CARVIEW |
This is a potential security issue, you are being redirected to https://csrc.nist.gov.

An official website of the United States government
Here’s how you know
Official websites use .gov
A
.gov website belongs to an official government
organization in the United States.
Secure .gov websites use HTTPS
A
lock (
) or https:// means you’ve safely connected to
the .gov website. Share sensitive information only on official,
secure websites.
Post-Quantum Cryptography PQC
Project Links
Overview
Short URL: https://www.nist.gov/pqcrypto
For a plain-language introduction to post-quantum cryptography, go to: What Is Post-Quantum Cryptography?
HQC was selected for standardization on March 11, 2025. NIST IR 8545, Status Report on the Fourth Round of the NIST Post-Quantum Cryptography Standardization Process is now available.
FIPS 203, FIPS 204 and FIPS 205, which specify algorithms derived from CRYSTALS-Dilithium, CRYSTALS-KYBER and SPHINCS+, were published August 13, 2024.
Background
NIST initiated a process to solicit, evaluate, and standardize one or more quantum-resistant public-key cryptographic algorithms. Full details can be found in the Post-Quantum Cryptography Standardization page.
In recent years, there has been a substantial amount of research on quantum computers – machines that exploit quantum mechanical phenomena to solve mathematical problems that are difficult or intractable for conventional computers. If large-scale quantum computers are ever built, they will be able to break many of the public-key cryptosystems currently in use. This would seriously compromise the confidentiality and integrity of digital communications on the Internet and elsewhere. The goal of post-quantum cryptography (also called quantum-resistant cryptography) is to develop cryptographic systems that are secure against both quantum and classical computers, and can interoperate with existing communications protocols and networks.
The question of when a large-scale quantum computer will be built is a complicated one. While in the past it was less clear that large quantum computers are a physical possibility, many scientists now believe it to be merely a significant engineering challenge. Some engineers even predict that within the next twenty or so years sufficiently large quantum computers will be built to break essentially all public key schemes currently in use. Historically, it has taken almost two decades to deploy our modern public key cryptography infrastructure. Therefore, regardless of whether we can estimate the exact time of the arrival of the quantum computing era, we must begin now to prepare our information security systems to be able to resist quantum computing.
Post-Quantum Cryptography: the Good, the Bad, and the Powerful
Federal Register Notices
August 13, 2024 |
The Secretary of Commerce approved three Federal Information Processing Standards (FIPS) for post-quantum cryptography: |
August 24, 2023
|
Comments Requested on Three Draft FIPS for Post-Quantum Cryptography
|
December 20, 2016
|
Request for Nominations for Public-Key Post-Quantum Cryptographic Algorithms |
August 2, 2016
|
Request for Comments on Submission Requirements and Evaluation Criteria |
Project Links
Additional Pages
Contacts
PQC Crypto Technical Inquiries
[email protected]
Dr. Lily Chen
Dr. Dustin Moody
Dr. Yi-Kai Liu
Group
Cryptographic TechnologyTopics
Security and Privacy: post-quantum cryptography
Additional Pages
Post-Quantum Cryptography Standardization Call for Proposals Round 1 Submissions Round 2 Submissions Round 3 Submissions Round 3 Seminars Round 4 Submissions Selected Algorithms Workshops and Timeline PQC Seminars External Workshops Contact Info Email List (PQC Forum) PQC Archive PQC Digital Signature Schemes Hash-Based Signatures
Contacts
PQC Crypto Technical Inquiries
[email protected]
Dr. Lily Chen
Dr. Dustin Moody
Dr. Yi-Kai Liu
Group
Cryptographic TechnologyTopics
Security and Privacy: post-quantum cryptography