Hi,
Thanks to everybody that participated in the side-meeting! The meeting was a great success with well over 100 participants from governments, industry, and academia. The goal of the meeting was to promote open dialogue and understanding between technical experts and government officials regarding the transition to PQC. EU, Sweden, Germany, UK, US, and Canada all presented their plans for PQC timelines and algorithm recommendations. My feeling is that people were very happy with the meeting, and I have already received questions if I can help to arrange follow-up meetings.
Recording, transcript, and slides from the meeting are now available [1-2]. Shortly after the meeting, UK NCSC published their timelines as promised [3]. The European commission will soon publish their timelines [4]. US timelines can be found here [5-8]. Government timelines and algorithms recommendations from Canada, Germany, France, and China can be found here [9-18].
If I missed something important, just send a reply and let the list know.
Cheers,
John Preuß Mattsson
Expert Cryptography and Security Protocols, Ericsson
My personal summary:
[1] PQC Dialogue with Government Stakeholders – Recording, summary, and transcript
[2] PQC Dialogue with Government Stakeholders – Slides
https://emanjon.github.io/Slides/2025%20PQC%20side-meeting.pdf
[3] UK NCSC, Timelines for migration to post-quantum cryptography
https://www.ncsc.gov.uk/guidance/pqc-migration-timelines
[4] European Commission, NIS Cooperation Group
https://digital-strategy.ec.europa.eu/en/policies/nis-cooperation-group
[5] US NSA, “The Commercial National Security Algorithm Suite 2.0 and Quantum Computing FAQ”
https://media.defense.gov/2022/Sep/07/2003071836/-1/-1/0/CSI_CNSA_2.0_FAQ_.PDF
[6] US NIST, Announcing Approval of Three Federal Information Processing Standards (FIPS) for Post-Quantum Cryptography
https://csrc.nist.gov/news/2024/postquantum-cryptography-fips-approved
[7] US NIST, Post-Quantum Cryptography
https://csrc.nist.gov/projects/post-quantum-cryptography
[8] US NIST, IR 8547, ”Transition to Post-Quantum Cryptography Standards”
https://nvlpubs.nist.gov/nistpubs/ir/2024/NIST.IR.8547.ipd.pdf
[9] Canada Cyber Centre, Cryptographic algorithms for UNCLASSIFIED, PROTECTED A, and PROTECTED B information
https://www.cyber.gc.ca/en/guidance/cryptographic-algorithms-unclassified-protected-protected-b-information-itsp40111
[10] Canada Cyber Centre, National Quantum Strategy roadmap: Quantum communication and post-quantum cryptography
https://ised-isde.canada.ca/site/national-quantum-strategy/en/national-quantum-strategy-roadmap-quantum-communication-and-post-quantum-cryptography
[11] German BSI, Cryptographic Mechanisms: Recommendations and Key Lengths
[12] German BSI, Post-Quantum Policy & Roadmap of the BSI
[13] French ANSSI, “Guide des Mécanismes cryptoraphiques”
https://cyber.gouv.fr/sites/default/files/2021/03/anssi-guide-mecanismes_crypto-2.04.pdf
[14] French ANSSI, ANSSI views on the Post-Quantum Cryptography transition
[15] French ANSSI, ANSSI plan for post-quantum transition
[16] Europe, SOGIS Group, supporting documents
https://www.sogis.eu/uk/supporting_doc_en.html
[17] China ICCS, Call for Comments on Submission Requirements for Public-Key Cryptographic Algorithms
https://niccs.org.cn/en/notice/
[18] German BSI, French ANSSI, Dutch and Swedish NCSA, ”Position Paper on Quantum Key Distribution”
https://www.forsvarsmakten.se/contentassets/f7199ed1b90f41529b76970bdb5fce1c/position-paper-on-quantum-key-distribution.pdf
John,
Thanks for the summary of the meeting. I just wanted to correct the UK NCSC position: we’re not recommending the use of hybrids to speed up migration.
Our 2024 whitepaper says that technical system and risk owners should weigh the reasons for and against hybrids when deciding how to migrate. One of the reasons for considering hybrids is that, when used in a flexible protocol, they could help with a phased migration in large networks. Another is when protocol constraints mean that it is difficult to remove the traditional algorithm. However, these still need to be balanced against the increased cost and complexity. The only recommendation is that, if a hybrid is chosen, it is used as an interim measure that allows a straightforward migration to PQ-only in the future.
There are no recommendations about hybrids in our recent migration timelines.
Best,
Peter
--
You received this message because you are subscribed to the Google Groups "pqc-forum" group.
To unsubscribe from this group and stop receiving emails from it, send an email to pqc-forum+...@list.nist.gov.
To view this discussion visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/GVXPR07MB96788A01934A6D20C21693768996A%40GVXPR07MB9678.eurprd07.prod.outlook.com.
Hi,
Australia has also published timelines and is not recommending hybrids but, "it is not prohibited" [1].
I think i am slowly changing my mind given the timeline (2030 for
gov in AU), the lack of support and visibility with Hybrid in
regard to signing. hybrid and KEM might be a given.
This email represent my personal view but i think the topic is very interesting and questionable. May be not as an interim measure [non PQC + PQC] but later [PQC1 + PQC2]?
Will AD support hybrid and which technology (chameleon,
composite)? there is no RFC approved so far as far as i know.
We also see problem coming with single signing and size with protocols (TLS vs KEMTLS) so it is lowering the appetite for hybrid.
Regards
At the risk of “holding the stick from the wrong end”, I had the feeling that p-256 was the “bee's knees” 😉
Dr. Buchanan
From: pqc-...@list.nist.gov <pqc-...@list.nist.gov>
On Behalf Of Markku-Juhani O. Saarinen
Sent: May 15, 2025 11:00 AM
To: pqc-forum <pqc-...@list.nist.gov>
Cc: bruno <bruno.p...@gmail.com>; Peter Campbell <campbe...@gmail.com>; John Mattsson <john.m...@ericsson.com>
Subject: Re: [pqc-forum] PQC Dialogue with Government Stakeholders - Recording, Transcript, and Slides
⚠️CAUTION: This email is from an external source. Verify sender before opening links and attachments.⚠️ |
To view this discussion visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/29244a39-c9ca-473d-a3ac-2ebdb4af22can%40list.nist.gov.
Hi, I wrote a private note to articulate options and clarify my
ideas. this is not academic and i will not share it.
Below is where i landed.
Basically today May 2025, I would recommend to accept the risk of
using one scheme (ML-DSA) but to monitor the emergence of hybrid.
Hybrid is more secure in the transition and my preference is
composite (unforgeability/non separability) but it is not mature
as far as i can think.
I already did change my mind once on this topic and i think i can later change again. so the control is to review the temporarily decision later if that make sense.
IMO
Arne Padmos wrote:
>the timelines for the NIS2 PQC recommendations are too far out.
Yes, it's very clear that EU is behind. Likely because of some ill-guided focus on QKD, which is quite irrelevant and at best could be used as defence-in-depth for a very small fraction of public-key use cases in the long-term future. When the NIS2 PQC technical recommendations come out in 2026, most standardization and product decisions will already have been made.
The time to start inventory, planning, and prioritization was in 2022 when NSM-10 [1] came out. If you wait until you have a full inventory of your cryptographic assets, you'll never get started. The key is to begin transitioning high-value assets now (or even better yesterday).
I like a lot in the UK NCSC timelines [3], but working on inventory until 2028 and then complete migration off high-priority deployed systems in just a few years (2028-2031), seems optimistic. I would like more governments stating that you should begin migration as much as possible already now. This is what I am hearing from Swedish government and I fully agree. I would also like to see more focus on firmware and software update. I agree with CNSA 2.0 that this is prioritized. HW roots-of-trust can typically not be updated after manufacturing and hardware in infrastructure often lives for decades. If you are not prioritizing firmware and software updates, you either have to live with quantum-vulnerable infrastructure, or take the cost and replace hardware long before otherwise needed.
Arne Padmos wrote:
>I know you're very much against closed standards
I think the most important thing is that the final standards are freely available. ETSI standards, except these for national security, is to my knowledge freely available. Hopefully paywalled standards referenced in laws is a thing of the past. I completely agree with the EU and US courts have decided that access to standards referenced by law is a human right. I love that the European Commision has publised several ISO standards that were previously paywalled. The IETF is also doing its part and RFC8446bis (TLS 1.3) will remove all normative references to paywalled standards. I think paywalled standards are extra problematic for cryptography and I consider them a major cybersecurity risk. Not only are paywalled standards more likely to contain vulnerabilities, they also vastly increase the risk of implementations vulnerabilities, and enables distribution of backdoored specifications to specific users (which happened in the past with Swiss Crypto AG [2]).
Oscar Smith wrote:
>Why is anyone not recommending hybrids?
Many European agencies are not just recommending but requiring hybridization of lattice-based crypto.
That makes sense for signatures where things are very unclear. I start to doubt that hybrids will ever be widely used and talking to major ICT companies, I get the feeling noone want to do hybrid signatures. For KEMs I think the opposite is true. ML-KEM hybrids like X25519MLKEM768 have far more implementation and deployments than standalone ML-KEM in TLS and SSH. IKEv2 will only do hybrid KEMs, even in CNSA 2.0 systems. This is also what the TLS WG has concluded in their prioritization.. If you want to migrate asap, hybrid KEMs is the clear answer.
[1] National Security Memorandum on Promoting United States Leadership in Quantum Computing While Mitigating Risks to Vulnerable Cryptographic Systems
[2] Crypto AG
John thanks for this comments. he has to be written to be discussed but because the cost of this controls for KEM is nothing versus the cost of the impact then It is already here.
so nobody will discuss that hopefully,
May be we could negative that rationale for signing?
gard...@gmail.com wrote:
>I think the main reason for not doing hybrid is timelines.
That makes sense for signatures where things are very unclear. I start to doubt that hybrids will ever be widely used and talking to major ICT companies, I get the feeling noone want to do hybrid signatures. For KEMs I think the opposite is true. ML-KEM hybrids like X25519MLKEM768 have far more implementation and deployments than standalone ML-KEM in TLS and SSH. IKEv2 will only do hybrid KEMs, even in CNSA 2.0 systems. This is also what the TLS WG has concluded in their prioritization.. If you want to migrate asap, hybrid KEMs is the clear answer.
I
completely agree from day 0