On March 11, 2025, the National Institute for Standards and Technology (NIST) announced the selection of HQC as a new Post-Quantum Cryptography (PQC) algorithm for standardization.
HQC serves as an alternative to ML-KEM (FIPS 203) for key encapsulation and encryption. By choosing HQC - based on error-correcting codes - NIST ensures a non-lattice-based option, mitigating potential future vulnerabilities in lattice-based cryptography. However, ML-KEM remains NIST’s primary recommended encryption algorithm and is also part of the CNSA 2.0 suite.
Read more about different PQC algorithms types
More about HQC – Parameter sets and key sizes compared to ML-KEM
HQC is intended to come in three different parameter sets with the following key sizes:
Parameter  | Public Key Size  | Private Key Size  | Ciphertext size  | Shared secret size  | 
HQC-128  | 2,249 bytes  | 2,305 bytes  | 4,433 bytes  | 64 bytes  | 
HQC-192  | 4,522 bytes  | 4,586 bytes  | 8,978 bytes  | 64 bytes  | 
HQC-256  | 7,245 bytes  | 7,317 bytes  | 14,421bytes  | 64 bytes  | 
As a reference, these are the parameters and respective key sizes for ML-KEM:
Parameter  | Encapsulation Key Size  | Decapsulation Key Size  | Ciphertext Size  | Shared Key Size  | 
ML-KEM-512  | 800 bytes  | 1,632 bytes  | 768 bytes  | 32 bytes  | 
ML-KEM-768  | 1,184 bytes  | 2,400 bytes  | 1,088 bytes  | 32 bytes  | 
ML-KEM-1024  | 1,568 bytes  | 3,168 bytes  | 1,568 bytes  | 32 bytes  | 
HQC – Standardization Timeline
- 2025: HQC selected for standardization
 - 2026: HQC draft standard to be published
 - 2027: Final standard for HQC expected
 
So, organizations planning their PQC migration now will need to wait at least two years for a standardized version of HQC. Meanwhile, ML-KEM is already standardized and ready for use.
The current state of Post Quantum Cryptography
PQC standards published:
- ML-KEM (FIPS 203) for key encapsulation / encryption
 - ML-DSA (FIPS 204) for digital signatures
 - SLH-DSA (FIPS 205) for digital signatures
 
Draft PQC standards expected for 2025: FALCON / FN-DSA (FIPS 206) for digital signatures.
Classical algorithms – NIST’s plans for phase-out
In their internal report IR 8547, NIST is pushing the urgency of transitioning to PQC by defining clear deadlines for validity of classical algorithms:
By 2030, the following algorithms will be deprecated: 
Elliptic Curve DH, MQC, Finite Field DH, MQV, RSA, ECDSA, EdDSA (112-bit security strength)
By 2035, the following algorithms will be disallowed: 
Elliptic Curve DH, MQC, Finite Field DH, MQV, RSA, ECDSA, EdDSA
With these depreciation and disallowance deadlines in mind, organizations should see this as a clear call to action to review their current cryptography and plan for PQC migration.
For further information on NIST’s selection of HQC, visit:
NIST's website
Status Report on the Fourth Round of the NIST Post-Quantum Cryptography Standardization Process
Good to Know
Whether in classical or post-quantum cryptography, one principle remains unchanged: the best way to protect cryptographic keys and applications is by generating, managing, and storing them in a Hardware Security Module (HSM). After all, even the most advanced cryptography is useless if the keys are not secure. Utimaco’s HSMs are designed crypto agile and already support NIST-standardized PQC algorithms today.
  
  
  