PQC Capabilities Matrix (PQCCM)

A list of software applications, libraries and hardware that includes support for Post Quantum Cryptography

The PKI Consortium is managing a PQC Capabilities Matrix (PQCCM) of software applications, libraries and hardware that includes support for Post Quantum Cryptography, without endorsing their implementation or quality.

The list includes a wide variety of software applications, libraries, and hardware from different vendors. The list should be considered a living document and a starting point. Considering the rapid change in the area such things can vary from day to day and complete freshness of information can only be gathered from vendors directly.

The PKI Consortium is actively working to promote the adoption of Post-Quantum Cryptography, and the capabilities matrix is a key part of that effort.

What the PQCCM does:

  • collects and aggregates information on PQC capabilities across the cybersecurity landspace (vendors, software, hardware, etc..)
  • lists products that provide PQC functionality to the end user, not merely for example PQC enabled TLS access to a non PQC enabled service

No other activities besides those listed above are under the purview of PKI Consortium (unless explicitly stated otherwise).

What the PQCCM doesn’t do:

  • review, vet, verify or test implementations or interoperability
  • perform source code review, formal review of algorithms, etc.
  • provide information, documentation or any recommended usage of Post Quantum Cryptography


This list is a collaborative effort. To contribute please raise an issue or a PR on the GitHub Repository.


The feature is currently not available
✔️The feature is available for usage/test now
🕐The feature is planned on the product roadmap in the coming six monthsRoadmap items must not be added if they are not really scheduled to be implemented in the coming six month period. Roadmap items should be noted in the vendor section with a specific time, i.e. “Q2 2023” or similar.


The table lists information from vendors related to support for Post Quantum Cryptography.

The list is ordered alphabetically by vendor, there is no other meaning to the order.

VendorProductCategoryLast updatedComposite certificatesHybrid certificatesLMSXMSSFalconDilithiumSPHINCS+KyberBIKEMcElieceHQC
BotanBotanSoftware library2023-10-04🕐✔️✔️✔️✔️🕐
Bouncy CastleBCSoftware library2022-11-22✔️✔️✔️✔️✔️✔️✔️✔️✔️✔️✔️
IBMCrypto Express 7S (CEX7S) / CCA/EP11HSM2023-01-22✔️
IBMCrypto Express 8S (CEX8S) / CCA/EP11HSM2023-01-22✔️✔️
InfoSec GlobalAgileSec AnalyticsSoftware2024-04-24✔️✔️🕐✔️✔️✔️🕐🕐🕐
Infrasoft Pty LtduLinga SuiteSoftware2024-05-24🕐
ISCCDKSoftware library2023-03-04✔️✔️✔️✔️✔️✔️
KeyfactorSignServerSigning Software2022-12-19✔️✔️✔️
MTG AGCorporate PKIPKI2023-09-25✔️✔️✔️🕐✔️
Nexus GroupCertificate ManagerPKI2024-03-13🕐🕐🕐
Open Quantum SafeliboqsSoftware library2022-11-30✔️✔️✔️✔️✔️✔️✔️
Utimacou.trust IdentifyPKI2022-11-28✔️✔️✔️✔️

NOTE: HSS and XMSSMT are the multi tree variants of LMS and XMSS.

NOTE: The table does not consider variants of algorithms, for example Dilithium has had many changes during the NIST rounds so a checkbox in the Dilithium column does not mean products are necessarily interoperable. Consult the vendor sections for details.


The QxEDGE is a Hybrid Security Platform (HSP) which combines the features of a Quantum-Ready HSM with Confidential Computing support. The QxHSM is a network attached HSM. Both products are built around the Crypto4A QASM FIPS 140, Level 3 validated module. All of the supported PQC algorithms are supported natively and available as part of the baseline product. The QASM also contains classic and PQC roots of trust that are used to validate firmware, code and configuration updates signed using dual signatures using HSS/LMS and ECDSA. The QASM also uses hybrid key management approach that combines Classic McEliece and ECDH for inter-HSM, C4A-to-HSM and long term external archiving security. An upcoming update (available as part of regular M&S) will also enable classic, PQC and Hybrid remote key attestation using already pre-loaded classic and PQC attestation keys.


Primus HSM manufactured by Securosys. The listed features are based on the roadmap for 2023 and are subject to change depending on market demand and industry research.


uTrust Identify and Q-Safe firmware extension. Software simulator available, Dilithium in process of updated to round 3 version.

[Q-safe]https://utimaco.com/products/categories/further-solutions/q-safe) u.trust Identify


Functional module for Luna. Need functional modules enabled.

Bouncy Castle

Java and C# APIs with all NIST candidate support, and some older ones. Available as open source software. All NIST candidates available in Java from version 1.72 and C# from version 2.0.0.

The Bouncy Castle for kotlin open source package provides a script/command line interface for generating certificate chains with different algorithms, including hybrid certificates using X.509 section 9.8 alternative signatures.

Nexus Group

PQC online test service available starting April 2024. Support for pure-PQC certificate with Dilithium, Falcon and Sphincs+ algorithms first. Later support for Hybrid and composite certificates will be added. General available version will be released depending on progress of standardization process.



The Entrust nShield Post-Quantum SDK enables post-quantum cryptographic applications for nShield HSMs with the CodeSafe SDK.


The Entrust ]PKI as a Service (PKIaaS)](https://www.entrust.com/digital-security/certificate-solutions/products/pki/managed-services/pki-as-a-service) for Post-Quantum Beta Program supports all three algorithms selected in round 3 of the NIST competition and can provide composite and pure quantum CA hierarchies.


EVERTRUST Stream is a PKI CA/VA/TSA and EVERTRUST Horizon is a PKI RA and CLM software. Both products are currently able to issue and manage pure-PQC and hybrid backard-compatible certificates based on Dilithium/Falcon/Sphincs+ algorithms. However the versions of the software that do so are yet unreleased. Release is planned upon completion of the standardization process.



SignServer performs server side signing and is capable of Post-Quantum signatures on CMS (RFC5662) messages as well as plain signatures. SPHINCS+ and Dilithium are supported from SignServer 6.0.


EJBCA PKI can create CAs and issue X.509 certificates signed using Post-Quantum algorithms. Available as open source software and containers with support for Dilithium and Falcon from EJBCA 8.0.


Fortanix DSM has LMS support, and NIST candidate signature algorithms on the roadmap for first half of 2023. See Algorithm Support

Open Quantum Safe

OQS is an open source software library that implements PQC algorithms, as well as integrations such as into OpenSSL.


Trident HSM is a general purpose network HSM developed by I4P that received the Common Criteria (CC) EAL4+ (EN 419221-5 as well as EN 419241-2) certification.

Cryptographic applications are enabled to use Post-Quantum algorithms (SPHINCS+ and Kyber) even in the CC restricted mode that helps with using hybrid solutions and the transition to PQC.


Open source CZERTAINLY platform implements experimental post-quantum cryptography algorithms support for certificate, cryptographic key, and digital signature lifecycle management and automation. The following PQC signature schemes are supported:

  • CRYSTALS-Dilithium


The Crypto Express (CEX7S & CEX8S) cryptographic hardware security module products work with certain IBM Z® servers and the Integrated Cryptographic Service Facility (ICSF) to support post-quantum algorithms. Support is also available for Linux on Z and LinuxONE. The 4769 cryptographic hardware security module product supports post-quantum algorithms using the CCA APIs on x64 and IBM Power® servers.


MTG Corporate PKI consists of the two aligned product components MTG Certificate Authority (MTG CARA) and MTG Certificate Lifecycle Manager (CLM). MTG CARA as been extended by the PQC algorithms ML-DSA (Dilithium), SLH-DSA (SPHINCS⁺), and Falcon.

Furthermore, we provide an online demo of a PQC CARA version supporting the McEliece and SPHINCS⁺ post-quantum algorithms and a post quantum CA hierarchy that is available for private test at https://pqc-pki.mtg.de.


ISC produces PKI/PQC-enabled applications (https://infoseccorp.com/pki/): CertAgent, a certificate authority; CSPid, a virtual smartcard with central repository for certificates and private keys; DAS, a webapp providing brokered encryption and authentication; SecretAgent, an encryption and digital signature utility; and cryptographic libraries that offer post-quantum algorithms.


Botan is a C++ cryptography library released under the permissive Simplified BSD license. It offers the tools necessary to implement a range of systems, such as TLS protocol, X.509 certificates, AEAD ciphers, PKCS#11 and TPM hardware support, password hashing, and post quantum crypto schemes.


Ascertia PQC Matrix

ADSS Server

ADSS Server is a modular trust services platform that offers PKI and digital signature services. The following services are being updated to support Post-Quantum algorithms in the first half of 2024.

ADSS Signing Server

ADSS Signing Server performs server side signing and eSealing and will support CRYSTALS-Dilithium PKCS#1 and CMS signatures.

ADSS SAM Service

The ADSS SAM Server performs eIDAS compliant remote authorised server side signing and eSealing will support CRYSTALS-Dilithium PKCS#1 signatures.


ADSS PKI Server can create CAs and issue X.509 certificates signed using Post-Quantum algorithms. The following PQC schemes are on the roadmap for 1st half of 2024:

  • CRYSTALS-Dilithium
  • Classic McEliece
  • Kyber


Infrasoft specialises in communication software with its uLinga product suite. Support for Kyber-based hybrid key exchanges proposed for TLS 1.3 is currently being implemented to secure sensitive data processed by the software.


The following table contains references to the PQC capabilities and algorithms.

FIPS drafts for commenthttps://csrc.nist.gov/News/2023/three-draft-fips-for-post-quantum-cryptography
Composite certificateshttps://datatracker.ietf.org/doc/draft-ounsworth-pq-composite-keys/
Hybrid certificateshttps://datatracker.ietf.org/doc/html/draft-truskovsky-lamps-pq-hybrid-x509-01
Chameleon certificateshttps://datatracker.ietf.org/doc/draft-bonnell-lamps-chameleon-certs/
X.509 Alternative Signatures (section 9.8)https://www.itu.int/rec/T-REC-X.509-201910-I
NIST Recommendation for Stateful Hash-Based Signature SchemesSP800-208
Participate in our community discussions and/or join the consortium