Important News:SafeLogic Announces General Availability for CryptoComply for Go! Learn more!
NIST Selects HQC as its Fifth Post-Quantum Cryptography Algorithm
March 14, 2025 •Alex Zaslavsky
As quantum computing advances, traditional cryptographic algorithms like RSA and ECC risk being broken by quantum attacks. To address this, NIST standardized three post-quantum algorithms last year: ML-KEM, ML-DSA, and SLH-DSA. The first algorithm (ML-KEM) is used for key exchange, while the last two are signature algorithms. On March 11, NIST announced a new algorithm, HQC, which will also be standardized. HQC is based on a different mathematical problem than ML-KEM, ensuring that even if ML-KEM is broken, there will be an alternative.
When comparing ML-KEM and HQC, ML-KEM uses shorter keys, and its key generation, encapsulation, and decapsulation times are significantly faster. This is why NIST prioritized ML-KEM for standardization first. However, HQC has one key advantage—it is based on code-based cryptography, which has a much longer history than the learning-with-errors (LWE) scheme used by ML-KEM. Hence HQC will effectively act as a backup to ML-KEM should ML-KEM be compromised at some point in the future.
NIST established its Post-Quantum Cryptography Project to identify and standardize quantum-resistant cryptography algorithms back in 2016. Even though NIST has already selected four algorithms and announced three new standards, their search for additional PQC algorithms continues. HQC is the only algorithm to be selected for standardization from NIST’s recent fourth round of PQC candidates.
NIST says they plan to issue a draft standard incorporating the HQC algorithm in about a year, and they expect to finalize the new standard in 2027.

Alex Zaslavsky
Alex is a Lead Software Engineer with SafeLogic.
Popular Posts
Search for posts
Tags
- FIPS 140 (113)
- FIPS validation (85)
- Encryption (69)
- cryptography (67)
- NIST (62)
- CryptoComply (60)
- SafeLogic (57)
- Industry News (52)
- cryptographic module (51)
- CMVP (48)
- Conversations (47)
- RapidCert (46)
- compliance (41)
- Ray Potter (33)
- SafeLogic News (32)
- federal (27)
- Event (26)
- CAVP (24)
- Cybersecurity (23)
- FIPS 140-3 (21)
- OpenSSL (15)
- post-quantum cryptography (15)
- FedRAMP (14)
- government (14)
- PQC (13)
- CryptoCompact (12)
- Cryptology (12)
- DoD (12)
- healthcare (12)
- partners (11)
- RSA (10)
- Cloud (9)
- NSA (9)
- security (9)
- CMMC (8)
- Suite B (8)
- testing (8)
- whitepaper (8)
- Approved Products List (APL) (6)
- HITECH (6)
- ICMC (6)
- NIST 800-53 (6)
- lab (6)
- CEO (5)
- NIST 800-171 (5)
- OpenSSL 3.0 (5)
- iOS (5)
- procurement (5)
- C3PAO (4)
- Common Criteria (4)
- HITECH Act (4)
- OpenSSL 3.x (4)
- TLS 1.3 (4)
- deadline (4)
- innovation (4)
- procure (4)
- public sector (4)
- Air Force (3)
- DFARS (3)
- HIPAA Safe Harbor (3)
- HITECH Safe Harbor (3)
- OpenSSL 1.1.1 (3)
- POA&M (3)
- encrypt (3)
- magazine (3)
- queue (3)
- transition (3)
- 3PAO (2)
- ACVP (2)
- BAA (2)
- BSAFE (2)
- CIO (2)
- CSP (2)
- Defense Industrial Base (2)
- Entropy Source Validation (2)
- FISMA (2)
- HIPAA security controls (2)
- Historical Status (2)
- MFA (2)
- OpenSSL 1.0.2 (2)
- SPRS (2)
- StateRAMP (2)
- entropy (2)
- excellence (2)
- founder (2)
- gold (2)
- leader (2)
- maturity (2)
- overlap (2)
- pilot (2)
- rsa conference (2)
- solution (2)
- sunset (2)
- vendor (2)
- year (2)
- Active Status (1)
- Alliance for Digital Innovation (1)
- Android (1)
- CIO Prime Views (1)
- Cyber Defense Magazine (1)
- DHS (1)
- DIU (1)
- DIUx (1)
- DOJ (1)
- DoDIN APL (1)
- FCA (1)
- FIPS Compliance (1)
- GSA (1)
- HITRUST (1)
- Matt Cornelius (1)
- Matthew Cornelius (1)
- Maturity Model (1)
- NCCoE (1)
- OMB (1)
- SLED (1)
- SP800-131A (1)
- SP800-90A (1)
- TLS 1.1 (1)
- background (1)
- best (1)
- co-founder (1)
- congress (1)
- cybertech (1)
- education (1)
- elliptic curve cryptography (1)
- extended (1)
- faq (1)
- finance (1)
- fintech (1)
- fiscal (1)
- fiscal year (1)
- fraud (1)
- globee (1)
- hill (1)
- interview (1)
- kratos (1)
- libgcrypt (1)
- national cybersecurity strategy (1)
- opportunities (1)
- parallel (1)
- profile (1)
- public (1)
- representatives (1)
- reseller (1)
- senate (1)
- senators (1)
- simplify (1)
- sponsors (1)
- state (1)
- stealth mode (1)
- story (1)