# Frequently Asked Questions

### What is post-quantum? What does quantum-safe mean?

PQ stands for **post-quantum cryptography**, which is cryptography that aims to be resistant to attack by quantum computers. Post-quantum cryptography is also sometimes called **quantum-resistant cryptography** or **quantum-safe cryptography**. See our short primer on post-quantum cryptography or read more details at Wikipedia.

### Does post-quantum cryptography require a quantum computer?

No, post-quantum cryptography does not require a quantum computer to run: post-quantum algorithms can be implemented on today’s computers. Post-quantum means that the algorithms are conjectured to be secure even if an attacker someday has a quantum computer.

### Are post-quantum algorithms really secure?

Like most cryptography algorithms, post-quantum cryptography algorithms rely on assumptions that certain mathematical problems are hard to break. In general, we do not have proofs that these mathematical problems are in fact hard to break, but mathematicians and cryptographers around the world who have studied these algorithms intently have not been able to succeed in breaking them.

### What is the status of PQ standardization?

The worldwide effort for developing and standardizing is centred around the NIST Post-Quantum Cryptography Standardization Project. In 2016, the NIST PQC project issued a call for proposals for quantum-resistant digital signature and key encapsulation mechanisms, kicking off a multi-year project to standardize one or more quantum-resistant cryptosystems after several rounds of public review and comment. In 2022, NIST announced its selection of 4 algorithms for standardization: the key encapsulation mechanism CRYSTALS-Kyber, and three signature schemes CRYSTALS-Dilithium, Falcon, and SPHINCS+. In 2023, NIST released draft standards for 3 of those algorithms, with a goal of publishing those standards in 2024. NIST continues to evaluate additional post-quantum algorithms for potential standardization.

Standardization of post-quantum algorithms is also taking place in other bodies. The Crypto Forum Research Group within the Internet Engineering Task Force has standardized two stateful hash-based signature schemes (XMSS and LMS/HSS). The International Organization for Standardization (ISO) is also considering the standardization of several post-quantum algorithms. Other countries are also evaluating and standardizing post-quantum cryptography.

As of February 2024, here is the status of NIST and IETF standards-track post-quantum algorithms:

Key encapsulation mechanisms:

- ML-KEM a.k.a. CRYSTALS-Kyber: draft standard from NIST

Digital signature schemes:

- ML-DSA a.k.a. CRYSTALS-Dilithium: draft standard from NIST
- Falcon: draft standard under development by NIST
- SLH-DSA a.k.a. SPHINCS+: draft standard from NIST
- XMSS: standard from CFRG / IRTF
- LMS/HSS: standard from CFRG / IRTF

### What’s a key encapsulation mechanism?

A **key encapsulation mechanism (KEM)** is a public key cryptographic scheme that allows two parties to establish a shared secret key using only public communication. The primary security property provided by a KEM is confidentiality.

KEMs are closely related to public key encryption, with one major difference: in a public key encryption scheme, the sender can choose a message to transmit confidentially to the receiver, whereas in a KEM, the sender cannot choose the message to be sent, instead the shared secret key that is established by the KEM between the sender and the receiver is random, not controlled by either the sender or the receiver. KEMs can be viewed as a generalization of Diffie–Hellman key exchange.

KEMs are often used in secure channel establishment protocols like TLS in order to set up a symmetric encryption key that is subsequently used in a symmetric key encryption scheme like AES to encrypt application data.

### How can I encrypt things using ML-KEM (Kyber)?

ML-KEM (Kyber) is a key encapsulation mechanism, not a public key encryption scheme. See the question above to learn about key encapsulation mechanisms and how they differ from public key encryption schemes.

It is possible to build a public key encryption scheme by combining a KEM with a symmetric encryption scheme; this is often called the “KEM/DEM approach” or “hybrid public key encryption” (in that phrase, “hybrid” means “hybrid public key / symmetric” rather than “hybrid classical / post-quantum”). One standard for doing this is HPKE (RFC 9180).

### How can I sign things using a ML-KEM (Kyber) certificate?

ML-KEM (Kyber) is a key encapsulation mechanism (see the above question to learn more about KEMs), not a digital signature scheme. This means that the security goal of ML-KEM is confidentiality, not authentication. You need to use a digital signature scheme like ML-DSA (Dilithium) in order to digitally sign a message.

### What is OQS?

The Open Quantum Safe project is an open-source software project to support the transition post-quantum cryptography. OQS implements a broad set of post-quantum cryptography algorithms, including some algorithms that are in the process of being standardized. Read more about the OQS project on our about page.

### Is OQS safe to use?

OQS began as a research project to enable the prototyping and evaluation of quantum-resistant cryptography. As the field of post-quantum cryptography starts to mature with emerging standards, it is our goal to mature our codebase into a production-track version that is suitable for use in production environments, while also maintaining an experimental-track version of the our suite that continues to support research and development in new post-quantum cryptography algorithms.

At present, the post-quantum algorithms in OQS have not been adopted as standards by NIST, and the implementations in OQS have not been subject to external audit. For these two reasons, we recommend extreme caution regarding the use of OQS in production environments at this time. With added support from the Post-Quantum Cryptography Alliance, we intend to increase our efforts to de-risk such use.

Read about the limitations of our software on our about page.

### How can I use post-quantum cryptography in TLS / X.509 / S/MIME/CMS?

The easiest way to get started in experimenting with post-quantum algorithms in network protocols like TLS, X.509, and S/MIME or CMS is to use OpenSSL 3 combined with the oqs-provider, which adds support for all the post-quantum algorithms supported by the OQS project into those network protocols in OpenSSL 3-reliant applications.

You can also get started with our pre-built Docker images for experiments in many applications in our OQS Demos repository.

### How can I use post-quantum cryptography in <my favourite programming language>?

Our liboqs project is a C language library with support for many post-quantum algorithms. We have thin wrappers that provide bindings for these algorithms in many languages, including C++, Go, Java, .NET, Python, and Rust. Note that these language wrappers only expose the basic algorithm APIs for directly calling; they do not integrate the PQ algorithms into higher level cryptographic APIs of the language (for example, liboqs-java and liboqs-python lets you directly call the key generation, sign, and verify algorithms of a PQ signature scheme, but does not add support for PQ algorithms to Java or Python’s X.509 layer or TLS layer.)

### How can I use post-quantum cryptography on my website and in my web browser?

In our OQS Demos, we provide example Docker images for running web server and web browser demos using post-quantum algorithms implemented by OQS. We also operate a test web server for testing post-quantum TLS connections.

However, post-quantum cryptography has not yet been fully deployed in mainstream web servers and web browsers, but some have started to deploy a selection of algorithms. Google Chrome is starting to roll out support for hybrid post-quantum cryptography, so it may be available in some users’ browsers. Most web servers do not yet support post-quantum cryptography, but some big providers and content distribution networks do, such as Cloudflare 1, 2.

### How can I get involved?

All of our development takes place on our GitHub repositories. Stop on by, we’d love to hear from you!

### What is the relationship between OQS and the PQ Code Package?

The PQ Code Package is a newly launched project of the Linux Foundation, and is a sister project to the Open Quantum Safe project. The PQ Code Package project aims to build high-assurance and formally verified software implementations of standards-track post-quantum cryptography algorithms, starting with the ML-KEM (Kyber) algorithm.

The PQ Code Package will provide standalone implementations of ML-KEM, intended to be adopted by authors of other cryptographic libraries who need to import source code for ML-KEM into their library. Open Quantum Safe is multi-algorithm suite of post-quantum cryptography, distributed in binary form, with integrations into higher level applications using the OQS OpenSSL 3 provider. As the implementations in the PQ Code Package mature, they will be incorporated into liboqs to provide users of OQS access to high-assurance implementations of these algorithms.

### What is the relationship between the Post-Quantum Cryptography Alliance and the Post-Quantum Cryptography Coalition?

In September 2023, MITRE announced the Post-Quantum Cryptography Coalition (PQCC).

The PQC Coalition has four main work streams:

- Advancing standards relevant to PQC migration,
- Creating technical materials to support education and workforce development,
- Producing and verifying open-source, production-quality code, and implementing side-channel resistant code for industry verticals, and
- Ensuring cryptographic agility.

In February 2024, the Linux Foundation launched the Post-Quantum Cryptography Alliance (PQCA), which includes the Open Quantum Safe project. The PQCA is focused primarily on open source software for post-quantum cryptography.

Several founding members of the PQC Coalition are also members of the Post-Quantum Cryptography Alliance. We envision a close working relationship between the PQCC’s activities on their workstream #3, and the work of the PQCA. One of the ways we plan to work together on that goal is that the PQCC in workstream 3 will help identify requirements for PQ implementations (e.g., measures of side channel resistance), and then feed that guidance into the open-source software projects in the PQCA which will build open source implementations.