CNSA 2.0 Implementation Guide with OpenSSL: How to Build a Quantum-Resistant Certificate Authority

Are your certificates quantum-ready?

Hey, remember when we wrote an article series on building a CA for NSA Suite B? Yeah, that was fun, so we did it again for the Commercial National Security Algorithm Suite (CNSA) 2.0 for a quantum-resistant Certificate Authority. The below GitHub lab guide teaches you how to "quickly" build a post-quantum Certificate Authority (CA) using OpenSSL 3.2+ with Open Quantum Safe (OQS) libraries and ML-DSA algorithms at level 4 and 5 strengths, the current quantum-safe cryptography approved for CNSA 2.0 and FIPS 204/205.

 

Why implement post-quantum cryptography (PQC) now?

Organizations like yours face a challenge: mean people are extracting encrypted data to decrypt when quantum computers become available, a threat called "harvest now, decrypt later." We want to help you close your quantum cryptography knowledge gap, so you can get secured sooner and limit potential problems that might not surface until later. Ignorance is not bliss when it comes to cryptography and regulatory fines, so let's get started. The GitHub lab provides step-by-step instructions to create:

  • Quantum-resistant Root CA with 10-year validity using ML-DSA-87 (Dilithium5)
  • Post-quantum Intermediate CA using ML-DSA-65 (Dilithium3)
  • Quantum-safe server and client certificates
  • OCSP and CRL revocation for quantum-resistant certificates

Access the Complete Lab Guide on GitHub →

 

At a Glance: Openssl Quantum-Resistant CA Lab

AspectDetails
Algorithms UsedML-DSA-65 (mldsa65) and ML-DSA-87 (mldsa87)
Standards ComplianceNSA CNSA 2.0, NIST FIPS 204, RFC 5280
OpenSSL Version3.2+ with OQS Provider
Time to Complete~4 hours hands-on
Key ComponentsRoot CA, Intermediate CA, OCSP, CRL
PrerequisitesLinux, basic PKI knowledge

 

What This Lab Guide Achieves

Complete PKI Hierarchy Implementation

The lab walks through building a production-ready PKI infrastructure from scratch, including:

  • Root Certificate Authority: A 10-year Root CA using ML-DSA-87 (formerly Dilithium5), providing the highest CNSA 2.0 security level
  • Intermediate Certificate Authority: A 5-year Intermediate CA using ML-DSA-65 (formerly Dilithium3) for operational certificate issuance
  • End-Entity Certificates: Server and user certificates with comprehensive Subject Alternative Names (SANs) for real-world applications
  • Revocation Infrastructure: Both Certificate Revocation Lists (CRL) and Online Certificate Status Protocol (OCSP) implementation
  • Security Best Practices: Proper Unix file permissions, secure key storage, and backup procedures throughout

CNSA 2.0 Compliance

Every component strictly adheres to the NSA’s quantum-resistant algorithm requirements:

  • ML-DSA-65 and ML-DSA-87 for digital signatures
  • SHA-512 for cryptographic hashing
  • Proper certificate extensions and validation paths
  • RFC 5280 compliance for X.509 certificates

 

Key Takeaways

After completing this 4-5 hour lab, you will:

  1. Understand Quantum Threats: Grasp why current RSA/ECDSA cryptography is vulnerable and how quantum-resistant algorithms provide protection
  2. Master ML-DSA Cryptography: Gain hands-on experience with both ML-DSA-65 (Level 3 security) and ML-DSA-87 (Level 5 security) algorithms
  3. Build Production-Ready Infrastructure: Create a complete PKI hierarchy that could serve as a template for organizational deployment
  4. Implement Comprehensive Security: Apply proper file permissions, secure key storage, and backup procedures throughout the infrastructure
  5. Configure Modern PKI Features: Implement SANs with DNS, IP, email, and URI entries, plus both CRL and OCSP revocation mechanisms
  6. Troubleshoot Effectively: Learn to diagnose and resolve common issues with quantum-resistant certificates
  7. Prepare for Migration: Understand the practical steps needed to transition existing PKI infrastructure to quantum-resistant algorithms

Who Should Read This Guide

  • Enterprise Security Teams migrating from RSA to quantum-resistant algorithms
  • Government Contractors requiring CNSA 2.0 compliance for classified systems
  • Financial Institutions protecting long-term transaction records from quantum threats
  • Healthcare Organizations securing patient data with regulatory requirements
  • Cloud Service Providers implementing quantum-safe infrastructure for customers
  • PKI Consultants preparing for post-quantum migration projects
  • DevOps Engineers building quantum-ready CI/CD certificate pipelines
  • Nerds wanting to drop sweet lyrics at your local watering hole

 

 

Access the Complete Lab Guide on GitHub →

 

About This Guide

We built the first guide for building a lab CA for NSA Suite B because guides we relied on lost relevance with ECC and modern cipher requirements. This lab is the evolution of that need. By putting it on GitHub, other PKI fans can help where I may have missed something; or simply to expand on it with additional modules or forks. In the spirit of Learn Python the Hard Way, it focuses on manual repetition, hands-on interactions and real-world scenarios. It provides the practical experiences needed to implement quantum-resistant PKI in production environments.


Frequently Asked Questions (FAQS)

Q: What is CNSA 2.0?
A: CNSA 2.0 (Commercial National Security Algorithm Suite 2.0) is the NSA's updated cryptographic standard requiring quantum-resistant algorithms.

 

Q: When do I need to implement quantum-resistant cryptography?
A: The NSA and NISTP mandate CNSA 2.0 and FIPS 20X implementation by 2030. Organizations should begin now due to "harvest now, decrypt later" attacks where adversaries collect encrypted data today for future quantum decryption.

 

Q: What is ML-DSA (Dilithium)?
A: ML-DSA (Module-Lattice Digital Signature Algorithm), formerly known as Dilithium, is a NIST-standardized quantum-resistant digital signature algorithm specified in FIPS 204, available in OpenSSL through the OQS provider.

 

Q: Is this guide suitable for production use?
A: NOPE. While the guide teaches production-ready techniques and CNSA 2.0 compliance, always use Hardware Security Modules (HSMs) and air-gapped systems for production Root CAs (cold storage too).  The lab is great for internal environments or test harnesses where you may need to test against new quantum-resistant signatures and such. ALWAYS rely on trusted public PKI infrastructure for production cryptography.

Published Sep 30, 2025
Version 1.0

1 Comment

  • After reading your article about" Breaking Down the Quantum Challange" in the German morning, I went on and installed a Ubuntu 25 VM and build and installed OpenSSL 4, to create self-signed cert. Learned a good amount of new options and switches in openssl for post-quantum key generation and operations.
    And in the German afternoon you hammer out the full-scale PKI solution...
    Thanks, great work Chase_Abbott​