Embedded Security explained: Post-Quantum Cryptography (PQC) for embedded Systems
Why Quantum Computers matter for Cryptography
Cryptography protects the integrity, authenticity, and confidentiality of data in embedded systems. Today, most security protocols rely on public-key algorithms such as RSA or elliptic-curve cryptography (ECC). In FPGA-based systems for instance these algorithms are deployed for tasks such as secure boot, firmware updates, and device authentication.
But the security of these schemes relies on mathematical problems that could become solvable with sufficiently powerful quantum computers. Most currently deployed public-key cryptography relies on problems such as:
- Integer factorization (used by RSA)
- Discrete logarithms (used by ECC)
Symmetric algorithms such as AES and SHA-3 do not rely on the same mathematical structures as RSA or ECC and are reduced in security strength but still safe. Quantum computers can still accelerate brute-force search using Grover’s algorithm, but the impact is smaller. In practice, this typically means increasing symmetric key sizes (for example, using 256-bit keys) to maintain security margins. As a result, the main transition toward quantum-resistant solutions focuses on public-key primitives.
But public-key algorithms can be broken by large-scale quantum computers by using algorithms such as Shor’s algorithm. While large quantum computers are not yet available, embedded systems often remain in the field for 10–20 years. Systems deployed today may still need to resist attacks in a future where quantum computing capabilities have improved. PQC algorithms are designed to avoid the mathematical structures that make classical schemes vulnerable to quantum algorithms.
What Post-Quantum Cryptography is
PQC refers to algorithms designed to run on classical hardware while remaining resistant to both classical and quantum attacks. Several new algorithms have recently been standardized or are in the process of standardization at NIST:
- FIPS 203: ML-KEM (former Kyber) for key exchange
- FIPS 204: ML-DSA (former Dilithium) for digital signatures
- FIPS 205: SLH-DSA (former SPHINCS+) for hash-based signatures
- coming soon: FIPS 206: FN-DSA (former FALCON)
Implications for Embedded Systems
For embedded systems and FPGA designs, PQC introduces practical implementation challenges.
Compared to classical public-key algorithms, PQC schemes often involve:
- Larger public keys and signatures
- Higher memory requirements
- More complex arithmetic operations
These characteristics directly affect FPGA resource usage, latency, and memory architecture. For area-constrained devices, efficient hardware implementations are therefore essential. Sequential architectures and carefully optimized arithmetic units can significantly reduce logic utilization while still supporting PQC functionality.
Get started with PQC on your FPGA today
Our evaluation package provides the complete hardware-software stack required to build a demo on your board.
Preparing for the Transition
While large-scale quantum computers are still under development, system designers are already preparing for the transition to quantum-resistant cryptography.
Practical migration strategies typically focus on:
- Crypto agility: designing systems that can replace algorithms when standards evolve
- Hybrid cryptography: combining classical and PQC algorithms during the transition phase
For FPGA-based architectures, hardware flexibility can play an important role in supporting these transitions. The transition to PQC is also influenced by system lifecycle considerations. Industrial devices, infrastructure systems, and IoT products often remain deployed for many years, making cryptographic agility increasingly important. In addition, emerging cybersecurity regulations in Europe and other regions are encouraging manufacturers to consider long-term cryptographic resilience as part of product security strategies.
Explore Cryptography IP:
- Post-Quantum Key Encapsulation and Digital Signature IP Core
- Post-Quantum Digital Signature IP Core
- Post-Quantum Key Encapsulation IP Core
Related Semiconductor IP
- Post-Quantum Key Encapsulation and Digital Signature IP Core
- Post-Quantum Digital Signature IP Core
- Post-Quantum Key Encapsulation IP Core
- PUF-based Post-Quantum Cryptography (PQC) Solution
- APB Post-Quantum Cryptography Accelerator IP Core
Related Blogs
- ML-DSA explained: Quantum-Safe digital Signatures for secure embedded Systems
- Integrating Post-Quantum Cryptography (PQC) on Arty-Z7
- Embedded Security explained: IPsec and IKEv2 for embedded Systems
- What Does Semiconductor Industry Consolidation Mean for Embedded Systems Designers?
Latest Blogs
- Embedded Security explained: Post-Quantum Cryptography (PQC) for embedded Systems
- Accreditation Without Compromise: Making eFPGA Assurable for Decades
- Synopsys Delivers First Complete UFS 5.0 and M‑PHY v6.0 IP Solution for Next‑Gen Storage
- World First: Synopsys MACsec IP Receives ISO/PAS 8800 Certification for Automotive and Physical AI Security
- Last-level cache has become a critical SoC design element