Embedded Security explained: Post-Quantum Cryptography (PQC) for embedded Systems

Why Quantum Computers matter for Cryptography

Cryptography protects the integrity, authenticity, and confidentiality of data in embedded systems. Today, most security protocols rely on public-key algorithms such as RSA or elliptic-curve cryptography (ECC). In FPGA-based systems for instance these algorithms are deployed for tasks such as secure boot, firmware updates, and device authentication.

But the security of these schemes relies on mathematical problems that could become solvable with sufficiently powerful quantum computers. Most currently deployed public-key cryptography relies on problems such as:

  • Integer factorization (used by RSA)
  • Discrete logarithms (used by ECC)

Symmetric algorithms such as AES and SHA-3 do not rely on the same mathematical structures as RSA or ECC and are reduced in security strength but still safe. Quantum computers can still accelerate brute-force search using Grover’s algorithm, but the impact is smaller. In practice, this typically means increasing symmetric key sizes (for example, using 256-bit keys) to maintain security margins. As a result, the main transition toward quantum-resistant solutions focuses on public-key primitives.

But public-key algorithms can be broken by large-scale quantum computers by using algorithms such as Shor’s algorithm. While large quantum computers are not yet available, embedded systems often remain in the field for 10–20 years. Systems deployed today may still need to resist attacks in a future where quantum computing capabilities have improved. PQC algorithms are designed to avoid the mathematical structures that make classical schemes vulnerable to quantum algorithms.

What Post-Quantum Cryptography is

PQC refers to algorithms designed to run on classical hardware while remaining resistant to both classical and quantum attacks. Several new algorithms have recently been standardized or are in the process of standardization at NIST:

  • FIPS 203: ML-KEM (former Kyber) for key exchange
  • FIPS 204: ML-DSA (former Dilithium) for digital signatures
  • FIPS 205: SLH-DSA (former SPHINCS+) for hash-based signatures
  • coming soon: FIPS 206: FN-DSA (former FALCON)

Implications for Embedded Systems

For embedded systems and FPGA designs, PQC introduces practical implementation challenges.

Compared to classical public-key algorithms, PQC schemes often involve:

  • Larger public keys and signatures
  • Higher memory requirements
  • More complex arithmetic operations

These characteristics directly affect FPGA resource usage, latency, and memory architecture. For area-constrained devices, efficient hardware implementations are therefore essential. Sequential architectures and carefully optimized arithmetic units can significantly reduce logic utilization while still supporting PQC functionality.


Get started with PQC on your FPGA today

Our evaluation package provides the complete hardware-software stack required to build a demo on your board. 

Get a eval package


Preparing for the Transition

While large-scale quantum computers are still under development, system designers are already preparing for the transition to quantum-resistant cryptography.

Practical migration strategies typically focus on:

  • Crypto agility: designing systems that can replace algorithms when standards evolve
  • Hybrid cryptography: combining classical and PQC algorithms during the transition phase

For FPGA-based architectures, hardware flexibility can play an important role in supporting these transitions. The transition to PQC is also influenced by system lifecycle considerations. Industrial devices, infrastructure systems, and IoT products often remain deployed for many years, making cryptographic agility increasingly important. In addition, emerging cybersecurity regulations in Europe and other regions are encouraging manufacturers to consider long-term cryptographic resilience as part of product security strategies.


Explore Cryptography IP:


×
Semiconductor IP