Date Published: March 2025
Author(s)
Gorjan Alagic (NIST), Maxime Bros (NIST), Pierre Ciadoux (NIST), David Cooper (NIST), Quynh Dang (NIST), Thinh Dang (NIST), John Kelsey (NIST), Jacob Lichtinger (NIST), Yi-Kai Liu (NIST), Carl Miller (NIST), Dustin Moody (NIST), Rene Peralta (NIST), Ray Perlner (NIST), Angela Robinson (NIST), Hamilton Silberg (NIST), Daniel Smith-Tone (NIST), Noah Waller (NIST)
NIST is selecting public-key cryptographic algorithms through a public, competition-like process to specify additional digital signature, public-key encryption, and key-establishment algorithms to supplement FIPS 186-5, SP 800-56Ar3, and SP 800-56Br2. These algorithms are intended to protect sensitive information well into the foreseeable future, including after the advent of quantum computers. In the fourth round of the Post-Quantum Cryptography Standardization Process, NIST selected four candidate algorithms for key establishment to be studied: BIKE, Classic McEliece, HQC, and SIKE. This report describes the evaluation and selection process of these fourth-round candidates based on public feedback and internal review. The report summarizes each of the candidate algorithms and identifies those selected for standardization. The only key-establishment algorithm that will be standardized is HQC, and NIST will develop a standard based on HQC to augment its key-establishment portfolio.
NIST is selecting public-key cryptographic algorithms through a public, competition-like process to specify additional digital signature, public-key encryption, and key-establishment algorithms to supplement FIPS 186-5, SP 800-56Ar3, and SP 800-56Br2. These algorithms are intended to protect...
See full abstract
NIST is selecting public-key cryptographic algorithms through a public, competition-like process to specify additional digital signature, public-key encryption, and key-establishment algorithms to supplement FIPS 186-5, SP 800-56Ar3, and SP 800-56Br2. These algorithms are intended to protect sensitive information well into the foreseeable future, including after the advent of quantum computers. In the fourth round of the Post-Quantum Cryptography Standardization Process, NIST selected four candidate algorithms for key establishment to be studied: BIKE, Classic McEliece, HQC, and SIKE. This report describes the evaluation and selection process of these fourth-round candidates based on public feedback and internal review. The report summarizes each of the candidate algorithms and identifies those selected for standardization. The only key-establishment algorithm that will be standardized is HQC, and NIST will develop a standard based on HQC to augment its key-establishment portfolio.
Hide full abstract
Keywords
cryptography; key-encapsulation mechanism (KEM); key establishment; post-quantum cryp-tography; quantum-resistant; quantum-safe
Control Families
None selected