FIPS 203 · 204 · 205 · 206 · 5th NIST selection HQC

The post-quantum cryptography explorer

Compare the NIST-standardised post-quantum algorithms KavachQ will deploy across your estate. Understand sizes, performance, and which algorithm fits which use case.

Shor's Algorithm · 1994

Breaks RSA & ECC

A sufficiently large quantum computer running Shor's algorithm factors integers and solves discrete logarithms in polynomial time — collapsing today's RSA, DH, and ECC.

Grover's Algorithm · 1996

Halves symmetric strength

Grover's quadratic speed-up halves the effective key strength of symmetric ciphers. AES-128 becomes ~64-bit; AES-256 remains comfortably safe and is the right post-quantum default.

CRQC

The threshold that matters

A Cryptographically Relevant Quantum Computer is one large enough to run Shor's algorithm against real-world keys. Mainstream estimates place a CRQC within the 2030s.

Key Encapsulation Mechanisms (KEM)

Replacing ECDH and RSA key exchange

KEMs establish shared secrets between parties. ML-KEM replaces ECDH / RSA key exchange in TLS, VPN, and messaging protocols.

AlgorithmStandardFamilyStatus Sec. LevelPublic KeyCiphertextPerformance
ML-KEM (Kyber)FIPS 203LatticeNIST Finalized1800 B768 B~0.04 ms
31184 B1088 B~0.06 ms
51568 B1568 B~0.08 ms
HQCDraft FIPS pendingCode-basedNIST 5th Selection12249 B4497 B~0.1 ms
34522 B9042 B~0.2 ms
57245 B14469 B~0.4 ms
BIKENIST Round 4Code-basedNot Selected11541 B1573 B~0.1 ms
33083 B3115 B~0.2 ms
RSAPKCS#1 / RFC 8017FactoringQuantum Vulnerable112-bit cl.256 B~1 ms
128-bit cl.384 B~3 ms
~140-bit cl.512 B~8 ms
Digital Signature Algorithms

Replacing RSA and ECDSA signatures

Digital signatures authenticate identity and data integrity. ML-DSA, SLH-DSA, and FN-DSA are the post-quantum replacements.

AlgorithmStandardFamilyStatus Sec. LevelPublic KeySignatureSign / Verify
ML-DSA (Dilithium)FIPS 204LatticeNIST Finalized21312 B2420 B~0.15 / ~0.05 ms
31952 B3309 B~0.25 / ~0.08 ms
52592 B4627 B~0.38 / ~0.10 ms
SLH-DSA (SPHINCS+)FIPS 205Hash-basedNIST Finalized132 B7856 B~50 / ~3 ms
132 B17088 B~3 / ~0.5 ms
564 B29792 B~200 / ~6 ms
FN-DSA (Falcon)FIPS 206 (Draft)LatticeNIST Finalizing1897 B666 B~0.5 / ~0.05 ms
51793 B1280 B~1 / ~0.10 ms
RSAPKCS#1 / RFC 8017FactoringVulnerable112-bit cl.256 B256 B~1 / ~0.03 ms
128-bit cl.384 B384 B~3 / ~0.05 ms
~140-bit cl.512 B512 B~8 / ~0.08 ms
ECDSAFIPS 186-5Elliptic CurveVulnerable128-bit cl.64 B64 B~0.05 / ~0.10 ms
192-bit cl.96 B96 B~0.15 / ~0.30 ms
Algorithm Deep Dives

Detailed profiles

Description, strengths, limitations, and recommended use cases for each algorithm.

Strategic Decision Guide

What should your team adopt?

Match your infrastructure needs to the right algorithm.

Use Case

TLS / VPN Key Exchange

You need a KEM to replace ECDH for establishing shared secrets.

RECOMMENDED
ML-KEM-768 (FIPS 203)

Already adopted by Chrome, Firefox, Cloudflare, and AWS. Use hybrid (X25519 + ML-KEM) during transition.

Use Case

Code Signing / Certificates

You need digital signatures for software distribution and PKI.

RECOMMENDED
ML-DSA-65 (FIPS 204)

Good balance of key/signature size and performance. Use SLH-DSA as a conservative backup for root certificates.

Use Case

IoT / Embedded Systems

Constrained devices with limited bandwidth and storage.

RECOMMENDED
FN-DSA-512 + ML-KEM-512

FN-DSA has the smallest signatures among lattice schemes. Careful implementation needed to avoid side channels.

Use Case

Maximum Conservative Security

Applications where the cost of a break is catastrophic (nuclear, defence, long-lived secrets).

RECOMMENDED
SLH-DSA-256s + ML-KEM-1024

SLH-DSA relies only on hash function security — the most conservative assumption. Large signatures acceptable for high-stakes use.