Yes. Data encrypted today can be recorded and decrypted later once quantum computers mature (“harvest now, decrypt later”). Sensitive data is already at risk.
In addition, long-lived systems, such as industrial, automotive, medical, defense, and infrastructure, must be protected now. NIST and major security agencies plan to deprecate classical public-key cryptography around 2030 and disallow it by 2035.
PQC is standardized and production-ready. NIST has selected and standardized algorithms such as ML-KEM (key establishment) and ML-DSA (digital signatures), which are already being deployed in real systems.
ML-KEM and ML-DSA are post-quantum asymmetric cryptography primitives:
Together, they cover all public-key (asymmetric) cryptographic needs.
NIST-standardized PQC algorithms fall into different mathematical families, each with distinct implementation characteristics:
The most widely adopted family; efficient, well-analyzed, and suitable for embedded, edge, and data-center platforms.
FortifyIQ focuses on ML-KEM and ML-DSA as they provide the best balance of security, performance, and deployability.
Yes, for most systems.
Together, they cover secure communications, authentication, firmware signing, and secure boot chains.
Yes. AES-256 (encryption) and HMAC-SHA-512 (integrity and authenticity) are inherently quantum-safe.
PQC replaces classical public-key cryptography, not symmetric cryptography. Together, ML-KEM, ML-DSA, AES-256, and HMAC-SHA-512 form a complete, high-assurance, quantum-safe cryptographic stack.
No. PQC replaces RSA and ECC (public-key cryptography). Symmetric cryptography remains essential for data protection.
Yes, if not explicitly protected at all stages of the algorithms.
Academic research has repeatedly shown that:
As a result, a NIST-approved PQC algorithm can be completely broken at the implementation level.
FortifyIQ’s PQC libraries are designed specifically to address these weaknesses, including stages not covered by other implementations to the best of our knowledge.
Yes.
Unlike symmetric cryptography, PQC is used during key exchange, authentication, or signature verification. It is not part of the high-throughput data path.
As a result, high-assurance software PQC is reasonable even for data centers and high-end systems, until a protected hardware PQC implementation is integrated and deployed.
The real advantages of hardware are:
FortifyIQ software PQC already provides high-assurance FI resistance, while hardware is available when the highest protection level is required.
PQC requires more memory than classical public-key cryptography due to larger keys, polynomial arithmetic, and intermediate buffers.
Despite this, FortifyIQ’s library stack is designed to use very minimal RAM, enabling deployment even on area-constrained devices. Actual figures depend on configuration and will be provided under NDA.
No, they do not.
FortifyIQ’s PQC software:
When hardware security is available, FortifyIQ’s hardware IP integrates seamlessly using a unified software ↔ hardware API.
FortifyIQ provides tailored cryptographic solutions optimized per device and use case, including tunable:
Each product is configured to meet exact system constraints and certification requirements.
Ask us!