PQC
Post-Quantum Cryptography

Cryptographic algorithms that remain secure even when large-scale quantum computers exist. The foundation of long-term data confidentiality for enterprises deploying AI agents at scale.

Cryptography NIST FIPS 203/204/205 Security Compliance

Why It Matters for Agentic AI

AI agents exchange sensitive business data across organizations -- financial models, legal documents, customer records, strategic plans. Today, this traffic is encrypted with algorithms like RSA and ECDH that will break when sufficiently powerful quantum computers arrive.

The risk isn't theoretical. Intelligence agencies already practice "harvest now, decrypt later" (HNDL): recording encrypted traffic today, storing it, and waiting for quantum capabilities to decrypt it years from now. If your agents handle data that must remain confidential for 5+ years, HNDL is a real threat.

The NIST Timeline

Enterprises in financial services, healthcare, and defense should be planning their transition now.

Three Algorithms You Need to Know

  1. ML-KEM (FIPS 203, formerly Kyber) -- Key encapsulation. Replaces ECDH for key exchange. This is what protects data in transit.
  2. ML-DSA (FIPS 204, formerly Dilithium) -- Digital signatures. Replaces ECDSA/RSA for signing. This is what proves identity.
  3. SLH-DSA (FIPS 205, formerly SPHINCS+) -- Stateless hash-based signatures. Backup for ML-DSA, based on different mathematical assumptions.

What Needs Protection in an Agentic Platform

Not everything is equally sensitive. Here's how to prioritize:

How MeetLoyd Implements PQC Readiness

MeetLoyd's security architecture is designed for PQC transition:

  • TLS 1.3 enforced on all federation endpoints -- inbound, outbound, and at trust creation time. No TLS downgrade attacks possible.
  • Hybrid key exchange ready: Federation trust handshake is architected for ML-KEM-768 + ECDH P-256 hybrid mode (classical + quantum-safe combined).
  • Cloudflare edge: All public API traffic already negotiates ML-KEM hybrid when the client supports it.
  • CNSA 2.0 aligned: Full migration roadmap for ML-KEM key wrapping (CMEK), ML-DSA signing (SVID), and classical deprecation.
  • Sovereign infrastructure: Self-hosted models on private GPUs ensure no cryptographic material transits third-party infrastructure.

The Recommended Transition Strategy

NIST recommends a hybrid approach: combine classical and post-quantum algorithms during the transition period. This way, security is maintained even if one algorithm is broken.

Phase 1 -- Now
Enforce TLS 1.3 minimum. Audit all key exchange and signing algorithms. Document crypto inventory.
Phase 2 -- 2026
Deploy ML-KEM hybrid key exchange for high-value channels (federation, CMEK). Keep classical as fallback.
Phase 3 -- 2027-2030
Full PQC migration. ML-DSA for all signing. Classical algorithms deprecated. Aligned with CNSA 2.0.

Related Terms