• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Microcontroller Tips

Microcontroller engineering resources, new microcontroller products and electronics engineering news

  • Products
    • 8-bit
    • 16-bit
    • 32-bit
    • 64-bit
  • Applications
    • 5G
    • Automotive
    • Connectivity
    • Consumer Electronics
    • EV Engineering
    • Industrial
    • IoT
    • Medical
    • Security
    • Telecommunications
    • Wearables
    • Wireless
  • Learn
    • eBooks / Tech Tips
    • EE Training Days
    • FAQs
    • Learning Center
    • Tech Toolboxes
    • Webinars/Digital Events
  • Resources
    • Design Guide Library
    • DesignFast
    • LEAP Awards
    • Podcasts
    • White Papers
  • Videos
    • EE Videos & Interviews
    • Teardown Videos
  • EE Forums
    • EDABoard.com
    • Electro-Tech-Online.com
  • Engineering Training Days
  • Advertise
  • Subscribe

Post-quantum crypto standardization — background

October 4, 2023 By Jeff Shepard

At some point in the not-too-distant future, it’s expected that quantum computing will pose a security risk to all currently used encryption techniques. Most current encryption methods are based on the challenges associated with factoring large numbers into their prime factors. They provide good levels of security when classical computers are being used. Still, quantum computers operate much faster and will be able to factor those numbers quickly using Shor’s algorithm to break encryption schemes like RSA (Rivest–Shamir–Adleman) public-key encryption and elliptic curve cryptography (ECC) that are currently secure.

As a result of this anticipated threat, the National Institute of Standards and Technology (NIST) initiated a process to gather, evaluate, and standardize quantum-resistant public-key cryptographic algorithms. That effort is referred to generically as post-quantum cryptography (PQC). NIST’s PQC program began in 2016 with a call for submissions of possible PQC algorithms. The agency had received 69 eligible algorithms by the November 2017 deadline.

The 69 algorithms were released for experts to analyze and, if possible, to break. Another goal was the development of discovery tools that can be used to detect and report current uses of quantum vulnerable cryptography with enough detail to enable risk analysis and remediation. Discovery was a multi-part process with the end goal of developing a prioritization list for further efforts, as illustrated in Figure 1.

Figure 1. NIST used the discovery process to develop a prioritization list (Image: NIST).

Other aspects of the initial effort included:

  • Identifying performance and interoperability challenges that may need to be overcome when implementing the first PQC algorithms that NIST will standardize.
  • Comparing algorithms based on performance testing to estimate the initial costs of deploying the PQC algorithms compared with baseline classical crypto implementations.

The next activity was to prioritize development efforts using risk management methodologies, including Mosca’s Theorem, (X+Y)>Z, which states that if the amount of time that data must remain secure (X) plus the time it takes to upgrade cryptographic systems (Y) is greater than when quantum computers come online with enough power to break cryptography (Z), you have already run out of time. According to NIST, developing and deploying new security protocols has historically taken about 20 years, hence the sense of urgency to develop and deploy PQC algorithms.

The project also focuses on developing standardized and systematic methodologies for migrating to PQC algorithms on various platforms and technologies.

Quantum crypto for the IoT

NIST is leading the largest and most organized effort to develop PQC algorithms, but it’s not the only effort. Independent researchers are active worldwide, working on the challenges associated with PQC algorithms. Several groups are working on the challenges of securing IoT devices that can require lightweight and energy-efficient PQC implementations. PQC algorithms fall into four categories, as shown in Figure 2.

  • Hash-based functions are one-way functions that map bit strings of an arbitrary length to short, fixed-length strings called hash values. The hash-based signature scheme starts with a one-time signature scheme (OTS) and is suited for IoT devices since they don’t require computationally expensive mathematical operations like big integer arithmetic.
  • Multivariate cryptography is the generic term for asymmetric cryptographic primitives based on solving nonlinear multivariate polynomials. All multivariate public-key cryptosystems (MPKC) use the same basic architecture.
  • Code-based cryptography is a new approach intended to diversify existing public-key cryptosystems. Code-based cryptography, unlike public-key algorithms, is based on the problem of decoding unknown error-correcting codes.
  • Lattice-based public-key encryption algorithms must find the shortest vector or the nearest vector in a high-dimensional lattice. Lattice PQC algorithms tend to be quantum-resistant and computationally efficient.
Figure 2. There are four general categories of PQC algorithms (Image: MDPI IoT).

Summary
PQC algorithms are needed to ensure robust security when quantum computing comes online. NIST’s program to develop PQC algorithms is a race against time since the agency estimates that developing and deploying PQC algorithms could take 20 years.

References
Migration to Post-Quantum Cryptography, NIST
Post-Quantum Cryptography: Anticipating Threats and Preparing the Future, European Union Agency for Cybersecurity (ENISA)
Post-Quantum Cryptosystems for Internet-of-Things, MDPI IoT

You may also like:


  • What’s a quantum processing unit?

  • What are the five types of quantum computers?

  • Post-quantum crypto standardization — where we are

  • What’s quantum control and how is it used?

  • What’s a quantum sensor?

Filed Under: Applications, Computer, Embedded, FAQ, Featured, Security Tagged With: FAQ

Primary Sidebar

Featured Contributions

Five challenges for developing next-generation ADAS and autonomous vehicles

Securing IoT devices against quantum computing risks

RISC-V implementation strategies for certification of safety-critical systems

What’s new with Matter: how Matter 1.4 is reshaping interoperability and energy management

Edge AI: Revolutionizing real-time data processing and automation

More Featured Contributions

EE TECH TOOLBOX

“ee
Tech Toolbox: Internet of Things
Explore practical strategies for minimizing attack surfaces, managing memory efficiently, and securing firmware. Download now to ensure your IoT implementations remain secure, efficient, and future-ready.

EE Learning Center

EE Learning Center

EE ENGINEERING TRAINING DAYS

engineering
“bills
“microcontroller
EXPAND YOUR KNOWLEDGE AND STAY CONNECTED
Get the latest info on technologies, tools and strategies for EE professionals.

RSS Current EDABoard.com discussions

  • CST Studio – How to increase frequency step size (e.g. to 100 MHz)?
  • What is the difference between MIMO antenna elements arragned radially across the pentagon shaped substrate versus rectangle shaed substrate?
  • General purpose CMOS Op Amp and PMOS & NMOS from LTSpice library
  • Simple Active Bandpass Filter Oscillates
  • TMP117 > Can not read temperature on LCD

RSS Current Electro-Tech-Online.com Discussions

  • Capacitive Touch On The Profile
  • JBL charge 4 dead motherboard?
  • Guitar electronics project
  • can a AT89C51 be used as a rom?
  • going out on a limb and praying the schematic is correct

DesignFast

Design Fast Logo
Component Selection Made Simple.

Try it Today
design fast globle

Footer

Microcontroller Tips

EE World Online Network

  • 5G Technology World
  • EE World Online
  • Engineers Garage
  • Analog IC Tips
  • Battery Power Tips
  • Connector Tips
  • DesignFast
  • EDA Board Forums
  • Electro Tech Online Forums
  • EV Engineering
  • Power Electronic Tips
  • Sensor Tips
  • Test and Measurement Tips

Microcontroller Tips

  • Subscribe to our newsletter
  • Advertise with us
  • Contact us
  • About us

Copyright © 2025 · WTWH Media LLC and its licensors. All rights reserved.
The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media.

Privacy Policy