The PKI Consortium is managing a PQC Capabilities Matrix (PQCCM) of software applications, libraries and hardware that includes support for Post Quantum Cryptography, without endorsing their implementation or quality.
The list includes a wide variety of software applications, libraries, and hardware from different vendors. The list should be considered a living document and a starting point. Considering the rapid change in the area such things can vary from day to day and complete freshness of information can only be gathered from vendors directly.
The PKI Consortium is actively working to promote the adoption of Post-Quantum Cryptography, and the capabilities matrix is a key part of that effort.
What the PQCCM does:
- collects and aggregates information on PQC capabilities across the cybersecurity landspace (vendors, software, hardware, etc..)
- lists products that provide PQC functionality to the end user, not merely for example PQC enabled TLS access to a non PQC enabled service
No other activities besides those listed above are under the purview of PKI Consortium (unless explicitly stated otherwise).
What the PQCCM doesn’t do:
- review, vet, verify or test implementations or interoperability
- perform source code review, formal review of algorithms, etc.
- provide information, documentation or any recommended usage of Post Quantum Cryptography
Legend
Symbol | Meaning | Comment |
---|---|---|
β | The feature is currently not available | |
βοΈ | The feature is available for usage/test now | |
π | The feature is planned on the product roadmap in the coming six months | Roadmap items must not be added if they are not really scheduled to be implemented in the coming six month period. Roadmap items should be noted in the vendor section with a specific time, i.e. “Q2 2023” or similar. |
Capabilities
The table lists information from vendors related to support for Post Quantum Cryptography.
The list is ordered alphabetically by vendor, there is no other meaning to the order.
Vendor | Product | Category | Last updated | Composite certificates | Hybrid certificates | LMS | XMSS | Falcon | Dilithium | SPHINCS+ | Kyber | BIKE | McEliece | HQC |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Botan | Botan | Software library | 2022-11-22 | β | β | β | βοΈ | β | βοΈ | β | βοΈ | β | βοΈ | β |
Bouncy Castle | BC | Software library | 2022-11-22 | βοΈ | βοΈ | βοΈ | βοΈ | βοΈ | βοΈ | βοΈ | βοΈ | βοΈ | βοΈ | βοΈ |
Crypto4A | QxEDGE | HSP | 2022-12-04 | π | βοΈ | βοΈ | βοΈ | π | βοΈ | βοΈ | βοΈ | β | βοΈ | β |
Crypto4A | QxHSM | HSM | 2022-12-04 | π | βοΈ | βοΈ | βοΈ | π | βοΈ | βοΈ | βοΈ | β | βοΈ | β |
CZERTAINLY | CZERTAINLY | Software | 2023-02-19 | β | β | β | β | βοΈ | βοΈ | βοΈ | β | β | β | β |
Entrust | nShield | HSM | 2022-11-22 | β | β | β | β | βοΈ | βοΈ | βοΈ | β | β | β | β |
Entrust | PKIaaS | PKI | 2022-11-22 | βοΈ | β | β | β | βοΈ | βοΈ | βοΈ | β | β | β | β |
Fortanix | FX2200 | HSM | 2022-11-29 | β | β | βοΈ | β | π | π | π | β | β | β | β |
I4P | Trident | HSM | 2022-12-01 | β | β | β | π | β | β | βοΈ | βοΈ | β | β | β |
IBM | 4769/CCA/EP11 | HSM | 2023-01-11 | β | β | β | β | β | βοΈ | β | β | β | β | β |
ISC | CDK | Software library | 2023-03-04 | β | β | βοΈ | β | βοΈ | βοΈ | βοΈ | βοΈ | β | βοΈ | β |
ISC | CertAgent | PKI | 2023-03-04 | β | β | π | β | βοΈ | βοΈ | βοΈ | βοΈ | β | βοΈ | β |
Keyfactor | SignServer | Signing Software | 2022-12-19 | β | β | β | β | β | βοΈ | βοΈ | β | β | β | β |
Keyfactor | EJBCA | PKI | 2022-12-19 | β | β | β | β | βοΈ | βοΈ | β | β | β | β | β |
MTG AG | Corporate PKI | PKI | 2023-01-31 | β | β | β | β | β | β | βοΈ | β | β | βοΈ | β |
Open Quantum Safe | liboqs | Software library | 2022-11-30 | β | β | β | β | βοΈ | βοΈ | βοΈ | βοΈ | βοΈ | βοΈ | βοΈ |
Securosys | Primus | HSM | 2022-11-28 | π | π | β | β | β | π | π | π | β | β | β |
Thales | Luna | HSM | 2022-11-22 | β | β | βοΈ | βοΈ | β | βοΈ | β | βοΈ | β | β | β |
Utimaco | Q-Safe | HSM | 2022-11-28 | β | β | βοΈ | βοΈ | β | βοΈ | β | βοΈ | β | β | β |
Utimaco | u.trust Identify | PKI | 2022-11-28 | βοΈ | β | β | β | βοΈ | βοΈ | βοΈ | β | β | β | β |
NOTE: HSS and XMSSMT are the multi tree variants of LMS and XMSS.
NOTE: The table does not consider variants of algorithms, for example Dilithium has had many changes during the NIST rounds so a checkbox in the Dilithium column does not mean products are necessarily interoperable. Consult the vendor sections for details.
Crypto4A
The QxEDGE is a Hybrid Security Platform (HSP) which combines the features of a Quantum-Ready HSM with Confidential Computing support. The QxHSM is a network attached HSM. Both products are built around the Crypto4A QASM FIPS 140, Level 3 validated module. All of the supported PQC algorithms are supported natively and available as part of the baseline product. The QASM also contains classic and PQC roots of trust that are used to validate firmware, code and configuration updates signed using dual signatures using HSS/LMS and ECDSA. The QASM also uses hybrid key management approach that combines Classic McEliece and ECDH for inter-HSM, C4A-to-HSM and long term external archiving security. An upcoming update (available as part of regular M&S) will also enable classic, PQC and Hybrid remote key attestation using already pre-loaded classic and PQC attestation keys.
Securosys
Primus HSM manufactured by Securosys. The listed features are based on the roadmap for 2023 and are subject to change depending on market demand and industry research.
Utimaco
uTrust Identify and Q-Safe firmware extension. Software simulator available, Dilithium in process of updated to round 3 version.
[Q-safe]https://utimaco.com/products/categories/further-solutions/q-safe) u.trust Identify
Thales
Functional module for Luna. Need functional modules enabled.
Bouncy Castle
Java and C# APIs with all NIST candidate support, and some older ones. Available as open source software. All NIST candidates available in Java from version 1.72 and C# from version 2.0.0.
The Bouncy Castle for kotlin open source package provides a script/command line interface for generating certificate chains with different algorithms, including hybrid certificates using X.509 section 9.8 alternative signatures.
Entrust
nShield
The Entrust nShield Post-Quantum SDK enables post-quantum cryptographic applications for nShield HSMs with the CodeSafe SDK.
PKIaaS
The Entrust ]PKI as a Service (PKIaaS)](https://www.entrust.com/digital-security/certificate-solutions/products/pki/managed-services/pki-as-a-service) for Post-Quantum Beta Program supports all three algorithms selected in round 3 of the NIST competition and can provide composite and pure quantum CA hierarchies.
Keyfactor
SignServer
SignServer performs server side signing and is capable of Post-Quantum signatures on CMS (RFC5662) messages as well as plain signatures. SPHINCS+ and Dilithium are supported from SignServer 6.0.
EJBCA
EJBCA PKI can create CAs and issue X.509 certificates signed using Post-Quantum algorithms. Available as open source software and containers with support for Dilithium and Falcon from EJBCA 8.0.
Fortanix
Fortanix DSM has LMS support, and NIST candidate signature algorithms on the roadmap for first half of 2023. See Algorithm Support
Open Quantum Safe
OQS is an open source software library that implements PQC algorithms, as well as integrations such as into OpenSSL.
I4P
Trident HSM is a general purpose network HSM developed by I4P that received the Common Criteria (CC) EAL4+ (EN 419221-5 as well as EN 419241-2) certification.
Cryptographic applications are enabled to use Post-Quantum algorithms (SPHINCS+ and Kyber) even in the CC restricted mode that helps with using hybrid solutions and the transition to PQC.
CZERTAINLY
Open source CZERTAINLY platform implements experimental post-quantum cryptography algorithms support for certificate, cryptographic key, and digital signature lifecycle management and automation. The following PQC signature schemes are supported:
- FALCON
- CRYSTALS-Dilithium
- SPHINCS+
IBM
The 4769 cryptographic hardware product supports post-quantum algorithms using the CCA or EP11 APIs.
MTG AG
MTG Corporate PKI (https://www.mtg.de/en/public-key-infrastructures/corporate-pki/ ) consists of the two aligned product components MTG Certificate Authority (MTG CARA) and MTG Certificate Lifecycle Manager (CLM). A version supporting Post-Quantum algorithms and pure post quantum CA hierarchy is available for private test at https://pqc-pki.mtg.de.
ISC
ISC produces PKI/PQC-enabled applications (https://infoseccorp.com/pki/): CertAgent, a certificate authority; CSPid, a virtual smartcard with central repository for certificates and private keys; DAS, a webapp providing brokered encryption and authentication; SecretAgent, an encryption and digital signature utility; and cryptograhic libraries that offer post-quantum algorithms.
Botan
Botan is a C++ cryptography library released under the permissive Simplified BSD license. It offers the tools necessary to implement a range of systems, such as TLS protocol, X.509 certificates, AEAD ciphers, PKCS#11 and TPM hardware support, password hashing, and post quantum crypto schemes.
References
The following table contains references to the PQC capabilities and algorithms.
Algorithm | Reference |
---|---|
Composite certificates | https://datatracker.ietf.org/doc/draft-ounsworth-pq-composite-keys/ |
Hybrid certificates | https://datatracker.ietf.org/doc/html/draft-truskovsky-lamps-pq-hybrid-x509-01 |
Chameleon certificates | https://datatracker.ietf.org/doc/draft-bonnell-lamps-chameleon-certs/ |
X.509 Alternative Signatures (section 9.8) | https://www.itu.int/rec/T-REC-X.509-201910-I |
LMS | https://www.rfc-editor.org/rfc/rfc8708.html |
XMSS | https://datatracker.ietf.org/doc/html/rfc8391 |
Falcon | https://falcon-sign.info |
Dilithium | https://pq-crystals.org/dilithium/resources.shtml |
SPHINCS+ | https://sphincs.org |
Kyber | https://pq-crystals.org/kyber/index.shtml |
BIKE | https://bikesuite.org |
McEliece | https://classic.mceliece.org |
HQC | https://pqc-hqc.org |
NIST Recommendation for Stateful Hash-Based Signature Schemes | SP800-208 |