Skip to content

   We secure embedded systems

Facing the Quantum Threat

The rise of quantum computing promises breakthroughs in science, industry, and technology, but it also brings unprecedented risks to digital security. Quantum computers will have the processing power to break many of today’s widely used public key encryption and digital signature algorithms, making them obsolete soon.

When that happens, the consequences could be severe:

  • Identity theft on a massive scale
  • Device impersonation in critical systems
  • Compromise of sensitive communications across industries

For security-conscious product developers, the message is clear: the time to act is now. Identifying vulnerable products and systems to start the migration to quantum-safe cryptography.

The Quantum Threat has already begun

While large-scale quantum computers capable of breaking today’s algorithms may still be years away, cyber adversaries aren’t waiting. They are already engaging in harvest now, decrypt later attacks, what means they are collecting encrypted data today with the intent to decrypt it in the future when quantum computers become available.

Because sensitive data can retain its value for years or even decades, protecting it now is essential. This is especially critical for long-lifecycle devices such as embedded systems and FPGAs, where development, testing, certification, and deployment can span many years. Delaying action means deploying devices that could be vulnerable before their lifecycle ends.

The global Shift to PQC

To address this threat, the U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) launched the world’s largest open effort to design and standardize Post-Quantum Cryptography (PQC) algorithms.

This multi-year process brought together leading cryptographers worldwide to develop algorithms that proved to be resilient against those attacks.

The result: a set of NIST-standardized PQC algorithms, including:

  • Module-Lattice-based Key Encapsulation Mechanism (ML-KEM) which enables two parties to securely establish a shared secret key over an untrusted public channel that creates the foundation for encrypted communication
  • Module-Lattice-based Digital Signature Algorithm (ML-DSA) that enables the creation of unique digital signatures, to allow others to verify the integrity of the message and authenticity of its sender

These algorithms are now ready for implementation and KiviCore’s PQC IP cores make it possible to deploy them efficiently and securely in FPGA designs today.

Post-quantum-resistant IP cores from KiviCore

KiviPQC-KEM

0

KiviPQC-DSA

8 /month

KiviPQC-Box

16 /month

KiviPQC-KEM

KiviPQC-DSA

KiviPQC-Box

Description
Supports ML-KEM Algorithm. Lays the foundation for encrypted communication by allowing two parties to securely establish a shared secret key over a public channel.
Supports ML-DSA Algorithm. Enables the creation of digital signatures to verify the origin of a message and protect it from undetected modifications.
Supports ML-KEM and ML-DSA algorithm. Creates digital signatures for integrity and authenticity, and enables secure key exchange for encrypted communication.

IP Core Variants

Tiny
Optimized for minimal logic resource usage. Ideal when FPGA resources or power budgets are tight.
Fast
Optimized for fast processing. For designs that desire higher performance while maintaining efficient resource utilization. 

Options

Verification of digital signatures only
The IP core is available as a option for verification of digital signatures only. This can be ideally used for devices which only need to verify signed data.
-
-

PQC NIST Standards

FIPS 203 ML-KEM
ML-KEM is an algorithm standardized by NIST that enables two parties to securely establish a shared secret key over an untrusted public channel.
-
FIPS 203 ML-DSA
ML-DSA is an algorithm standardised by NIST that ensures authenticity and integrity of digital signatures.
-

Key Features

Available for any FPGA and ASIC
Parameter sets
Sets are in order of increasing security strength and decreasing performance
Supports ML-KEM 512/768/1024 sets
Supports ML-DSA 44/65/87 sets
Supports ML-KEM 512/768/1024 and ML-DSA 44/65/87 sets
Protection against timing-based side channel attacks
Description

Featured Blog Posts

 

Post-Quantum-Cryptography (PQC) Cryptography

Future-Proofing Embedded Systems: Why Post-Quantum ...

Andreas Weder, Phd - CTO & Co-Founder -  
6 February 2025
1. Introduction As technology progresses, the rise of quantum computing brings both exciting opportunities and serious challenges, particularly in the field of cybersecurity. ...