1. Home
  2. /
  3. Use cases
  4. /
  5. Try Quantum-Safe Cryptography PKI

Try Quantum-safe Cryptography PKI

EJBCA supports ML-DSA (Dilithium) and NL-DSA (Falcon) quantum-safe algorithms. Try them for your Root CAs, Issuing CAs, and end entities for code signing.

hero-sub-2

Challenge

Migrating to new algorithms and ensuring compatibility

Migrating to new quantum-safe cryptography algorithms requires careful evaluation of existing solutions and properly optimizing the environment. As a developer, you must take into consideration:

  • Which algorithms have broad compatibility
  • Use case-specific requirements
  • The benefits and complexities of hybrid certificates
  • How to operationalize (i.e system architecture, infrastructure needs, HSM support, and protocol compatibility
  • Which legacy systems may need “isolation” and be front-ended with enhanced security

You can also read more here:

Get ready for Quantum-safe Cryptography

arrow

Solution

Seamless support for Quantum-safe PKI with EJBCA

The reality is that there are still many unanswered questions, and it will take some time before all the pieces fall into place. EJBCA offers a seamless solution for issuing quantum-ready Public Key Infrastructure (PKI) certificates alongside the existing PKI within the same environment. This ensures a smooth experience with minimal disruption to your current infrastructure and environments. You can begin experimenting with the technology and gradually understand its relevance to your specific environment over time.

EJBCA supports ML-DSA (Dilithium) and NL-DSA (Falcon) algorithms for Root CAs, Issuing CAs, and End entities. While Certificate Revocation Lists (CRLs) can be generated, certain aspects such as Online Certificate Status Protocol (OCSP) and other protocols are still in the development phase and will be made available in the future.

Check out our how-tos and videos on:

  • Issue ML-DSA (Dilithium) code signing certificate with EJBCA and sign code in SignServer
  • Creating a quantum-ready hybrid certificate using the Bouncy Castle Kotlin project
  • Try Hybrid certificates in preparations for quantum readiness 

Please note, the final standards for ML-KEM, ML-DSA and SLH-DSA were finalized in August 2024. We recommend only using standardized quantum-safe algorithms in production environments. 

Tutorials

dilithium ikon
Post quantum
2024-08-28

Try Hybrid PKI and certificates with EJBCA

{At sit et cras neque etiam cursus vulputate tempor enim. Quisque suspendisse nunc massa eleifend est ultrices. Facilisi ut a augue pellentesque quam nibh. Sit nisl.|=##=|162821}
ML-DSA
EJBCA logo website
Post quantum
2023-06-05

ML-DSA (Dilithium) signing certificate and code signing in SignServer

{At sit et cras neque etiam cursus vulputate tempor enim. Quisque suspendisse nunc massa eleifend est ultrices. Facilisi ut a augue pellentesque quam nibh. Sit nisl.|=##=|162821}
ML-DSA
EJBCA logo website
Post quantum
2023-06-05

Create Hybrid Certificates through Bouncy Castle Kotlin

{At sit et cras neque etiam cursus vulputate tempor enim. Quisque suspendisse nunc massa eleifend est ultrices. Facilisi ut a augue pellentesque quam nibh. Sit nisl.|=##=|162821}
Bouncy Castle

Get inspired

Stay up to date with the latest news and blog articles, and find out about upcoming events related to EJBCA.

Keyfactor Release
Implementing Cryptography
Post-Quantum Cryptography
Release
Ejbca
Signserver
4 December, 2024

NIST PQC Support and more – Bouncy Castle C# .NET 2.5.0

New release: Bouncy Castle C# .NET 2.5.0
PKI hierarchies - 1, 2, 3 tiers ?
DevOps
Signing
Tech Update
Ejbca
Signserver
3 December, 2024

#KEYMASTER: The Emerging Practices around Attestations and SBOMs

Building policy-driven and compliant software supply chains   Join Sven...
PKI hierarchies - 1, 2, 3 tiers ?
Post-Quantum Cryptography
Tech Update
Ejbca
Signserver
26 November, 2024

#KEYMASTERS – Understanding Key Encapsulation Mechanisms (KEM)

In this Keymaster episode, Sven Rajala, International PKI Man of Mystery, has...

Related open-source projects