digital mark

Post Quantum Cryptography News: NIST announces HQC as fifth PQC algorithm to be standardized

On March 11, 2025, the National Institute for Standards and Technology (NIST) announced the selection of HQC as a new Post-Quantum Cryptography (PQC) algorithm for standardization.

HQC serves as an alternative to ML-KEM (FIPS 203) for key encapsulation and encryption. By choosing HQC - based on error-correcting codes - NIST ensures a non-lattice-based option, mitigating potential future vulnerabilities in lattice-based cryptography. However, ML-KEM remains NIST’s primary recommended encryption algorithm and is also part of the CNSA 2.0 suite.

Read more about different PQC algorithms types

More about HQC – Parameter sets and key sizes compared to ML-KEM

HQC is intended to come in three different parameter sets with the following key sizes: 

Parameter 

Public Key Size 

Private Key Size 

Ciphertext size 

Shared secret size 

HQC-128 

2,249 bytes 

2,305 bytes 

4,433 bytes 

64 bytes 

HQC-192 

4,522 bytes 

4,586 bytes 

8,978 bytes 

64 bytes 

HQC-256 

7,245 bytes 

7,317 bytes 

14,421bytes 

64 bytes 

 

As a reference, these are the parameters and respective key sizes for ML-KEM: 

Parameter  

Encapsulation Key Size  

Decapsulation Key Size  

Ciphertext Size  

Shared Key Size  

ML-KEM-512  

800 bytes 

1,632 bytes 

768 bytes 

32 bytes 

ML-KEM-768  

1,184 bytes 

2,400 bytes 

1,088 bytes 

32 bytes 

ML-KEM-1024  

1,568 bytes  

3,168 bytes 

1,568 bytes 

32 bytes 

 

HQC – Standardization Timeline

  • 2025: HQC selected for standardization
  • 2026: HQC draft standard to be published
  • 2027: Final standard for HQC expected

So, organizations planning their PQC migration now will need to wait at least two years for a standardized version of HQC. Meanwhile, ML-KEM is already standardized and ready for use.

The current state of Post Quantum Cryptography

PQC standards published:

  • ML-KEM (FIPS 203) for key encapsulation / encryption
  • ML-DSA (FIPS 204) for digital signatures
  • SLH-DSA (FIPS 205) for digital signatures

Draft PQC standards expected for 2025: FALCON / FN-DSA (FIPS 206) for digital signatures.

Classical algorithms – NIST’s plans for phase-out

In their internal report IR 8547, NIST is pushing the urgency of transitioning to PQC by defining clear deadlines for validity of classical algorithms:

By 2030, the following algorithms will be deprecated: 
Elliptic Curve DH, MQC, Finite Field DH, MQV, RSA, ECDSA, EdDSA (112-bit security strength)

By 2035, the following algorithms will be disallowed: 
Elliptic Curve DH, MQC, Finite Field DH, MQV, RSA, ECDSA, EdDSA

With these depreciation and disallowance deadlines in mind, organizations should see this as a clear call to action to review their current cryptography and plan for PQC migration.  

For further information on NIST’s selection of HQC, visit:

NIST's website
Status Report on the Fourth Round of the NIST Post-Quantum Cryptography Standardization Process

Good to Know

Whether in classical or post-quantum cryptography, one principle remains unchanged: the best way to protect cryptographic keys and applications is by generating, managing, and storing them in a Hardware Security Module (HSM). After all, even the most advanced cryptography is useless if the keys are not secure. Utimaco’s HSMs are designed crypto agile and already support NIST-standardized PQC algorithms today. 

Learn more here 

Author

About the Author

Lena Backes

Lena Franke

Product Marketing Manager

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.