{"id":129541,"date":"2025-03-13T06:09:06","date_gmt":"2025-03-13T11:09:06","guid":{"rendered":"https:\/\/www.controleng.com\/?p=129541"},"modified":"2025-04-23T18:53:04","modified_gmt":"2025-04-23T23:53:04","slug":"new-backup-algorithm-for-post-quantum-encryption","status":"publish","type":"post","link":"https:\/\/www.controleng.com\/new-backup-algorithm-for-post-quantum-encryption\/","title":{"rendered":"New backup algorithm for post-quantum encryption"},"content":{"rendered":"\n<p>Last year, the <a href=\"https:\/\/www.nist.gov\/\" target=\"_blank\" rel=\"noreferrer noopener\">National Institute of Standards and Technology (NIST)<\/a>, one of the U.S.&#8217;s oldest physical science labs, <a href=\"https:\/\/www.nist.gov\/news-events\/news\/2024\/08\/nist-releases-first-3-finalized-post-quantum-encryption-standards\" target=\"_blank\" rel=\"noreferrer noopener\">standardized a set of encryption algorithms<\/a>&nbsp;that can keep data secure from a cyberattack by a future quantum computer. Now, NIST has&nbsp;<a href=\"https:\/\/csrc.nist.gov\/pubs\/ir\/8545\/final\" target=\"_blank\" rel=\"noreferrer noopener\">selected a backup algorithm<\/a>&nbsp;as an additional security measure for general encryption, which protects internet traffic and stored data alike.<\/p>\n\n\n\n<p>Encryption protects sensitive electronic information, including internet traffic and medical and financial records, as well as corporate and national security information. However, a sufficiently powerful quantum computer, should one be successfully developed, could compromise that security. NIST has been working for more than eight years on encryption algorithms that even a quantum computer cannot break.<\/p>\n\n\n\n<p>Last year, NIST&nbsp;<a href=\"https:\/\/csrc.nist.gov\/pubs\/fips\/203\/final\" target=\"_blank\" rel=\"noreferrer noopener\">published an encryption standard<\/a>&nbsp;based on a quantum-resistant algorithm called ML-KEM. The new algorithm, called HQC, will serve as a backup defense in case quantum computers are someday able to crack ML-KEM. These algorithms are designed to protect stored information as well as data that travels across public networks.<\/p>\n\n\n\n<p>HQC is not intended to take the place of ML-KEM, which will remain the recommended choice for general encryption, said Dustin Moody, a mathematician who heads NIST\u2019s Post-Quantum Cryptography project.&nbsp;<\/p>\n\n\n\n<p>\u201cOrganizations should continue to migrate their encryption systems to the standards we finalized in 2024,\u201d he said. \u201cWe are announcing the selection of HQC because we want to have a backup standard that is based on a different math approach than ML-KEM. As we advance our understanding of future quantum computers and adapt to emerging cryptanalysis techniques, it\u2019s essential to have a fallback in case ML-KEM proves to be vulnerable.\u201d<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Encryption based on two math problems<\/h2>\n\n\n\n<p>Encryption systems rely on complex math problems that conventional computers require significant time and resources to solve. However, a sufficiently capable quantum computer could rapidly evaluate numerous possible solutions, potentially rendering current encryption methods ineffective.<\/p>\n\n\n\n<p>While the ML-KEM algorithm is based on structured lattices, the HQC algorithm uses&nbsp;<a href=\"https:\/\/www.ams.org\/publicoutreach\/feature-column\/fcarc-errors6\" target=\"_blank\" rel=\"noreferrer noopener\">error-correcting codes<\/a>, which are commonly applied in information security. Moody said that HQC is a longer algorithm than ML-KEM and requires more computing resources. However, its security and reliability led reviewers to select it as a backup choice.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Present and future standards<\/h2>\n\n\n\n<p>HQC is the latest algorithm chosen by NIST\u2019s&nbsp;<a href=\"https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\" target=\"_blank\" rel=\"noreferrer noopener\">Post-Quantum Cryptography project<\/a>, which has managed the initiative since 2016 to address security risks posed by quantum computers. HQC joins the&nbsp;<a href=\"https:\/\/www.nist.gov\/news-events\/news\/2022\/07\/nist-announces-first-four-quantum-resistant-cryptographic-algorithms\" target=\"_blank\" rel=\"noreferrer noopener\">four algorithms NIST selected previously<\/a>. Three of those algorithms have been&nbsp;<a href=\"https:\/\/www.nist.gov\/news-events\/news\/2024\/08\/nist-releases-first-3-finalized-post-quantum-encryption-standards\" target=\"_blank\" rel=\"noreferrer noopener\">incorporated into finished standards<\/a>, including ML-KEM, which is central to the standard called FIPS 203.&nbsp;<\/p>\n\n\n\n<p>The other two finished standards,&nbsp;<a href=\"https:\/\/csrc.nist.gov\/pubs\/fips\/204\/final\" target=\"_blank\" rel=\"noreferrer noopener\">FIPS 204<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/csrc.nist.gov\/pubs\/fips\/205\/final\" target=\"_blank\" rel=\"noreferrer noopener\">FIPS 205<\/a>, contain digital signature algorithms that authenticate the identity of a sender, such as when remotely signing documents. The three finished standards are now available, and organizations have already started integrating them into their information systems to enhance security and longevity.<\/p>\n\n\n\n<p>A draft of the fourth standard, based on the FALCON algorithm, also addresses digital signatures and will be released shortly as FIPS 206.&nbsp;<\/p>\n\n\n\n<p>HQC is the only algorithm to be standardized from NIST&#8217;s&nbsp;<a href=\"https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\/round-4-submissions\" target=\"_blank\" rel=\"noreferrer noopener\">fourth round<\/a>&nbsp;of candidates, which initially included four algorithms under further evaluation. NIST has&nbsp;<a href=\"https:\/\/csrc.nist.gov\/pubs\/ir\/8545\/final\" target=\"_blank\" rel=\"noreferrer noopener\">released a report<\/a>&nbsp;summarizing each of these four algorithms and explaining why HQC was selected.<\/p>\n\n\n\n<p>NIST plans to release a draft standard for HQC for public comment in about a year. After a 90-day comment period, NIST will address the comments and finalize the standard for release in 2027.<\/p>\n\n\n\n<p>Edited by Puja Mitra, WTWH Media, for <em>Control Engineering<\/em>, from a <a href=\"https:\/\/www.nist.gov\/\" target=\"_blank\" rel=\"noreferrer noopener\">National Institute of Standards and Technology<\/a> news release.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>NIST chooses HQC, which is based on different mathematics than ML-KEM.<\/p>\n","protected":false},"author":710,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[104076],"tags":[109340,109809,109964],"tracking-metrics":[],"display-location":[],"class_list":{"2":"type-post"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>New backup algorithm for post-quantum encryption - Control Engineering<\/title>\n<meta name=\"description\" content=\"NIST chooses HQC, which is based on different mathematics than ML-KEM.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.controleng.com\/new-backup-algorithm-for-post-quantum-encryption\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New backup algorithm for post-quantum encryption - Control Engineering\" \/>\n<meta property=\"og:description\" content=\"NIST chooses HQC, which is based on different mathematics than ML-KEM.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.controleng.com\/new-backup-algorithm-for-post-quantum-encryption\/\" \/>\n<meta property=\"og:site_name\" content=\"Control Engineering\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ControlEngineeringMagazine\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-13T11:09:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-23T23:53:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/ce_logo_1200x675.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"National Institute of Standards and Technology\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@controlengtips\" \/>\n<meta name=\"twitter:site\" content=\"@controlengtips\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"National Institute of Standards and Technology\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.controleng.com\/new-backup-algorithm-for-post-quantum-encryption\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.controleng.com\/new-backup-algorithm-for-post-quantum-encryption\/\"},\"author\":{\"name\":\"National Institute of Standards and Technology\",\"@id\":\"https:\/\/www.controleng.com\/#\/schema\/person\/a81f828a752886d32dec68429fa476a4\"},\"headline\":\"New backup algorithm for post-quantum encryption\",\"datePublished\":\"2025-03-13T11:09:06+00:00\",\"dateModified\":\"2025-04-23T23:53:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.controleng.com\/new-backup-algorithm-for-post-quantum-encryption\/\"},\"wordCount\":608,\"publisher\":{\"@id\":\"https:\/\/www.controleng.com\/#organization\"},\"keywords\":[\"control engineering\",\"cybersecurity\",\"encryption\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.controleng.com\/new-backup-algorithm-for-post-quantum-encryption\/\",\"url\":\"https:\/\/www.controleng.com\/new-backup-algorithm-for-post-quantum-encryption\/\",\"name\":\"New backup algorithm for post-quantum encryption - Control Engineering\",\"isPartOf\":{\"@id\":\"https:\/\/www.controleng.com\/#website\"},\"datePublished\":\"2025-03-13T11:09:06+00:00\",\"dateModified\":\"2025-04-23T23:53:04+00:00\",\"description\":\"NIST chooses HQC, which is based on different mathematics than ML-KEM.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.controleng.com\/new-backup-algorithm-for-post-quantum-encryption\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.controleng.com\/new-backup-algorithm-for-post-quantum-encryption\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.controleng.com\/new-backup-algorithm-for-post-quantum-encryption\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.controleng.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New backup algorithm for post-quantum encryption\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.controleng.com\/#website\",\"url\":\"https:\/\/www.controleng.com\/\",\"name\":\"Control Engineering\",\"description\":\"Control Engineering covers and educates about automation, control and instrumentation technologies\",\"publisher\":{\"@id\":\"https:\/\/www.controleng.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.controleng.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.controleng.com\/#organization\",\"name\":\"Control Engineering\",\"url\":\"https:\/\/www.controleng.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.controleng.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/ce_logo.png\",\"contentUrl\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/ce_logo.png\",\"width\":300,\"height\":93,\"caption\":\"Control Engineering\"},\"image\":{\"@id\":\"https:\/\/www.controleng.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ControlEngineeringMagazine\",\"https:\/\/x.com\/controlengtips\",\"https:\/\/www.linkedin.com\/company\/control-engineering-magazine\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.controleng.com\/#\/schema\/person\/a81f828a752886d32dec68429fa476a4\",\"name\":\"National Institute of Standards and Technology\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.controleng.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fd271f4c2c1fba1d6db6a7487ae864b8ebdda84ff78e478840e5ece8da4e654d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fd271f4c2c1fba1d6db6a7487ae864b8ebdda84ff78e478840e5ece8da4e654d?s=96&d=mm&r=g\",\"caption\":\"National Institute of Standards and Technology\"},\"url\":\"https:\/\/www.controleng.com\/author\/national-institute-of-standards-and-technology\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New backup algorithm for post-quantum encryption - Control Engineering","description":"NIST chooses HQC, which is based on different mathematics than ML-KEM.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.controleng.com\/new-backup-algorithm-for-post-quantum-encryption\/","og_locale":"en_US","og_type":"article","og_title":"New backup algorithm for post-quantum encryption - Control Engineering","og_description":"NIST chooses HQC, which is based on different mathematics than ML-KEM.","og_url":"https:\/\/www.controleng.com\/new-backup-algorithm-for-post-quantum-encryption\/","og_site_name":"Control Engineering","article_publisher":"https:\/\/www.facebook.com\/ControlEngineeringMagazine","article_published_time":"2025-03-13T11:09:06+00:00","article_modified_time":"2025-04-23T23:53:04+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/ce_logo_1200x675.png","type":"image\/png"}],"author":"National Institute of Standards and Technology","twitter_card":"summary_large_image","twitter_creator":"@controlengtips","twitter_site":"@controlengtips","twitter_misc":{"Written by":"National Institute of Standards and Technology","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.controleng.com\/new-backup-algorithm-for-post-quantum-encryption\/#article","isPartOf":{"@id":"https:\/\/www.controleng.com\/new-backup-algorithm-for-post-quantum-encryption\/"},"author":{"name":"National Institute of Standards and Technology","@id":"https:\/\/www.controleng.com\/#\/schema\/person\/a81f828a752886d32dec68429fa476a4"},"headline":"New backup algorithm for post-quantum encryption","datePublished":"2025-03-13T11:09:06+00:00","dateModified":"2025-04-23T23:53:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.controleng.com\/new-backup-algorithm-for-post-quantum-encryption\/"},"wordCount":608,"publisher":{"@id":"https:\/\/www.controleng.com\/#organization"},"keywords":["control engineering","cybersecurity","encryption"],"articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.controleng.com\/new-backup-algorithm-for-post-quantum-encryption\/","url":"https:\/\/www.controleng.com\/new-backup-algorithm-for-post-quantum-encryption\/","name":"New backup algorithm for post-quantum encryption - Control Engineering","isPartOf":{"@id":"https:\/\/www.controleng.com\/#website"},"datePublished":"2025-03-13T11:09:06+00:00","dateModified":"2025-04-23T23:53:04+00:00","description":"NIST chooses HQC, which is based on different mathematics than ML-KEM.","breadcrumb":{"@id":"https:\/\/www.controleng.com\/new-backup-algorithm-for-post-quantum-encryption\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.controleng.com\/new-backup-algorithm-for-post-quantum-encryption\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.controleng.com\/new-backup-algorithm-for-post-quantum-encryption\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.controleng.com\/"},{"@type":"ListItem","position":2,"name":"New backup algorithm for post-quantum encryption"}]},{"@type":"WebSite","@id":"https:\/\/www.controleng.com\/#website","url":"https:\/\/www.controleng.com\/","name":"Control Engineering","description":"Control Engineering covers and educates about automation, control and instrumentation technologies","publisher":{"@id":"https:\/\/www.controleng.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.controleng.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.controleng.com\/#organization","name":"Control Engineering","url":"https:\/\/www.controleng.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.controleng.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/ce_logo.png","contentUrl":"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/ce_logo.png","width":300,"height":93,"caption":"Control Engineering"},"image":{"@id":"https:\/\/www.controleng.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ControlEngineeringMagazine","https:\/\/x.com\/controlengtips","https:\/\/www.linkedin.com\/company\/control-engineering-magazine\/"]},{"@type":"Person","@id":"https:\/\/www.controleng.com\/#\/schema\/person\/a81f828a752886d32dec68429fa476a4","name":"National Institute of Standards and Technology","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.controleng.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fd271f4c2c1fba1d6db6a7487ae864b8ebdda84ff78e478840e5ece8da4e654d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fd271f4c2c1fba1d6db6a7487ae864b8ebdda84ff78e478840e5ece8da4e654d?s=96&d=mm&r=g","caption":"National Institute of Standards and Technology"},"url":"https:\/\/www.controleng.com\/author\/national-institute-of-standards-and-technology\/"}]}},"_links":{"self":[{"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/posts\/129541","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/users\/710"}],"replies":[{"embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/comments?post=129541"}],"version-history":[{"count":0,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/posts\/129541\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/media?parent=129541"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/categories?post=129541"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/tags?post=129541"},{"taxonomy":"tracking-metric","embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/tracking-metrics?post=129541"},{"taxonomy":"display-location","embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/display-location?post=129541"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}