#NIST chose #HQC as their backup KEM and elected not to standardize #ClassicMcElice for now among other reasons pointing to the standardization with #ISO.

The argument to choose HQC over Bike is a higher confidence in IND-CCA-security of HQC. I cannot comment on whether that is a reasonable assessment, though I have no reason to doubt it, but I can say that in terms of reasons to make a choice this is of course a pretty good one.

I’m not sure how I think about the decision regarding McElice, but I can to an extend see where they are coming from.

This means there are now
9 post quantum algorithms approved, standardized or chosen for standardization by generally respected organizations:

Key Encapsulation Mechanisms (“KEMs”):

* ML-KEM (“Kyber”), based on Lattices, standardized by NIST

* HQC, based on Codes, chosen for standardization by NIST

* Classic McElice, based on codes, approved by BSI (de), ANSSI(fr), and NCSC (nl)

* Frodo, based on lattices, approved by BSI (de), ANSSI(fr), and NCSC (nl)

Signatures:

* ML-DSA (“Dilithium”), based on Lattices, standardized by NIST

* SLH-DSA (“SPHINCS+”), based on hashes, standardized by NIST

* FN-DSA (“Falcon”), based on lattices, chosen for standardization by NIST

Stateful Signatures:

* XMSS, based on hashes, standardized by IEEE

* LMS, based on hashes, standardized by IEEE

Overall, this looks like a decent portfolio. Future standardization might add schemes based on multivariate-equations and isogonies, but for now this should do and give us a basis from which we can design more efficient schemes without being to concerned about the entire ground suddenly giving in because one random guy/gal finds a new attack-vector.

#postquantumcryptography #PQC #PQCrypto