Migration guideGLOBAL

FIPS Crypto Algorithms Post-quantum cryptography

PQC adoption is a systems project: inventory, protocols, interoperability, evidence, and long-lived verification.

This page focuses on practical migration patterns grounded in the final 13 August 2024 FIPS releases.

Author
Sorena AI
Published
Mar 4, 2026
Updated
Mar 4, 2026
Sections
4

Structured answer sets in this page tree.

Primary sources
4

Cited legal and guidance references.

Publication metadata
Sorena AI
Published Mar 4, 2026
Updated Mar 4, 2026
Overview

FIPS 203, FIPS 204, and FIPS 205 were all published on 13 August 2024. FIPS 203 specifies ML-KEM for post-quantum key establishment. FIPS 204 specifies ML-DSA for post-quantum digital signatures. FIPS 205 specifies SLH-DSA for stateless hash-based digital signatures. The migration challenge is not just picking a new primitive. It is building crypto agility so systems can support new algorithm identifiers, parameter sets, and verification rules without breaking interoperability or long-term trust.

Section 1

What each PQC FIPS standard is for

FIPS 203 covers ML-KEM, a key-encapsulation mechanism used to establish a shared secret that other symmetric algorithms can then protect. It defines three parameter sets: ML-KEM-512, ML-KEM-768, and ML-KEM-1024.

FIPS 204 and FIPS 205 cover signatures, but with different constructions. ML-DSA is module-lattice based. SLH-DSA is stateless hash based. They solve related problems with different tradeoffs in size, performance, and operational complexity.

  • Use ML-KEM for post-quantum key establishment
  • Use ML-DSA for module-lattice-based post-quantum signatures
  • Use SLH-DSA when stateless hash-based signatures fit the assurance and performance model
Section 2

Migration strategy that actually works

Start with an inventory. Find every place public-key cryptography appears: TLS, device identity, firmware signing, code signing, document signing, certificate profiles, tokens, and hardware-backed stores.

Then build crypto agility. The system should make algorithm identifiers, parameter sets, negotiation rules, and verification behavior explicit and testable. Only after that should you decide where hybrid deployments are necessary.

  • Inventory protocols, formats, libraries, hardware support, and stored signatures
  • Pin algorithm identifiers and parameter sets explicitly
  • Log and test negotiation behavior so downgrade is visible
  • Use hybrid deployments where compatibility and trust requirements demand parallel support
Section 3

Predictable PQC failure points

PQC projects rarely fail because the primitive is mathematically unsound. They fail because systems assume legacy key sizes, signature sizes, field lengths, or verifier behavior.

The right time to find those assumptions is before rollout.

  • Protocol size limits and storage-field limits
  • Certificate and token profiles that assume classic algorithms only
  • Long-lived verification records that need stable algorithm metadata
  • Hardware or dependency stacks that do not support the chosen parameter sets
  • Negotiation logic that silently falls back to classic-only behavior
Section 4

Evidence that proves PQC adoption was deliberate

Security teams and procurement reviewers will want to know what you chose, where you deployed it, how you prevent downgrade, and how you plan to maintain it. Build that evidence as an engineering output.

A strong evidence pack for PQC looks like a governed migration program, not a one-off library swap.

  • Crypto inventory entry per use case with scheme and parameter set
  • Interoperability tests across peers, languages, and runtimes
  • Negotiation and telemetry evidence that shows algorithm outcomes clearly
  • Key-management and signing-policy evidence for every PQC-enabled workflow
  • Change-control rules for parameter changes and deprecations
Recommended next step

Use FIPS Crypto Algorithms Post-quantum cryptography as a cited research workflow

Research Copilot can take FIPS Crypto Algorithms Post-quantum cryptography from getting cited answers and faster research on this topic to a reusable workflow inside Sorena. Teams working on FIPS Crypto Algorithms can keep owners, evidence, and next steps aligned without copying this guide into separate documents.

Primary sources

References and citations

Related guides

Explore more topics