A technical analysis of NIST FIPS 203/204/205, EU regulatory mandates, and the practical roadmap for Irish enterprises to achieve quantum-safe infrastructure.
Modern public-key cryptography rests on two computational hardness assumptions: the Integer Factorisation Problem (IFP) underlying RSA, and the Discrete Logarithm Problem (DLP) underlying ECDSA and ECDH β the algorithms securing most TLS, SSH, and blockchain infrastructure.
In 1994, Peter Shor published a quantum algorithm demonstrating that a sufficiently powerful quantum computer could solve both IFP and DLP in polynomial time β O((log N)Β³). The implication is stark: any public-key infrastructure built on RSA, ECC, or Diffie-Hellman is theoretically vulnerable to a cryptographically relevant quantum computer (CRQC).
| System | Qubits | Key Milestone |
|---|---|---|
| IBM Condor (2023) | 1,121 | First 1000+ qubit superconducting system |
| IBM Heron (2023) | 133 | ~40Γ lower error rates than Condor |
| Google Willow (2024) | 105 | Below-threshold quantum error correction β first time ever |
| CRQC Requirement | ~20M physical | Required to break RSA-2048 in 8 hours (Gidney & EkerΓ₯, 2021) |
Google's Willow processor achieved a landmark in December 2024: below-threshold quantum error correction β logical error rates decreasing as code distance increases. This removes a fundamental barrier to fault-tolerant quantum computing. While still many years from a CRQC, this milestone materially shortens the timeline estimate.
Formerly CRYSTALS-Kyber, ML-KEM is the primary standard for key encapsulation and key exchange, replacing ECDH and RSA key exchange in TLS, SSH, and other protocols. Security rests on the hardness of the Module Learning With Errors (MLWE) problem.
| Parameter Set | Security Level | Public Key | Ciphertext |
|---|---|---|---|
| ML-KEM-512 | Level 1 (AES-128 equiv.) | 800 B | 768 B |
| ML-KEM-768 | Level 3 (AES-192 equiv.) | 1,184 B | 1,088 B |
| ML-KEM-1024 | Level 5 (AES-256 equiv.) | 1,568 B | 1,568 B |
Formerly CRYSTALS-Dilithium, ML-DSA replaces ECDSA and RSA signatures in code signing, certificate authorities, and authentication. Uses a Fiat-Shamir with Aborts signature scheme over module lattices.
Formerly SPHINCS+, SLH-DSA provides a hash-based alternative whose security rests solely on hash function properties (SHA-256, SHAKE). Recommended alongside ML-DSA for cryptographic diversity β if lattice assumptions are broken, SLH-DSA remains secure.
Requires "state of the art" cryptography for essential and important entities. Per ENISA guidance, state of the art now includes post-quantum cryptography for systems handling long-lived sensitive data. Irish operators in energy, transport, finance, health, digital infrastructure, and public administration are directly affected.
Requires financial entities to document cryptographic dependencies, assess cryptographic agility, and include quantum risk in ICT risk frameworks. The Central Bank of Ireland has reinforced these requirements under its Prudential Regulations framework.
The EU's decade-long quantum investment programme drives PQC adoption as critical infrastructure. Ireland participates through Tyndall National Institute, TCD, UCD, and ICHEC. EuroQCI will deploy QKD across all 27 member states by 2027.
The prerequisite for migration β catalogue every asymmetric cryptographic operation in your systems. Key questions: which algorithm, what key size, what purpose, what data lifetime?
# Scan TLS cipher suites (free tool)
testssl.sh --cipher-per-proto your-server.ie
# Check certificate key type and size
openssl s_client -connect your-server.ie:443 | \
openssl x509 -noout -text | grep "Public Key"
Hybrid key exchange (X25519 + ML-KEM-768) adds quantum protection with zero downside β classical security is maintained. Google Chrome defaults to this since Chrome 124.
# Nginx configuration for hybrid TLS
ssl_protocols TLSv1.3;
ssl_ecdh_curve X25519MLKEM768:x25519:secp256r1:secp384r1;
| Use Case | Quantum Risk | Priority |
|---|---|---|
| Certificate Authority roots (20+ year validity) | Critical | Immediate |
| Long-lived data encryption key wrapping | High | 2025β2026 |
| TLS key exchange (ECDH) | High (HNDL) | 2025 (hybrid) |
| SSH server keys | Medium | 2026β2027 |
| Short-lived JWT tokens | Medium | 2026β2028 |
Tyndall National Institute (Cork) β Europe's largest microelectronics research centre. Quantum photonics and semiconductor research for quantum hardware supply chains.
Trinity College Dublin β Quantum materials and devices; participation in EU Quantum Flagship QuantERA networks.
University College Dublin β Quantum algorithms and theoretical foundations; Horizon Europe quantum research partnerships.
ICHEC β Access to EuroHPC quantum simulators for Irish researchers and companies; Ireland's gateway to EU quantum computing access programmes.
NCSC Ireland β Published Quantum Threat Advisory 2023; recommends all public sector bodies begin cryptographic inventory processes immediately.
The NIST standards emerged from foundational academic research spanning three decades: