Skip to content
Inovasense

PQC

Post-Quantum Cryptography (PQC) — Next-generation cryptographic algorithms designed to resist attacks from quantum computers, essential for long-lived embedded systems and IoT devices.

PQC — Post-Quantum Cryptography

Post-Quantum Cryptography (PQC) refers to cryptographic algorithms that are designed to be secure against attacks from both classical and quantum computers. As large-scale quantum computers become feasible, they will be able to break widely used public-key algorithms (RSA, ECC, DH) in minutes — threatening the security of every digital system from banking to national defense.

Why Post-Quantum Cryptography Is Urgent

Current AlgorithmQuantum ThreatTimeline
RSA-2048Broken by Shor’s algorithmEstimated 2030–2035
ECDSA / ECDH (P-256)Broken by Shor’s algorithmEstimated 2030–2035
AES-256Weakened (Grover’s), still safe at 256-bitManageable — double key sizes
SHA-256Weakened (Grover’s), still safeManageable — use SHA-384/512

“Harvest now, decrypt later” — Adversaries are already collecting encrypted data today, planning to decrypt it once quantum computers are available. Any data with a secrecy requirement beyond 2030 needs PQC protection now.

NIST PQC Standards (Finalized 2024)

After an 8-year evaluation process, NIST standardized three primary PQC algorithms:

Key Encapsulation Mechanism (KEM)

StandardAlgorithmFamilyKey SizePerformance
FIPS 203 (ML-KEM)CRYSTALS-KyberLattice-based800–1568 bytesVery fast

Digital Signatures

StandardAlgorithmFamilySignature SizePerformance
FIPS 204 (ML-DSA)CRYSTALS-DilithiumLattice-based2420–4627 bytesFast
FIPS 205 (SLH-DSA)SPHINCS+Hash-based7856–49856 bytesSlower, but minimal assumptions

Comparison with Classical Algorithms

MetricRSA-2048ECDSA P-256ML-DSA-65 (PQC)SLH-DSA (PQC)
Public key size256 bytes64 bytes1952 bytes32–64 bytes
Signature size256 bytes64 bytes3309 bytes17088 bytes
Quantum-safe❌ No❌ No✅ Yes✅ Yes
StandardizedYes (legacy)Yes (legacy)Yes (FIPS 204)Yes (FIPS 205)

PQC for Embedded Systems & IoT

PQC has specific challenges for embedded and IoT devices:

Challenges

  • Larger key and signature sizes — ML-DSA signatures are ~50× larger than ECDSA, impacting bandwidth and storage.
  • Higher computational cost — Lattice operations require more RAM and CPU cycles than ECC.
  • OTA update impact — Signed firmware updates become larger, affecting update time over constrained networks (LoRaWAN, NB-IoT).
  • Hardware acceleration — Dedicated PQC accelerator IP blocks may be needed for constrained devices.

Solutions

  • Hybrid cryptography — Run both classical (ECDSA) and PQC (ML-DSA) signatures during the transition period.
  • Hardware PQC accelerators — FPGA and ASIC implementations of lattice operations for IoT.
  • Secure element updates — Vendors like STMicroelectronics, Infineon, and NXP are adding PQC firmware upgrade paths to existing secure elements.
  • FPGA-based PQC — FPGAs enable field-upgradeable cryptographic cores without silicon respins.

PQC and EU Regulations

The EU Cyber Resilience Act (CRA) requires products to use state-of-the-art cryptography. As NIST PQC standards are now final, PQC adoption is becoming a compliance consideration:

  • Products with long operational lifetimes (10–15 years for industrial IoT) must protect data that will still be confidential when quantum computers arrive.
  • European Cybersecurity Certification Scheme (EUCC) is expected to require PQC readiness for high-assurance certifications.

Migration Timeline

PhasePeriodAction
Assessment2024–2025Inventory all cryptographic dependencies (CBOM)
Hybrid deployment2025–2028Dual classical + PQC for critical systems
PQC-primary2028–2030PQC as default, classical as fallback
PQC-only2030+Full migration, deprecate RSA/ECC
  • Secure Boot — Firmware verification that must migrate to PQC signatures.
  • HSM — Hardware modules that need PQC algorithm support.
  • EU Cyber Resilience Act — Regulation requiring state-of-the-art cryptography.