Hands-On Quantum-Safe PKI: A Practical Post-Quantum Cryptography Implementation Guide

Updated 01.16.26 for FrodoKEM/BIKE/HQC alternate algorithms

Is your Public Key Infrastructure quantum-ready?

Remember way back when we built the PQC CNSA 2.0 Implementation guide in October 2025? So long ago! Due to popular request, we've expanded the lab to now include THREE distinct learning paths: NIST FIPS standards, NSA CNSA 2.0 compliance, AND alternative post-quantum algorithms for those wanting diversity or international compliance options..

The GitHub lab guide walks you through building quantum-resistant certificate authorities using OpenSSL with hands-on exercises.

 

Why learn and implement post-quantum cryptography (PQC) now?

While quantum computing is a fascinating area of science, all technological advancements can be misused. Nefarious people and nation-states are extracting encrypted data to decrypt at a later date when quantum computers become available, a practice you better know by now called "harvest now, decrypt later."

Close your post-quantum cryptographic knowledge gap so you can get secured sooner and reduce the impact(s) that may not surface until after it's too late. Ignorance is not bliss when it comes to cryptography and regulatory fines, so let's get started. The GitHub lab provides step-by-step instructions to create:

  • Quantum-resistant Root CA using ML-DSA-87 (FIPS and CNSA 2.0)
  • Algorithm flexibility based on your compliance needs
  • Quantum-safe server and client certificates
  • OCSP and CRL revocation for quantum-resistant certificates
  • TLS 1.3 key exchange testing with ML-KEM and hybrid modes
  • Alternative algorithm exploration (FrodoKEM, BIKE, HQC) for TLS/KEM usage

Access the Complete Lab Guide on GitHub →

 

At A Glance: OpenSSL Quantum-Resistant CA Learning Paths

Select the path that aligns with your requirements:

 FIPS 203/204/205CNSA 2.0Alt. Algorithms
Target AudienceCommercial organizationsGovernment contractors, classified systemsResearchers, international compliance, defense-in-depth
Compliance StandardNIST FIPS standardsNSA CNSA 2.0Non-NIST algorithms, international standards
Algorithm CoverageML-DSA, ML-KEM, SLH-DSA, HybridML-DSA-65/87, ML-KEM-768/1024FrodoKEM, BIKE, HQC
Use CaseGeneral quantum-resistant infrastructureNational security systemsAlgorithm diversity, conservative security

 

📚 Learning Path 1: NIST FIPS 203/204/205

For commercial organizations implementing quantum-resistant cryptography using NIST standards.

This path uses OpenSSL 3.5.x's native post-quantum cryptography support—no external quantum library providers required. So nice, so easy.

Modules

ModuleDescription
00 - IntroductionOverview of FIPS 203/204/205, prerequisites, and lab objectives
01 - Environment SetupVerifying OpenSSL with PQC support
02 - Root CABuilding a Root CA with ML-DSA-87
03 - Intermediate CACreating an Intermediate CA with ML-DSA-65
04 - CertificatesIssuing end-entity certificates for servers and users
05 - RevocationImplementing OCSP and CRL certificate revocation
06 - Hybrid MethodsIETF hybrid PQC methods (X25519MLKEM768, composite signatures)

Algorithms Covered

  • ML-DSA-44/65/87 (FIPS 204) - Lattice-based signatures
  • ML-KEM-512/768/1024 (FIPS 203) - Lattice-based key encapsulation
  • X25519MLKEM768 - Hybrid TLS 1.3 key exchange

 


📚 Learning Path 2: NSA CNSA 2.0

For government contractors and organizations requiring CNSA 2.0 compliance.

This path uses OpenSSL 3.2+ with Open Quantum Safe (OQS) providers for strict CNSA 2.0 algorithm compliance.

Modules

ModuleDescription
01 - IntroductionOverview of CNSA 2.0 requirements and compliance deadlines
02 - Root CABuilding a Root CA with ML-DSA-87
03 - Intermediate CACreating an Intermediate CA with ML-DSA-65
04 - CertificatesIssuing CNSA 2.0 compliant certificates
05 - RevocationImplementing OCSP and CRL certificate revocation

CNSA 2.0 Approved Algorithms

Algorithm TypeApproved AlgorithmsNIST Designation
Digital SignaturesML-DSA-65, ML-DSA-87FIPS 204
Key EstablishmentML-KEM-768, ML-KEM-1024FIPS 203
Hash FunctionsSHA-384, SHA-512FIPS 180-4

Note: CNSA 2.0 currently does NOT support ML-DSA-44, SLH-DSA, or Falcon algorithms.

 


📚 Learning Path 3: Alternative PQC Algorithms (NEW!)

For researchers, organizations requiring algorithm diversity, and those interested in international PQC implementations.

This path explores post-quantum algorithms outside the primary NIST standards, providing options for defense-in-depth strategies and understanding of the broader PQC landscape. Perfect for organizations wanting to hedge against potential future vulnerabilities in current adopted standards.

Modules

ModuleDescription
00 - IntroductionOverview of non-NIST algorithms, international standards, use cases
01 - Environment SetupOpenSSL and modifying OQS provider configuration
02 - FrodoKEMConservative unstructured lattice KEM (European recommended: BSI, ANSSI)
03 - BIKE and HQCCode-based KEMs (HQC is NIST-selected backup to ML-KEM)
04 - International PQCEU, South Korean, and Chinese algorithm standards
05 - Performance AnalysisComparing algorithms, latency impacts, use cases, nerd stats

Algorithms Covered

AlgorithmTypeMathematical BasisKey Characteristic
FrodoKEMKEMUnstructured lattice (LWE)Conservative security, European endorsed (BSI, ANSSI)
BIKEKEMCode-based (QC-MDPC)NIST Round 4 candidate, smaller keys than HQC
HQCKEMCode-based (Quasi-cyclic)NIST-selected backup to ML-KEM (standard expected 2027)

Why Alternative Algorithms Matter

  • Algorithm Diversity: If a vulnerability is found in lattice-based cryptography (ML-KEM), code-based alternatives provide a backup
  • International Compliance: European agencies (BSI, ANSSI) specifically recommend FrodoKEM for conservative security
  • Future-Proofing: HQC will become a FIPS standard in 2027 as NIST's official backup to ML-KEM
  • Research & Testing: Understand the broader PQC landscape for informed decision-making

 


What This Lab Guide Achieves

Complete PKI Hierarchy Implementation

The lab walks through building an internal PKI infrastructure from scratch, including:

  • Root Certificate Authority: Using ML-DSA-87 providing the highest quantum-ready NIST security level
  • Intermediate Certificate Authority: Intermediate CA using ML-DSA-65 for operational certificate issuance
  • End-Entity Certificates: Server and user certificates with comprehensive Subject Alternative Names (SANs) for real-world applications
  • Revocation Infrastructure: Both Certificate Revocation Lists (CRL) and Online Certificate Status Protocol (OCSP) implementation
  • TLS 1.3 Key Exchange Testing: Hands-on testing with ML-KEM, hybrid modes, and alternative algorithms
  • Security Best Practices: Restrictive Unix file permissions, secure key storage, and backup procedures throughout

Key Takeaways

After completing one or more of the labs, you will:

  1. Understand ML-DSA Cryptography: Gain hands-on experience with both ML-DSA-65 (Level 3 security) and ML-DSA-87 (Level 5 security) algorithms
  2. Explore Algorithm Diversity: Understand when and why to use alternative algorithms like FrodoKEM, BIKE, and HQC
  3. Configure Modern PKI Features: Implement SANs with DNS, IP, email, and URI entries, plus both CRL and OCSP revocation mechanisms
  4. Test TLS 1.3 Key Exchange: Hands-on experience with ML-KEM and hybrid key exchange in real TLS sessions
  5. Troubleshoot Effectively: Learn to diagnose and resolve common issues with opensl and oqsproviders for PQC compatibility
  6. Prepare for Migration: Start the practical steps needed to transition existing PKI infrastructure to quantum-resistant algorithms

Access the Complete Lab Guide on GitHub →

 


About This Guide

We built the first guide for NSA Suite B in the distant past (2017) to learn ECC and modern cipher requirements. It was well received enough to built a new guide for CNSA 2.0 but it's quite specific for US federal audiences. That lead us to build a NIST FIPS PQC guide which should apply to more practical use cases. And now we've added alternative algorithms because things are only going to get a bit more complicated moving forward.

In the spirit of Learn Python the Hard Way, it focuses on manual repetition, hands-on interactions and real-world scenarios. It provides the practical experiences needed to implement quantum-resistant PKI in production environments.

By building it on GitHub, other PKI fans can help where we may have missed something; or simply to expand on it with additional modules or forks. Have at it!

 


Frequently Asked Questions (FAQs)

Q: What is CNSA 2.0?
A: CNSA 2.0 (Commercial National Security Algorithm Suite 2.0) is the NSA's updated cryptographic standard requiring quantum-resistant algorithms.

Q: When do I need to implement quantum-resistant cryptography?
A: The NSA and NIST mandate CNSA 2.0 and FIPS 203/204/205 implementation by 2030. Organizations should begin now due to "harvest now, decrypt later" attacks where adversaries collect encrypted data today for future quantum decryption.

Q: What is ML-DSA (Dilithium)?
A: ML-DSA (Module-Lattice Digital Signature Algorithm), formerly known as Dilithium, is a NIST-standardized quantum-resistant digital signature algorithm specified in FIPS 204.

Q: What is ML-KEM (Kyber)?
A: ML-KEM (Module-Lattice Key Encapsulation Mechanism), formerly known as Kyber, is a NIST-standardized quantum-resistant key encapsulation mechanism specified in FIPS 203. ML-KEM-768 provides roughly AES-192 equivalent security.

Q: What are the alternative algorithms and why should I care?
A: FrodoKEM, BIKE, and HQC are non-NIST-primary algorithms that provide algorithm diversity. If a vulnerability is discovered in lattice-based cryptography (which ML-KEM and ML-DSA use), code-based alternatives like HQC could provide a backup. HQC is actually NIST's selected backup to ML-KEM and will become a FIPS standard in 2027.

Q: What's the difference between BIKE and HQC?
A: Both are code-based KEMs. BIKE has smaller key sizes but wasn't selected by NIST. HQC has larger keys and was selected as NIST's official backup to ML-KEM.

Q: Why do European agencies recommend FrodoKEM?
A: FrodoKEM uses unstructured lattices (standard LWE) rather than the structured lattices used in ML-KEM. This provides more conservative security assumptions at the cost of larger key sizes. Germany's BSI and France's ANSSI specifically recommend FrodoKEM for high-security applications.

Q: Is this guide suitable for production use?
A: NOPE. While the guide teaches production-ready techniques and compliance requirements, always use Hardware Security Modules (HSMs) and air-gapped systems for production Root CAs (cold storage too). The lab is great for internal environments or test harnesses where you may need to test against new quantum-resistant signatures. ALWAYS rely on trusted public PKI infrastructure for production cryptography.

🤓 Happy PKI'ing!

 


  1. NIST Post-Quantum Cryptography Standards - Official NIST PQC project page
  2. FIPS 203: ML-KEM Standard - Module-Lattice Key Encapsulation Mechanism
  3. FIPS 204: ML-DSA Standard - Module-Lattice Digital Signature Algorithm
  4. FIPS 205: SLH-DSA Standard - Stateless Hash-Based Digital Signature Algorithm
  5. NSA CNSA 2.0 Algorithm Requirements - NSA's official CNSA 2.0 announcement
  6. Open Quantum Safe Project - Home of the OQS provider for alternative algorithms
  7. OQS Provider for OpenSSL 3 - GitHub repository for OQS provider
  8. HQC Specification - Official HQC algorithm documentation
  9. BIKE Specification - Official BIKE algorithm documentation
  10. OpenSSL 3.5 Documentation - Comprehensive OpenSSL documentation

Updated Jan 12, 2026
Version 2.0
No CommentsBe the first to comment