Yes. Data encrypted today can be recorded and decrypted later once quantum computers mature (“harvest now, decrypt later”). Sensitive data is already at risk.
In addition, long-lived systems, such as industrial, automotive, medical, defense, and infrastructure, must be protected now. NIST and major security agencies plan to deprecate classical public-key cryptography around 2030 and disallow it by 2035.
PQC is standardized and production-ready. NIST has selected and standardized algorithms such as ML-KEM (key establishment) and ML-DSA (digital signatures), which are already being deployed in real systems.
FortifyIQ supports a broad set of NIST-standardized and widely adopted post-quantum algorithms, available in both hardened software and hardware implementations.
Our current PQC portfolio includes:
ML-KEM (key establishment)
ML-DSA (digital signatures)
SLH-DSA (hash-based signatures)
XMSS and XMSS-MT (stateful hash-based signatures)
LMS and LMS/HSS (stateful hash-based signatures)
All supported algorithms are implemented using inherently side-channel and fault-injection resistant designs, protecting all algorithm stages, not just the core arithmetic.
Most PQC offerings focus on algorithm availability. FortifyIQ focuses on real-world security and long-term deployability:
Hardened software and hardware
Each algorithm is available in both software and hardware, protected using the same algorithmic SCA/FIA-resistant paradigm.
Software-first, hardware-ready
Systems can deploy PQC immediately in software and later migrate to hardware acceleration without changing APIs or the application stack.
True crypto-agility
Algorithms, parameter sets, and their protections are designed to be OTA/FOTA-updatable, enabling adaptation to:
New cryptanalytic results
Emerging side-channel or fault attacks
Evolving standards and profiles
Configurable for real systems
Implementations are tunable for performance, power, and memory footprint, enabling deployment from constrained devices to data-center-class systems.
Different systems have different constraints:
ML-DSA for general-purpose, high-performance PQC signatures
SLH-DSA for conservative, hash-based security
XMSS / LMS families for environments requiring long-term cryptographic assurance and well-understood security assumptions
Yes. AES-256 (encryption) and HMAC-SHA-512 (integrity and authenticity) are inherently quantum-safe.
PQC replaces classical public-key cryptography, not symmetric cryptography. Together, PQC, AES-256, and HMAC-SHA-512 form a complete, high-assurance, quantum-safe cryptographic stack.
No. PQC replaces RSA and ECC (public-key cryptography). Symmetric cryptography remains essential for data protection.
Yes, if not explicitly protected at all stages of the algorithms.
Academic research has repeatedly shown that:
As a result, a NIST-approved PQC algorithm can be completely broken at the implementation level.
FortifyIQ’s PQC libraries are designed specifically to address these weaknesses, including stages not covered by other implementations to the best of our knowledge.
Yes.
Unlike symmetric cryptography, PQC is used during key exchange, authentication, or signature verification. It is not part of the high-throughput data path.
As a result, high-assurance software PQC is reasonable even for data centers and high-end systems, until a protected hardware PQC implementation is integrated and deployed.
The real advantages of hardware are:
FortifyIQ software PQC already provides high-assurance FI resistance, while hardware is available when the highest protection level is required.
PQC requires more memory than classical public-key cryptography due to larger keys, polynomial arithmetic, and intermediate buffers.
Despite this, FortifyIQ’s library stack is designed to use very minimal RAM, enabling deployment even on area-constrained devices. Actual figures depend on configuration and will be provided under NDA.
No, they do not.
FortifyIQ’s PQC software:
When hardware security is available, FortifyIQ’s hardware IP integrates seamlessly using a unified software ↔ hardware API.
Hybrid cryptography combines classical (RSA/ECC) and post-quantum algorithms.
During the transition to PQC, one device may support PQC while the other is still legacy. Hybrid solutions ensure secure communication across this transition.
FortifyIQ provides hybrid IP cores and libraries combining classical crypto, PQC, AES, and HMAC or any subset of the above, all with SCA/FIA protection.
FortifyIQ provides tailored cryptographic solutions optimized per device and use case, including tunable:
Each product is configured to meet exact system constraints and certification requirements.
Ask us!