FAQ: Our Post Quantum Cryptography (PQC)
Why Post-Quantum Cryptography Matters
Is post-quantum cryptography really needed today?
Yes. Data encrypted today can be recorded and decrypted later once quantum computers mature (“harvest now, decrypt later”). Sensitive data is already at risk.
In addition, long-lived systems, such as industrial, automotive, medical, defense, and infrastructure, must be protected now. NIST and major security agencies plan to deprecate classical public-key cryptography around 2030 and disallow it by 2035.
Is PQC standardized, or is it still experimental?
PQC is standardized and production-ready. NIST has selected and standardized algorithms such as ML-KEM (key establishment) and ML-DSA (digital signatures), which are already being deployed in real systems.
PQC Algorithms and Cryptographic Coverage
What are ML-KEM and ML-DSA?
ML-KEM and ML-DSA are post-quantum asymmetric cryptography primitives:
- ML-KEM (Key Encapsulation Mechanism) establishes shared secret keys
- ML-DSA (Digital Signature Algorithm) generates digital signatures
Together, they cover all public-key (asymmetric) cryptographic needs.
What types of post-quantum algorithms are standardized, and how do they differ?
NIST-standardized PQC algorithms fall into different mathematical families, each with distinct implementation characteristics:
- Lattice-based (ML-KEM, ML-DSA)
The most widely adopted family; efficient, well-analyzed, and suitable for embedded, edge, and data-center platforms.
- Hash-based ( SLH-DSA )
Very conservative security assumptions, but much larger signatures and higher computational cost.
FortifyIQ focuses on ML-KEM and ML-DSA as they provide the best balance of security, performance, and deployability.
Do ML-KEM and ML-DSA cover all public-key cryptography needs?
Yes, for most systems.
- ML-KEM replaces classical key exchange mechanisms (RSA, DH, ECDH)
- ML-DSA replaces classical digital signature schemes (RSA, ECDSA, EdDSA)
Together, they cover secure communications, authentication, firmware signing, and secure boot chains.
- ML-KEM + ML-DSA are sufficient for the vast majority of real-world deployments, although in certain applications, SLH-DSA may be preferred.
What about AES and HMAC? Are they post-quantum safe?
Yes. AES-256 (encryption) and HMAC-SHA-512 (integrity and authenticity) are inherently quantum-safe.
PQC replaces classical public-key cryptography, not symmetric cryptography. Together, ML-KEM, ML-DSA, AES-256, and HMAC-SHA-512 form a complete, high-assurance, quantum-safe cryptographic stack.
Does PQC replace classical cryptography like AES and HMAC?
No. PQC replaces RSA and ECC (public-key cryptography). Symmetric cryptography remains essential for data protection.
Implementation Security: SCA & FIA
Is PQC extremely vulnerable to side-channel attacks?
Yes, if not explicitly protected at all stages of the algorithms.
Academic research has repeatedly shown that:
- Secret keys can be recovered with as little as a single trace
- Attacks target polynomial arithmetic, sampling, and especially compression and decompression in ML-KEM and ML-DSA
- Even implementations using standard share-based masking often leave critical stages unprotected
As a result, a NIST-approved PQC algorithm can be completely broken at the implementation level.
FortifyIQ’s PQC libraries are designed specifically to address these weaknesses, including stages not covered by other implementations to the best of our knowledge.
How secure are FortifyIQ’s PQC libraries?
- In-house evaluation in simulation and on physical devices
- TVLA-based SCAtesting
- Third-party certification (in process)
Software vs Hardware PQC
Is PQC software usable for data centers and high-performance systems?
Yes.
Unlike symmetric cryptography, PQC is used during key exchange, authentication, or signature verification. It is not part of the high-throughput data path.
As a result, high-assurance software PQC is reasonable even for data centers and high-end systems, until a protected hardware PQC implementation is integrated and deployed.
What are the performance and power differences between PQC in software and hardware?
The real advantages of hardware are:
- Higher performance
- Lower energy per operation
- A higher level of fault-injection resistance for the most demanding threat models
FortifyIQ software PQC already provides high-assurance FI resistance, while hardware is available when the highest protection level is required.
What are the RAM requirements for PQC?
PQC requires more memory than classical public-key cryptography due to larger keys, polynomial arithmetic, and intermediate buffers.
Despite this, FortifyIQ’s library stack is designed to use very minimal RAM, enabling deployment even on area-constrained devices. Actual figures depend on configuration and will be provided under NDA.
Do PQC libraries require new hardware or secure elements?
No, they do not.
FortifyIQ’s PQC software:
- Runs on standard CPUs
- Enables PQC even on legacy platforms
When hardware security is available, FortifyIQ’s hardware IP integrates seamlessly using a unified software ↔ hardware API.
Migration, Agility, and Lifecycle
What is hybrid cryptography, and why is it needed?
Will PQC algorithms change in the future?
Can I start with PQC in software and migrate to hardware later?
- Identical APIs for software and hardware
- No application-level changes required
- Per-algorithm migration (PQC, ECC/RSA, AES, HMAC independently)
FortifyIQ Differentiation
What is a Security Boutique?
FortifyIQ provides tailored cryptographic solutions optimized per device and use case, including tunable:
- Power
- Performance
- Memory
- Security level
Each product is configured to meet exact system constraints and certification requirements.
Are your solutions quantum-ready and compatible with Caliptra?
- Greater compactness
- Flexibility in PPA trade-offs
- Tailored Roots of Trust optimized per device
What is FortifyIQ’s key advantage in PQC?
- Certifiable, high-assurance PQC in software and hardware
- Proven SCA and FIA resistance
- Outstanding power, performance, and area efficiency
- A single unified API across software and hardware
Still Have Questions?
Ask us!