NIST Selected 2025

HQC Code-Based KEM Engine

Algorithmic diversity for quantum-safe key exchange. A code-based Key Encapsulation Mechanism selected by NIST in 2025, providing security from fundamentally different mathematical assumptions than lattice-based schemes — essential insurance for defense-in-depth strategies.

Algorithmic Diversity

Code-based cryptography provides a fundamentally different security foundation from lattice-based ML-KEM. Deploy alongside ML-KEM for true cryptographic diversity — a key requirement of defense-in-depth strategies.

Code-Based Security

Security is based on the hardness of decoding random quasi-cyclic codes — a well-studied problem with decades of cryptanalytic research. Independent of lattice assumptions.

Compact Design

Area-optimized hardware architecture leveraging the mathematical structure of quasi-cyclic codes. Suitable for embedded and resource-constrained deployments where silicon budget is critical.

Your Second Path to Quantum-Safe Key Exchange

The HQC Code-Based KEM Engine implements the Hamming Quasi-Cyclic Key Encapsulation Mechanism, selected by NIST in March 2025 for post-quantum standardization. HQC's security rests on the hardness of decoding random quasi-cyclic codes — a fundamentally different mathematical problem from the lattice problems underlying ML-KEM, providing critical algorithmic diversity.

The hardware architecture features optimized polynomial multiplication engines that exploit the quasi-cyclic structure of HQC, along with dedicated error-correction decoders that recover shared secrets from noisy ciphertext during decapsulation. This purpose-built silicon approach delivers consistent performance with constant-time execution guarantees.

Organizations adopting a belt-and-suspenders approach to post-quantum migration can deploy HQC alongside ML-KEM in a hybrid configuration. If a breakthrough were to compromise lattice-based schemes, the code-based HQC component maintains quantum-safe key exchange. This diversity strategy aligns with ANSSI, BSI, and CNSA 2.0 recommendations.

Quick Specifications

ParameterValue
AlgorithmHQC (NIST Selected 2025)
TypeCode-Based KEM
Security BasisQuasi-cyclic code decoding
Shared Secret32 bytes
Security Levels128 / 192 / 256 bit
InterfaceStandard bus interface
Target Clock80 MHz

Core Capabilities

  • NIST-selected code-based Key Encapsulation Mechanism (2025)
  • Complete key generation, encapsulation, and decapsulation in hardware
  • Code-based security independent of lattice assumptions
  • Optimized polynomial multiplication engines for quasi-cyclic structure
  • Dedicated error-correction decoders for reliable decapsulation
  • Multiple security levels for flexible deployment
  • Constant-time implementation with data-independent execution
  • Standard bus interface for seamless SoC integration
  • Area-optimized for embedded and resource-constrained applications

Security Properties

  • Chosen-ciphertext attack resistant (IND-CCA2 security)
  • Independent security assumptions from lattice-based schemes
  • Decades of cryptanalysis on code-based cryptographic foundations
  • Constant-time polynomial operations prevent timing leakage
  • Fixed-time decoding operations across all execution paths
  • Automatic zeroization of intermediate values after completion

Algorithm Parameters

ParameterHQC-128HQC-192HQC-256
Security Level128-bit192-bit256-bit
Public Key Size2,249 bytes4,522 bytes7,245 bytes
Ciphertext Size4,497 bytes9,042 bytes14,485 bytes
Shared Secret32 bytes32 bytes32 bytes

Performance & Implementation

ParameterValue
InterfaceStandard register-mapped bus interface
Data Width32 bits
Target Clock Frequency80 MHz
Key Generation Latency~1.5 ms @ 80 MHz (HQC-128)
Encapsulation Latency~2.0 ms @ 80 MHz (HQC-128)
Decapsulation Latency~2.5 ms @ 80 MHz (HQC-128)
VerificationNIST Known Answer Test vectors

Comparison with ML-KEM-768

AttributeML-KEM-768HQC-128
Security BasisLattice problemsCode decoding problems
Public Key Size1,184 bytes2,249 bytes
Ciphertext Size1,088 bytes4,497 bytes
Operation Latency~0.3–0.4 ms~1.5–2.5 ms
Primary AdvantageSmaller sizes, fasterAlgorithmic diversity

Target Deployments

Diversified Key Exchange
Critical Infrastructure
Hybrid KEM with ML-KEM
Long-Lifecycle Systems
Government & Defense
Defense-in-Depth Architectures

HQC is purpose-built for organizations that require algorithmic diversity as a core security principle. By deploying code-based HQC alongside lattice-based ML-KEM, systems remain protected even if a mathematical breakthrough compromises one algorithm family. This hybrid strategy is recommended by leading national cybersecurity agencies for the most sensitive applications.

Flexible Delivery Options

Choose the integration level that matches your design requirements.

Soft IP

Synthesizable Core

Complete source with verification suite, driver library, and documentation. Includes hybrid configuration scripts for combined ML-KEM + HQC deployments. Maximum flexibility for any target technology.

Firm IP

Pre-Characterized Core

Optimized for target technology with timing models and physical abstractions. Pre-characterized for 80 MHz operation at 1.8V nominal.

Hard IP

Tapeout-Ready Layout

Fully validated physical implementation with complete signoff documentation. Available standalone or as a combined ML-KEM + HQC hybrid macro.

Complementary Products

KEM and security cores for comprehensive quantum-safe deployments.

Ready for Diversified Quantum-Safe Key Exchange?

Contact our team for evaluation access, hybrid deployment guidance, or custom integration support for your code-based KEM requirements.