deploy and monitor
  • The best strategy to direct these phases with minimal trouble and maximum security can be achieved by becoming crypto-agile.

Know the PQC Timeline to Date:

PQC Timeline
Diagram 2. PQC Timeline

How can Encryption consulting help you prepare for a PQC world?

1. Quantum Threat Assessment

Our detailed Quantum Threat Assessment service utilizes advanced cryptographic discovery to analyze and secure your cryptographic infrastructure.

  • Evaluate the state of the cryptographic environment as it is, identify any gaps in the current standards and controls that are in place for cryptography (such as key lifecycle management and encryption methods), and do a thorough analysis of any possible threats to the cryptographic ecosystem.
  • We assess the effectiveness of existing governance protocols and frameworks and provide recommendations for optimizing operational processes related to cryptographic practices.
  • Identify and prioritize the crypto assets and data based on their sensitivity and criticality for the PQC migration.

2. Quantum Readiness Strategy and Roadmap

  • Identify PQC use cases that can be implemented within the organization’s network to protect sensitive information
  • Define and develop a strategy and implementation plan for PQC process and technology challenges.

3. Build Crypto-Agility

  • We assist in determining the cryptographic challenges, compromises, and threats for your organizations.
  • We support seamless migration to new CAs, certificates, and PQC algorithms.
  • We support automating certificates and key lifecycle management for stronger security and continuous compliance.

4. Compliance Enhancement

  • Ensure compliance enhancement with industry standards.
  • We help you stay updated with the new PQC algorithms and their usage and utilization for your organization.

5. Understanding Challenges and Providing Transition Support

  • Assist in acknowledging and overcoming challenges during the transition to post-quantum cryptographic algorithms, ensuring a smooth and secure migration.

6. Vendor Evaluation & POC (Proof of Concept)

  • Provide an overview of solution capabilities and vendor/product mapping to the identified use cases.
  • Document the test/ evaluation scenarios.

Conclusion

The Post-Quantum Cryptographic Advisory Services offered by Encryption Consulting LLC help clients overcome the cybersecurity obstacles brought on by quantum computing. We offer perspectives on possible quantum hazards, steer the shift towards quantum cyber-preparedness, and align to Post-Quantum Cryptography (PQC) guidelines suggested by top organizations such as NIST. We assist companies in evaluating and updating their cryptographic infrastructure, so they are ready for the quantum age through proactive cryptographic discovery and strategic planning.

Free Downloads

Datasheet of Encryption Consulting Services

Encryption Consulting is a customer focused cybersecurity firm that provides a multitude of services in all aspects of encryption for our clients.

Download

About the Author

Parnashree Saha is a cybersecurity professional passionate about data protection, including PKI, data encryption, key management, IAM, etc. She is currently working as an advisory services manager at Encryption Consulting LLC. With a specialized focus on public key infrastructure, data encryption, and key management, she is vital in guiding organizations toward robust encryption solutions tailored to customers' unique needs and challenges. Parnashree leverages her expertise to provide clients comprehensive advisory services to enhance their cybersecurity posture. From conducting thorough assessments to developing customized encryption strategies and implementing relevant data protection solutions, She is dedicated to assisting organizations in protecting their sensitive data from evolving threats.

Explore the full range of services offered by Encryption Consulting.

Feel free to schedule a demo to gain a comprehensive understanding of all the services Encryption Consulting provides.

Request a demo