Hubbry Logo
search
search button
Sign in
Historyarrow-down
starMorearrow-down
Hubbry Logo
search
search button
Sign in
NIST Post-Quantum Cryptography Standardization
Community hub for the Wikipedia article
logoWikipedian hub
Welcome to the community hub built on top of the NIST Post-Quantum Cryptography Standardization Wikipedia article. Here, you can discuss, collect, and organize anything related to NIST Post-Quantum Cryptography Standardization. The purpose of the hub is to connect people, foster deeper knowledge, and help improve the root Wikipedia article.
Add your contribution
Inside this hub
NIST Post-Quantum Cryptography Standardization

Post-Quantum Cryptography Standardization[1] is a program and competition by NIST to update their standards to include post-quantum cryptography.[2] It was announced at PQCrypto 2016.[3] twenty-three signature schemes and fifty-nine encryption/KEM schemes were submitted by the initial submission deadline at the end of 2017[4] of which sixty-nine total were deemed complete and proper and participated in the first round. Seven of these, of which three are signature schemes, advanced to the third round, which was announced in July 2020.[5]

On August 13, 2024, NIST released final versions of the first three Post Quantum Crypto Standards: FIPS 203, FIPS 204, and FIPS 205.[6]

Background

[edit]

Academic research on the potential impact of quantum computing dates back to at least 2001.[7] A NIST published report from April 2016 cites experts that acknowledge the possibility of quantum technology to render the commonly used RSA algorithm insecure by 2030.[8] As a result, a need to standardize quantum-secure cryptographic primitives was pursued. Since most symmetric primitives are relatively easy to modify in a way that makes them quantum resistant, efforts have focused on public-key cryptography, namely digital signatures and key encapsulation mechanisms. In December 2016 NIST initiated a standardization process by announcing a call for proposals.[9]

Round one

[edit]

Under consideration were:[10]
(strikethrough means it had been withdrawn)

Type PKE/KEM Signature Signature & PKE/KEM
Lattice
  • Compact LWE
  • CRYSTALS-Kyber
  • Ding Key Exchange
  • EMBLEM and R.EMBLEM
  • FrodoKEM
  • HILA5 (withdrawn and merged into Round5)
  • KCL (pka OKCN/AKCN/CNKE)
  • KINDI
  • LAC
  • LIMA
  • Lizard
  • LOTUS
  • NewHope
  • NTRUEncrypt[11]
  • NTRU-HRSS-KEM
  • NTRU Prime
  • Odd Manhattan
  • Round2 (withdrawn and merged into Round5)
  • Round5 (merger of Round2 and Hila5, announced 4 August 2018)[12]
  • SABER
  • Three Bears
  • Titanium
Code-based
  • BIG QUAKE
  • BIKE
  • Classic McEliece + NTS-KEM
  • DAGS
  • Edon-K
  • HQC
  • LAKE (withdrawn and merged into ROLLO)
  • LEDAkem
  • LEDApkc
  • Lepton
  • LOCKER (withdrawn and merged into ROLLO)
  • McNie
  • NTS-KEM
  • ROLLO (merger of Ouroboros-R, LAKE and LOCKER) [15]
  • Ouroboros-R (withdrawn and merged into ROLLO)
  • QC-MDPC KEM
  • Ramstake
  • RLCE-KEM
  • RQC
  • pqsigRM
  • RaCoSS
  • RankSign
Hash-based
Multivariate
  • CFPKM
  • Giophantus
  • DualModeMS
  • GeMSS
  • Gui
  • HiMQ-3
  • LUOV
  • MQDSS
  • Rainbow
  • SRTPI
  • DME
Braid group
  • WalnutDSA
Supersingular elliptic curve isogeny
Satirical submission
Other
  • Guess Again
  • HK17
  • Mersenne-756839
  • RVB
  • Picnic

Round one submissions published attacks

[edit]
  • Guess Again by Lorenz Panny [18]
  • RVB by Lorenz Panny[19]
  • RaCoSS by Daniel J. Bernstein, Andreas Hülsing, Tanja Lange and Lorenz Panny[20]
  • HK17 by Daniel J. Bernstein and Tanja Lange[21]
  • SRTPI by Bo-Yin Yang[22]
  • WalnutDSA
    • by Ward Beullens and Simon R. Blackburn[23]
    • by Matvei Kotov, Anton Menshov and Alexander Ushakov[24]
  • DRS by Yang Yu and Léo Ducas [25]
  • DAGS by Elise Barelli and Alain Couvreur[26]
  • Edon-K by Matthieu Lequesne and Jean-Pierre Tillich[27]
  • RLCE by Alain Couvreur, Matthieu Lequesne, and Jean-Pierre Tillich[28]
  • Hila5 by Daniel J. Bernstein, Leon Groot Bruinderink, Tanja Lange and Lorenz Panny[29]
  • Giophantus by Ward Beullens, Wouter Castryck and Frederik Vercauteren[30]
  • RankSign by Thomas Debris-Alazard and Jean-Pierre Tillich [31]
  • McNie by Philippe Gaborit;[32] Terry Shue Chien Lau and Chik How Tan [33]

Round two

[edit]

Candidates moving on to the second round were announced on January 30, 2019. They are:[34]

Type PKE/KEM Signature
Lattice
Code-based
Hash-based
Multivariate
Supersingular elliptic curve isogeny
Zero-knowledge proofs

Round three

[edit]

On July 22, 2020, NIST announced seven finalists ("first track"), as well as eight alternate algorithms ("second track"). The first track contains the algorithms which appear to have the most promise, and will be considered for standardization at the end of the third round. Algorithms in the second track could still become part of the standard, after the third round ends.[54] NIST expects some of the alternate candidates to be considered in a fourth round. NIST also suggests it may re-open the signature category for new schemes proposals in the future.[55]

On June 7–9, 2021, NIST conducted the third PQC standardization conference, virtually.[56] The conference included candidates' updates and discussions on implementations, on performances, and on security issues of the candidates. A small amount of focus was spent on intellectual property concerns.

Finalists

[edit]
Type PKE/KEM Signature
Lattice
Code-based
Multivariate

Alternate candidates

[edit]
Type PKE/KEM Signature
Lattice
  • FrodoKEM
  • NTRU Prime
Code-based
Hash-based
Multivariate
  • GeMSS
Supersingular elliptic curve isogeny
Zero-knowledge proofs
  • Picnic

Intellectual property concerns

[edit]

After NIST's announcement regarding the finalists and the alternate candidates, various intellectual property concerns were voiced, notably surrounding lattice-based schemes such as Kyber and NewHope. NIST holds signed statements from submitting groups clearing any legal claims, but there is still a concern that third parties could raise claims. NIST claims that they will take such considerations into account while picking the winning algorithms.[57]

Round three submissions published attacks

[edit]
  • Rainbow: by Ward Beullens on a classical computer[58]

Adaptations

[edit]

During this round, some candidates have shown to be vulnerable to some attack vectors. It forces these candidates to adapt accordingly:

CRYSTAL-Kyber and SABER
may change the nested hashes used in their proposals in order for their security claims to hold.[59]
FALCON
side channel attack using electromagnetic measurements to extract the secret signing keys. A masking may be added in order to resist the attack. This adaptation affects performance and should be considered whilst standardizing.[60]

Selected Algorithms 2022

[edit]

On July 5, 2022, NIST announced the first group of winners from its six-year competition.[61][62]

Type PKE/KEM Signature
Lattice
Hash-based

Round four

[edit]

On July 5, 2022, NIST announced four candidates for PQC Standardization Round 4.[63]

Type PKE/KEM
Code-based
Supersingular elliptic curve isogeny

Round four submissions published attacks

[edit]
  • SIKE: by Wouter Castryck and Thomas Decru on a classical computer[65][66]

Selected Algorithm 2025

[edit]

On March 11, 2025, NIST announced the selection of a backup algorithm for KEM.[67]

Type PKE/KEM
Code-based

First release

[edit]

On August 13, 2024, NIST released final versions of its first three Post Quantum Crypto Standards.[6] According to the release announcement:

While there have been no substantive changes made to the standards since the draft versions, NIST has changed the algorithms’ names to specify the versions that appear in the three finalized standards, which are:

  • Federal Information Processing Standard (FIPS) 203, intended as the primary standard for general encryption. Among its advantages are comparatively small encryption keys that two parties can exchange easily, as well as its speed of operation. The standard is based on the CRYSTALS-Kyber algorithm, which has been renamed ML-KEM, short for Module-Lattice-Based Key-Encapsulation Mechanism.
  • FIPS 204, intended as the primary standard for protecting digital signatures. The standard uses the CRYSTALS-Dilithium algorithm, which has been renamed ML-DSA, short for Module-Lattice-Based Digital Signature Algorithm.
  • FIPS 205, also designed for digital signatures. The standard employs the SPHINCS+ algorithm, which has been renamed SLH-DSA, short for Stateless Hash-Based Digital Signature Algorithm. The standard is based on a different math approach than ML-DSA, and it is intended as a backup method in case ML-DSA proves vulnerable.
  • Similarly, when the draft FIPS 206 standard built around FALCON is released, the algorithm will be dubbed FN-DSA, short for FFT (fast-Fourier transform) over NTRU-Lattice-Based Digital Signature Algorithm.

On March 11, 2025 NIST released Hamming Quasi-Cyclic (HQC) as the fifth algorithm for post-quantum asymmetric encryption as used for key encapsulation / exchange.[67] The new algorithm is as a backup for ML-KEM, the main algorithm for general encryption. HQC is a code-based scheme using different math than ML-KEM, thus mitigating possible weaknesses should any be found in the lattice-based ML-KEM.[68] The draft standard incorporating the HQC algorithm is expected in early 2026 with the final in 2027.

Additional Digital Signature Schemes

[edit]

Round One

[edit]

NIST received 50 submissions and deemed 40 to be complete and proper according to the submission requirements.[69] Under consideration are:[70]
(strikethrough means it has been withdrawn)

Type Signature
Lattice
Code-based
MPC-in-the-Head
Multivariate
  • 3WISE ("the submitter agrees that the scheme is insecure, but prefers to not withdraw in the hope that studying the scheme will advance cryptanalysis"[88])
  • Biscuit[89]
  • DME-Sign ("Our first impression is that the attack works and we are checking the details of the attack .We are implementing a variant of the DME that may resist the attack but we have to verify it."[90])
  • HPPC
  • MAYO[91]
  • PROV[92]
  • QR-UOV[93]
  • SNOVA[94]
  • TUOV[95]
  • UOV[96]
  • VOX[97]
Supersingular elliptic curve isogeny
Symmetric-based
  • AIMer[99]
  • Ascon-Sign
  • FAEST[100]
  • SPHINCS-alpha
Other
  • ALTEQ[101]
  • eMLE-Sig 2.0
  • KAZ-SIGN
  • Preon
  • Xifrat1-Sign.I

Round one submissions published attacks

[edit]
  • 3WISE by Daniel Smith-Tone[88]
  • EagleSign by Mehdi Tibouchi[102]
  • KAZ-SIGN by Daniel J. Bernstein;[103] Scott Fluhrer[104]
  • Xifrat1-Sign.I by Lorenz Panny[105]
  • eMLE-Sig 2.0 by Mehdi Tibouchi[106] (implementation by Lorenz Panny[107])
  • HPPC by Ward Beullens;[108] Pierre Briaud, Maxime Bros, and Ray Perlner[109]
  • ALTEQ by Markku-Juhani O. Saarinen[110] (implementation only?)
  • Biscuit by Charles Bouillaguet[111]
  • MEDS by Markku-Juhani O. Saarinen and Ward Beullens[112] (implementation only)
  • FuLeeca by Felicitas Hörmann and Wessel van Woerden[113]
  • LESS by the LESS team (implementation only)[114]
  • DME-Sign by Markku-Juhani O. Saarinen[115] (implementation only?); Pierre Briaud, Maxime Bros, Ray Perlner, and Daniel Smith-Tone[116]
  • EHTv3 by Eamonn Postlethwaite and Wessel van Woerden;[117] Keegan Ryan and Adam Suhl[118]
  • Enhanced pqsigRM by Thomas Debris-Alazard, Pierre Loisel and Valentin Vasseur;[119] Pierre Briaud, Maxime Bros, Ray Perlner and Daniel Smith-Tone[120]
  • HAETAE by Markku-Juhani O. Saarinen[121] (implementation only?)
  • HuFu by Markku-Juhani O. Saarinen[122]
  • SDitH by Kevin Carrier and Jean-Pierre Tillich;[123] Kevin Carrier, Valérian Hatey, and Jean-Pierre Tillich[124]
  • VOX by Hiroki Furue and Yasuhiko Ikematsu[125]
  • AIMer by Fukang Liu, Mohammad Mahzoun, Morten Øygarden, Willi Meier[126]
  • SNOVA by Yasuhiko Ikematsu and Rika Akiyama[127]
  • PROV by Ludovic Perret, and River Moreira Ferreira[128] (implementation only)

Round Two

[edit]

NIST deemed 14 submissions to pass to the second round.[129]

Type Signature Technique(s) Used Hard Problem
Lattice HAWK[130] Hash-and-sign lattice problems
Code-based CROSS[131] Fiat–Shamir heuristic Syndrome Decoding Problem
LESS[132] Fiat–Shamir heuristic Linear Equivalence Problem
MPC-in-the-Head Mirath[133] (merge of MIRA and MiRitH) "in the head", Fiat–Shamir heuristic MinRank (matrix-based)
MQOM[134] "in the head", Fiat–Shamir heuristic Multivariable Quadratic Problem
PERK[135] "in the head", Fiat–Shamir heuristic Permuted Kernel Problem (matrix-based)
RYDE[136] "in the head", Fiat–Shamir heuristic Rank Syndrome Decoding Problem (code-based)
SDitH[137] "in the head", Fiat–Shamir heuristic Syndrome Decoding Problem (code-based)
Multivariate MAYO[138] Unbalanced Oil and Vinegar Multivariable Quadratic Problem
QR-UOV[139] Unbalanced Oil and Vinegar Multivariable Quadratic Problem
SNOVA[140] Unbalanced Oil and Vinegar Multivariable Quadratic Problem
UOV[141] Unbalanced Oil and Vinegar Multivariable Quadratic Problem
Supersingular elliptic curve isogeny SQIsign[142] Fiat–Shamir heuristic Endomorphism Ring Problem
Symmetric-based FAEST[143] "in the head", Fiat–Shamir heuristic breaking AES

See also

[edit]

References

[edit]
[edit]
Add your contribution
Related Hubs