Skip to content

Secure IT

Stay Secure. Stay Informed.

Primary Menu
  • Home
  • Sources
    • Krebs On Security
    • Security Week
    • The Hacker News
    • Schneier On Security
  • Home
  • Security Week
  • NIST Announces HQC as Fifth Standardized Post Quantum Algorithm
  • Security Week

NIST Announces HQC as Fifth Standardized Post Quantum Algorithm

Kevin Townsend Published: March 17, 2025 | Updated: March 17, 2025 3 min read
0 views

The National Institute of Standards and Technology (NIST) has selected a fifth algorithm (HQC) to add to its PQC portfolio. It plans to issue a draft HQC standard in early 2026, with the finalized standard expected in 2027.

In a report (PDF) on the fourth round of the NIST post-quantum cryptography standardization process, NIST states, “The only key-establishment algorithm that will be standardized is HQC, and NIST will develop a standard based on HQC to augment its key-establishment portfolio.”

Four other algorithms have already been selected, and three of these have been released as finished standards: FIPS 203 is ML-KEM (CRYSTALS-Kyber), FIPS 204 is ML-DSA (CRYSTALS-Dilithium), and FIPS 205 is SLH-DSA (SPHINCS+). FIPS 206 is planned for the fourth standardization and built around FALCON — the draft standard is due to be released shortly as FIPS 206, FN-DSA.

HQC will serve as a backup for ML-KEM. Both are key encapsulation mechanisms (KEMs). KEMs are used to establish a shared secret key over a public channel. That shared secret key can then be used for data encrypted with a symmetric-key encryption system (such as AES-256).

Symmetric algorithms are considered less vulnerable to quantum decryption when their key lengths are long enough — AES-256 is considered to be quantum resistant and there is, for the moment, no emphasis on replacing such symmetric algorithms.

The DSA epithet in the standards refers to ‘digital signature algorithm’, described by NIST as, “a kind of ‘electronic fingerprint’ that authenticates the identity of a sender, such as when remotely signing documents.”

Just as Sphincs+ is included as a backup for Dilithium and FALCON, so HQC is included as a backup for ML-KEM. The ‘KEM’ epithet stands for ‘key encapsulation mechanism’. Logically, this fifth standardization is likely to be FIPS  207, xx-KEM.

First choices for both KEMs and DSAs are already standardized, and organizations should not wait for the backups to be available before migrating to PQC. 

Advertisement. Scroll to continue reading.

“Organizations should continue to migrate their encryption systems to the standards NIST finalized in 2024. We are announcing the selection of HQC because we want to have a backup standard that is based on a different math approach than ML-KEM,” explains Dustin Moody, NIST mathematician and project head.

Despite the future option of HQC, ML-KEM remains the recommended first choice for migration to PQC. Its algorithm is built around the mathematics of structured lattices. HQC uses different math, built around error-correcting codes. Its algorithm is lengthier and requires more computing resources than Kyber, but Moody noted, “Its clean and secure operation convinced reviewers that it would make a worthy backup choice.”

Within the DSA category, Dilithium (FIPS 204, ML-DSA) is the primary recommendation. The FALCON algorithm (expected to be FIPS 206, FN-DSA) is recommended for applications that require a smaller signature than can be provided by Dilithium. Sphincs+ (FIPS 205 SLH-DSA) is larger and slower than the others but is a useful backup since it uses different math based on cryptographic hash functions.

The availability of backups provides options for crypto agility (which could also be called ‘just in case crypto’). NIST urges that migration to PQC should include crypto agility, so that just in case an installed encryption fails or gets broken, an adequate alternative can be swiftly swapped in.

With the coming addition of HQC, NIST now has a complete set of first choice and backup post quantum encryption algorithms.

Related: Post-Quantum Cryptography Standards Officially Announced by NIST – a History and Explanation

Related: US Government Publishes Guidance on Migrating to Post-Quantum Cryptography

Related: NIST Post-Quantum Algorithm Finalist Cracked Using a Classical PC

Related: Cyber Insights 2025: Quantum and the Threat to Encryption

About The Author

Kevin Townsend

See author's posts

Original post here

What do you feel about this?

  • Security Week

Post navigation

Previous: Apache Tomcat Vulnerability Actively Exploited Just 30 Hours After Public Disclosure
Next: Exploit Code for Apache Tomcat RCE Vulnerability Published on Chinese Forum

Author's Other Posts

Blockchain, Quantum, and IoT Firms Unite to Secure Satellite Communications Against Quantum Threats Satellite-Link-Cybersecurity.jpg

Blockchain, Quantum, and IoT Firms Unite to Secure Satellite Communications Against Quantum Threats

April 15, 2025 0 0
CISO Conversations: Maarten Van Horenbeeck, SVP & Chief Security officer at Adobe Maarten-Van_Horenbeeck-Adobe.jpg

CISO Conversations: Maarten Van Horenbeeck, SVP & Chief Security officer at Adobe

April 15, 2025 0 1
AI Now Outsmarts Humans in Spear Phishing, Analysis Shows phishing.jpeg

AI Now Outsmarts Humans in Spear Phishing, Analysis Shows

April 9, 2025 0 0
Corsha Raises $18 Million to Enhance and Extend Machine-to-Machine Security Cybersecurity_News-SecurityWeek.jpg

Corsha Raises $18 Million to Enhance and Extend Machine-to-Machine Security

April 8, 2025 0 0

Related Stories

Cybersecurity_News-SecurityWeek.jpg
  • Security Week

Insurance Firm Lemonade Says API Glitch Exposed Some Driver’s License Numbers

Ionut Arghire April 15, 2025 0 0
ransomware.jpeg
  • Security Week

Kidney Dialysis Services Provider DaVita Hit by Ransomware

Ionut Arghire April 15, 2025 0 0
Cybersecurity_News-SecurityWeek.jpg
  • Security Week

Conduent Says Names, Social Security Numbers Stolen in Cyberattack

Ionut Arghire April 15, 2025 0 0
Cybersecurity_News-SecurityWeek.jpg
  • Security Week

2.6 Million Impacted by Landmark Admin, Young Consulting Data Breaches

Ionut Arghire April 15, 2025 0 0
VC-Funding_China-tech.jpg
  • Security Week

China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games

Associated Press April 15, 2025 0 0
Satellite-Link-Cybersecurity.jpg
  • Security Week

Blockchain, Quantum, and IoT Firms Unite to Secure Satellite Communications Against Quantum Threats

Kevin Townsend April 15, 2025 0 0

Trending Now

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill 1

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill

December 6, 2025 0 0
SMS Phishers Pivot to Points, Taxes, Fake Retailers SMS Phishers Pivot to Points, Taxes, Fake Retailers 2

SMS Phishers Pivot to Points, Taxes, Fake Retailers

December 4, 2025 0 0
India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse whatsapp-sim.jpg 3

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

December 2, 2025 0 0
Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera korean.jpg 4

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

December 2, 2025 0 1

Connect with Us

Social menu is not set. You need to create menu and assign it to Social Menu on Menu Settings.

Trending News

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill 1
  • Uncategorized

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill

December 6, 2025 0 0
SMS Phishers Pivot to Points, Taxes, Fake Retailers SMS Phishers Pivot to Points, Taxes, Fake Retailers 2
  • Uncategorized

SMS Phishers Pivot to Points, Taxes, Fake Retailers

December 4, 2025 0 0
India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse whatsapp-sim.jpg 3
  • The Hacker News

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

December 2, 2025 0 0
Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera korean.jpg 4
  • The Hacker News

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

December 2, 2025 0 1
GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools hacked.jpg 5
  • The Hacker News

GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools

December 2, 2025 0 0
Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools npm-mal.jpg 6
  • The Hacker News

Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools

December 2, 2025 0 1
Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks iran-hacking.jpg 7
  • The Hacker News

Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks

December 2, 2025 0 0

You may have missed

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill
  • Uncategorized

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill

Sean December 6, 2025 0 0
SMS Phishers Pivot to Points, Taxes, Fake Retailers
  • Uncategorized

SMS Phishers Pivot to Points, Taxes, Fake Retailers

Sean December 4, 2025 0 0
whatsapp-sim.jpg
  • The Hacker News

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

[email protected] The Hacker News December 2, 2025 0 0
korean.jpg
  • The Hacker News

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

[email protected] The Hacker News December 2, 2025 0 1
Copyright © 2026 All rights reserved. | MoreNews by AF themes.