PQC Capabilities Matrix (PQCCM)

A list of software applications, libraries and hardware that includes support for Post Quantum Cryptography

The PKI Consortium is managing a PQC Capabilities Matrix (PQCCM) of software applications, libraries and hardware that includes support for Post Quantum Cryptography, without endorsing their implementation or quality.

The list includes a wide variety of software applications, libraries, and hardware from different vendors. The list should be considered a living document and a starting point. Considering the rapid change in the area such things can vary from day to day and complete freshness of information can only be gathered from vendors directly.

The PKI Consortium is actively working to promote the adoption of Post-Quantum Cryptography, and the capabilities matrix is a key part of that effort.

What the PQCCM does:

  • collects and aggregates information on PQC capabilities across the cybersecurity landspace (vendors, software, hardware, etc..)
  • lists products that provide PQC functionality to the end user, not merely for example PQC enabled TLS access to a non PQC enabled service

No other activities besides those listed above are under the purview of PKI Consortium (unless explicitly stated otherwise).

What the PQCCM doesn’t do:

  • review, vet, verify or test implementations or interoperability
  • perform source code review, formal review of algorithms, etc.
  • provide information, documentation or any recommended usage of Post Quantum Cryptography


❌The feature is currently not available
βœ”οΈThe feature is available for usage/test now
πŸ•The feature is planned on the product roadmap in the coming six monthsRoadmap items must not be added if they are not really scheduled to be implemented in the coming six month period. Roadmap items should be noted in the vendor section with a specific time, i.e. “Q2 2023” or similar.


The table lists information from vendors related to support for Post Quantum Cryptography.

The list is ordered alphabetically by vendor, there is no other meaning to the order.

VendorProductCategoryLast updatedComposite certificatesHybrid certificatesLMSXMSSFalconDilithiumSPHINCS+KyberBIKEMcElieceHQC
BotanBotanSoftware library2022-11-22βŒβŒβŒβœ”οΈβŒβœ”οΈβŒβœ”οΈβŒβœ”οΈβŒ
Bouncy CastleBCSoftware library2022-11-22βœ”οΈβœ”οΈβœ”οΈβœ”οΈβœ”οΈβœ”οΈβœ”οΈβœ”οΈβœ”οΈβœ”οΈβœ”οΈ
ISCCDKSoftware library2023-03-04βŒβŒβœ”οΈβŒβœ”οΈβœ”οΈβœ”οΈβœ”οΈβŒβœ”οΈβŒ
KeyfactorSignServerSigning Software2022-12-19βŒβŒβŒβŒβŒβœ”οΈβœ”οΈβŒβŒβŒβŒ
MTG AGCorporate PKIPKI2023-01-31βŒβŒβŒβŒβŒβŒβœ”οΈβŒβŒβœ”οΈβŒ
Open Quantum SafeliboqsSoftware library2022-11-30βŒβŒβŒβŒβœ”οΈβœ”οΈβœ”οΈβœ”οΈβœ”οΈβœ”οΈβœ”οΈ
Utimacou.trust IdentifyPKI2022-11-28βœ”οΈβŒβŒβŒβœ”οΈβœ”οΈβœ”οΈβŒβŒβŒβŒ

NOTE: HSS and XMSSMT are the multi tree variants of LMS and XMSS.

NOTE: The table does not consider variants of algorithms, for example Dilithium has had many changes during the NIST rounds so a checkbox in the Dilithium column does not mean products are necessarily interoperable. Consult the vendor sections for details.


The QxEDGE is a Hybrid Security Platform (HSP) which combines the features of a Quantum-Ready HSM with Confidential Computing support. The QxHSM is a network attached HSM. Both products are built around the Crypto4A QASM FIPS 140, Level 3 validated module. All of the supported PQC algorithms are supported natively and available as part of the baseline product. The QASM also contains classic and PQC roots of trust that are used to validate firmware, code and configuration updates signed using dual signatures using HSS/LMS and ECDSA. The QASM also uses hybrid key management approach that combines Classic McEliece and ECDH for inter-HSM, C4A-to-HSM and long term external archiving security. An upcoming update (available as part of regular M&S) will also enable classic, PQC and Hybrid remote key attestation using already pre-loaded classic and PQC attestation keys.


Primus HSM manufactured by Securosys. The listed features are based on the roadmap for 2023 and are subject to change depending on market demand and industry research.


uTrust Identify and Q-Safe firmware extension. Software simulator available, Dilithium in process of updated to round 3 version.

[Q-safe]https://utimaco.com/products/categories/further-solutions/q-safe) u.trust Identify


Functional module for Luna. Need functional modules enabled.

Bouncy Castle

Java and C# APIs with all NIST candidate support, and some older ones. Available as open source software. All NIST candidates available in Java from version 1.72 and C# from version 2.0.0.

The Bouncy Castle for kotlin open source package provides a script/command line interface for generating certificate chains with different algorithms, including hybrid certificates using X.509 section 9.8 alternative signatures.



The Entrust nShield Post-Quantum SDK enables post-quantum cryptographic applications for nShield HSMs with the CodeSafe SDK.


The Entrust ]PKI as a Service (PKIaaS)](https://www.entrust.com/digital-security/certificate-solutions/products/pki/managed-services/pki-as-a-service) for Post-Quantum Beta Program supports all three algorithms selected in round 3 of the NIST competition and can provide composite and pure quantum CA hierarchies.



SignServer performs server side signing and is capable of Post-Quantum signatures on CMS (RFC5662) messages as well as plain signatures. SPHINCS+ and Dilithium are supported from SignServer 6.0.


EJBCA PKI can create CAs and issue X.509 certificates signed using Post-Quantum algorithms. Available as open source software and containers with support for Dilithium and Falcon from EJBCA 8.0.


Fortanix DSM has LMS support, and NIST candidate signature algorithms on the roadmap for first half of 2023. See Algorithm Support

Open Quantum Safe

OQS is an open source software library that implements PQC algorithms, as well as integrations such as into OpenSSL.


Trident HSM is a general purpose network HSM developed by I4P that received the Common Criteria (CC) EAL4+ (EN 419221-5 as well as EN 419241-2) certification.

Cryptographic applications are enabled to use Post-Quantum algorithms (SPHINCS+ and Kyber) even in the CC restricted mode that helps with using hybrid solutions and the transition to PQC.


Open source CZERTAINLY platform implements experimental post-quantum cryptography algorithms support for certificate, cryptographic key, and digital signature lifecycle management and automation. The following PQC signature schemes are supported:

  • CRYSTALS-Dilithium


The 4769 cryptographic hardware product supports post-quantum algorithms using the CCA or EP11 APIs.


MTG Corporate PKI (https://www.mtg.de/en/public-key-infrastructures/corporate-pki/ ) consists of the two aligned product components MTG Certificate Authority (MTG CARA) and MTG Certificate Lifecycle Manager (CLM). A version supporting Post-Quantum algorithms and pure post quantum CA hierarchy is available for private test at https://pqc-pki.mtg.de.


ISC produces PKI/PQC-enabled applications (https://infoseccorp.com/pki/): CertAgent, a certificate authority; CSPid, a virtual smartcard with central repository for certificates and private keys; DAS, a webapp providing brokered encryption and authentication; SecretAgent, an encryption and digital signature utility; and cryptograhic libraries that offer post-quantum algorithms.


Botan is a C++ cryptography library released under the permissive Simplified BSD license. It offers the tools necessary to implement a range of systems, such as TLS protocol, X.509 certificates, AEAD ciphers, PKCS#11 and TPM hardware support, password hashing, and post quantum crypto schemes.


The following table contains references to the PQC capabilities and algorithms.

Composite certificateshttps://datatracker.ietf.org/doc/draft-ounsworth-pq-composite-keys/
Hybrid certificateshttps://datatracker.ietf.org/doc/html/draft-truskovsky-lamps-pq-hybrid-x509-01
Chameleon certificateshttps://datatracker.ietf.org/doc/draft-bonnell-lamps-chameleon-certs/
X.509 Alternative Signatures (section 9.8)https://www.itu.int/rec/T-REC-X.509-201910-I
NIST Recommendation for Stateful Hash-Based Signature SchemesSP800-208
Participate in our community discussions and/or join the consortium