Cloud native EDA tools & pre-optimized hardware platforms
As technological advancements surge forward, the specter of quantum computing looms ever larger. While the promise of quantum computers holds the potential to revolutionize fields like weather forecasting, drug discovery, and fundamental physics, it also harbors a significant threat to our current cryptographic systems. The risk is not just a future concern; any sensitive data intercepted today could be stored and decrypted later when quantum computers become powerful enough. This "harvest now, decrypt later" strategy poses a severe risk to the confidentiality and integrity of our digital communications, medical records, financial transactions, and even national security.
Quantum computers leverage the principles of quantum mechanics to perform certain types of calculations at unprecedented speeds. Two quantum algorithms pose a direct threat to today's deployed cryptography: Grover's algorithm and Shor's algorithm.
Recognizing the urgent need for quantum-resistant cryptographic algorithms, the U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) has been at the forefront of catalyzing the development of post-quantum cryptography (PQC) standards. For this purpose, they have organized a competition to select the best PQC algorithms. On August 13, 2024, NIST announced the finalization of its first set of these algorithms designed to withstand cyberattacks from quantum computers. This milestone marks the culmination of an eight-year effort, rallying the global cryptography community to develop and evaluate algorithms that can protect the security of our digital future.
NIST’s finalized standards include three primary algorithms, each designed for specific applications in key encapsulation and digital signatures. These algorithms are:
Out of these three, ML-KEM and ML-DSA are expected to be the most deployed algorithms. NIST is also expected to publish the draft standard of the FN-DSA (FIPS 206), which is based on the Falcon algorithm, in late 2024. This digital signature algorithm leverages structured lattices.
Back in 2020, NIST also released the standard SP 800-208, which references the quantum-resistant stateful hash-based signature schemes Leighton-Micali Signature (LMS) system and eXtended Merkle Signature Scheme (XMSS). Both LMS and XMSS rely on the Merkle tree structure, which provides a secure and efficient way to manage and verify many signatures. The LMS system uses a basic Merkle tree, while XMSS incorporates more additional features. This causes the performance of these systems to differ depending on use case, ultimately influencing which system is more suitable for a given application.
NIST continues to evaluate additional algorithms to ensure a diversified and secure cryptographic landscape. It has already started a fourth round of its standardization efforts, in which an additional set of key encapsulation algorithms is undergoing evaluation with the intent to find more algorithms to complement the set of currently standardized algorithms. The fourth round will likely select one or two algorithms, for which a public draft is expected to be published in 2025. Key encapsulation algorithms selected for the fourth round evaluation include Classic McEliece, BIKE, and HQC.
In September 2022, NIST also started another standardization round for additional PQC digital signature schemes. Here NIST is primarily interested in additional general-purpose algorithms that are not based on structured lattices. Other interests include algorithms using short signatures and fast verification. Any lattice signature would need to significantly outperform ML-DSA and FN-DSA and/or ensure substantial additional security properties. Recently, NIST has selected 14 new digital signature algorithms to advance to the second round of the standardization process, including: CROSS, FAEST, HAWK, LESS, MAYO, Mirath, MQOM, PERK, QR-UOV, RYDE, SDitH, SNOVA, SQIsign and UOV. The second phase of evaluation is estimated to last 12 to 18 months.
In September 2022, the National Security Agency (NSA) announced of the Commercial National Security Algorithm (CNSA) suite, which also received an update of its in April 2024. CNSA is a set of cryptographic algorithms recommended by the NSA for protecting U.S. government National Security Systems (NSS) and information. The threat that quantum computing poses on cryptographic algorithms was addressed for the first time in version 2.0. Hence, all algorithms recommended in version 2.0 are NIST standardized and quantum resistant (QR), including AES, SHA, LMS, XMSS, and the recently released PQC standards ML-KEM and ML-DSA.
The NSA also uses CNSA to drive the timelines for adoption of PQC in NSS. The importance of this matter for the NSA shows from quotes like this from CNSA v2.0: “NSA expects the transition to QR algorithms for NSS to be complete by 2035 in line with NSM-10 [National Security Memorandum]. NSA urges vendors and NSS owners and operators to make every effort to meet this deadline. Where feasible, NSS owners and operators will be required to prefer CNSA 2.0 algorithms when configuring systems during the transition period. When appropriate, use of CNSA 2.0 algorithms will be mandatory in classes of commercial products within NSS, while reserving the option to allow other algorithms in specialized use cases.”
Clearly, the need for quantum-resistant cryptographic solutions to protect today's data and systems into the future is becoming increasingly pressing.
草榴社区 has a broad security IP portfolio from cryptographic cores, PUF IP, to pre-built embedded hardware secure modules with root of trust. The TRNGs, PUF IPs, symmetric and hash cores are already quantum resistant. For asymmetric IP required for public key infrastructure security, 草榴社区 has introduced new Agile PQC Public Key Accelerators (PKAs), compliant with the NIST-approved PQC algorithms ML-KEM, ML-DSA, SLH-DSA, LMS, XMSS, and designed to defend against quantum computing threats across various applications, from edge to the cloud.
One of the most important features of the 草榴社区 quantum-resistant PKAs is that they are adaptable, incorporating hardware and embedded firmware for performance and flexibility in algorithm updates. This is important because PQC standards will keep evolving. Hence, systems deployed in the field must be able to deal with updates and patches to make sure they remain quantum resistant over time.
草榴社区 Agile PQC PKA System Level Diagram
Besides PQC, the PKAs also support traditional ECC and RSA algorithms, ensuring broad cryptographic coverage now and in the future, including hybrid mode support. Being highly configurable and scalable, the IP can be optimized for performance, area, power, and latency.
草榴社区 Agile PQC PKAs support full PQC digital signatures, key encapsulation and generation functions, with FIPS 140-3 certification support, secure key interfaces, and optional countermeasures against side-channel and fault injection attacks. With 草榴社区 Agile PQC PKAs, designers can protect sensitive data and systems against future quantum threats, ensuring long-term security for government, enterprises, and consumers.
The quantum threat is not a distant possibility but a looming reality. Organizations must act now to protect their sensitive data and secure their digital futures. As NIST's finalized post-quantum cryptography standards are ready for immediate use, there is no time to waste.
The advent of quantum computing presents both incredible opportunities and significant challenges. While the potential to solve complex problems is immense, the threat to current cryptographic systems cannot be ignored. NIST's finalized PQC standards mark a critical step in safeguarding our digital future, and 草榴社区 is here to help you make the transition. Act now to protect your data and secure your organization's future in the quantum age.
For more information on how to integrate post-quantum cryptography into your systems, contact us today. Our experts are ready to help you navigate the complexities of PQC and ensure your data remains secure in the quantum era.