Skip to content

Secure IT

Stay Secure. Stay Informed.

Primary Menu
  • Home
  • Sources
    • Krebs On Security
    • Security Week
    • The Hacker News
    • Schneier On Security
  • Home
  • Security Week
  • NIST Announces HQC as Fifth Standardized Post Quantum Algorithm
  • Security Week

NIST Announces HQC as Fifth Standardized Post Quantum Algorithm

Kevin Townsend Published: March 17, 2025 | Updated: March 17, 2025 3 min read
0 views

The National Institute of Standards and Technology (NIST) has selected a fifth algorithm (HQC) to add to its PQC portfolio. It plans to issue a draft HQC standard in early 2026, with the finalized standard expected in 2027.

In a report (PDF) on the fourth round of the NIST post-quantum cryptography standardization process, NIST states, “The only key-establishment algorithm that will be standardized is HQC, and NIST will develop a standard based on HQC to augment its key-establishment portfolio.”

Four other algorithms have already been selected, and three of these have been released as finished standards: FIPS 203 is ML-KEM (CRYSTALS-Kyber), FIPS 204 is ML-DSA (CRYSTALS-Dilithium), and FIPS 205 is SLH-DSA (SPHINCS+). FIPS 206 is planned for the fourth standardization and built around FALCON — the draft standard is due to be released shortly as FIPS 206, FN-DSA.

HQC will serve as a backup for ML-KEM. Both are key encapsulation mechanisms (KEMs). KEMs are used to establish a shared secret key over a public channel. That shared secret key can then be used for data encrypted with a symmetric-key encryption system (such as AES-256).

Symmetric algorithms are considered less vulnerable to quantum decryption when their key lengths are long enough — AES-256 is considered to be quantum resistant and there is, for the moment, no emphasis on replacing such symmetric algorithms.

The DSA epithet in the standards refers to ‘digital signature algorithm’, described by NIST as, “a kind of ‘electronic fingerprint’ that authenticates the identity of a sender, such as when remotely signing documents.”

Just as Sphincs+ is included as a backup for Dilithium and FALCON, so HQC is included as a backup for ML-KEM. The ‘KEM’ epithet stands for ‘key encapsulation mechanism’. Logically, this fifth standardization is likely to be FIPS  207, xx-KEM.

First choices for both KEMs and DSAs are already standardized, and organizations should not wait for the backups to be available before migrating to PQC. 

Advertisement. Scroll to continue reading.

“Organizations should continue to migrate their encryption systems to the standards NIST finalized in 2024. We are announcing the selection of HQC because we want to have a backup standard that is based on a different math approach than ML-KEM,” explains Dustin Moody, NIST mathematician and project head.

Despite the future option of HQC, ML-KEM remains the recommended first choice for migration to PQC. Its algorithm is built around the mathematics of structured lattices. HQC uses different math, built around error-correcting codes. Its algorithm is lengthier and requires more computing resources than Kyber, but Moody noted, “Its clean and secure operation convinced reviewers that it would make a worthy backup choice.”

Within the DSA category, Dilithium (FIPS 204, ML-DSA) is the primary recommendation. The FALCON algorithm (expected to be FIPS 206, FN-DSA) is recommended for applications that require a smaller signature than can be provided by Dilithium. Sphincs+ (FIPS 205 SLH-DSA) is larger and slower than the others but is a useful backup since it uses different math based on cryptographic hash functions.

The availability of backups provides options for crypto agility (which could also be called ‘just in case crypto’). NIST urges that migration to PQC should include crypto agility, so that just in case an installed encryption fails or gets broken, an adequate alternative can be swiftly swapped in.

With the coming addition of HQC, NIST now has a complete set of first choice and backup post quantum encryption algorithms.

Related: Post-Quantum Cryptography Standards Officially Announced by NIST – a History and Explanation

Related: US Government Publishes Guidance on Migrating to Post-Quantum Cryptography

Related: NIST Post-Quantum Algorithm Finalist Cracked Using a Classical PC

Related: Cyber Insights 2025: Quantum and the Threat to Encryption

About The Author

Kevin Townsend

See author's posts

Original post here

What do you feel about this?

  • Security Week

Post navigation

Previous: Apache Tomcat Vulnerability Actively Exploited Just 30 Hours After Public Disclosure
Next: Exploit Code for Apache Tomcat RCE Vulnerability Published on Chinese Forum

Author's Other Posts

Blockchain, Quantum, and IoT Firms Unite to Secure Satellite Communications Against Quantum Threats Satellite-Link-Cybersecurity.jpg

Blockchain, Quantum, and IoT Firms Unite to Secure Satellite Communications Against Quantum Threats

April 15, 2025 0 1
CISO Conversations: Maarten Van Horenbeeck, SVP & Chief Security officer at Adobe Maarten-Van_Horenbeeck-Adobe.jpg

CISO Conversations: Maarten Van Horenbeeck, SVP & Chief Security officer at Adobe

April 15, 2025 0 1
AI Now Outsmarts Humans in Spear Phishing, Analysis Shows phishing.jpeg

AI Now Outsmarts Humans in Spear Phishing, Analysis Shows

April 9, 2025 0 1
Corsha Raises $18 Million to Enhance and Extend Machine-to-Machine Security Cybersecurity_News-SecurityWeek.jpg

Corsha Raises $18 Million to Enhance and Extend Machine-to-Machine Security

April 8, 2025 0 1

Related Stories

Cybersecurity_News-SecurityWeek.jpg
  • Security Week

Insurance Firm Lemonade Says API Glitch Exposed Some Driver’s License Numbers

Ionut Arghire April 15, 2025 0 2
ransomware.jpeg
  • Security Week

Kidney Dialysis Services Provider DaVita Hit by Ransomware

Ionut Arghire April 15, 2025 0 0
Cybersecurity_News-SecurityWeek.jpg
  • Security Week

Conduent Says Names, Social Security Numbers Stolen in Cyberattack

Ionut Arghire April 15, 2025 0 0
Cybersecurity_News-SecurityWeek.jpg
  • Security Week

2.6 Million Impacted by Landmark Admin, Young Consulting Data Breaches

Ionut Arghire April 15, 2025 0 2
VC-Funding_China-tech.jpg
  • Security Week

China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games

Associated Press April 15, 2025 0 0
Satellite-Link-Cybersecurity.jpg
  • Security Week

Blockchain, Quantum, and IoT Firms Unite to Secure Satellite Communications Against Quantum Threats

Kevin Townsend April 15, 2025 0 1

Trending Now

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims grinex.jpg 1

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

April 19, 2026 0 0
Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet botnet-ddos.jpg 2

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

April 19, 2026 0 0
Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched defender.jpg 3

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

April 19, 2026 0 0
Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul google-ads-android.jpg 4

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

April 19, 2026 0 0

Connect with Us

Social menu is not set. You need to create menu and assign it to Social Menu on Menu Settings.

Trending News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims grinex.jpg 1
  • The Hacker News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

April 19, 2026 0 0
Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet botnet-ddos.jpg 2
  • The Hacker News

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

April 19, 2026 0 0
Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched defender.jpg 3
  • The Hacker News

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

April 19, 2026 0 0
Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul google-ads-android.jpg 4
  • The Hacker News

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

April 19, 2026 0 0
NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions nist-cve.jpg 5
  • The Hacker News

NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions

April 17, 2026 0 1
Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts europol.jpg 6
  • The Hacker News

Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts

April 17, 2026 0 0
Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation apachemq.jpg 7
  • The Hacker News

Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation

April 17, 2026 0 0

You may have missed

grinex.jpg
  • The Hacker News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

[email protected] The Hacker News April 19, 2026 0 0
botnet-ddos.jpg
  • The Hacker News

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

[email protected] The Hacker News April 19, 2026 0 0
defender.jpg
  • The Hacker News

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

[email protected] The Hacker News April 19, 2026 0 0
google-ads-android.jpg
  • The Hacker News

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

[email protected] The Hacker News April 19, 2026 0 0
Copyright © 2026 All rights reserved. | MoreNews by AF themes.