BenchmarksStack RankingAPIsPricingDocsWhite PaperTokenBlogAbout
Log InGet API Key
Post-Quantum NIST · 9 min read

NIST FIPS 203 & 204 Compliance
The Implementation Guide

FIPS 203 (ML-KEM) and FIPS 204 (ML-DSA) are now finalized standards. Every system that touches classified or sensitive data will need to implement them. This guide covers what the standards require, what they replace, the mandatory timelines, and how to achieve compliance with minimal engineering effort.

What FIPS 203 and FIPS 204 Actually Standardize

In August 2024, NIST released the first three finalized post-quantum cryptographic standards. Two of them are directly relevant to virtually every production system on the planet:

A third standard, FIPS 205 (SLH-DSA, based on SPHINCS+), provides a hash-based signature alternative. However, its significantly larger signatures (up to 49,856 bytes vs. ML-DSA's 3,309 bytes at security level 3) make it a backup option rather than a primary deployment target for most systems.

Key distinction: FIPS 203 handles encryption and key exchange. FIPS 204 handles signatures and authentication. You almost certainly need both. If you encrypt data, you need ML-KEM. If you sign anything—JWTs, API responses, certificates, documents—you need ML-DSA.

What These Standards Replace

The algorithms being deprecated have been the foundation of internet security for decades. Understanding the mapping is critical for your migration plan:

Legacy AlgorithmUse CaseFIPS ReplacementSecurity Level
RSA-2048/3072/4096Key exchange, signaturesML-KEM-768 / ML-DSA-65NIST Level 3 (128-bit PQ)
ECDH (P-256, P-384)Key agreement (TLS)ML-KEM-768 / ML-KEM-1024Level 3 / Level 5
ECDSA (P-256, P-384)Digital signaturesML-DSA-65 / ML-DSA-87Level 3 / Level 5
EdDSA (Ed25519)Signatures, auth tokensML-DSA-44 / ML-DSA-65Level 2 / Level 3
DH-2048Key exchangeML-KEM-768Level 3

The Compliance Timeline

There is no single deadline. The timeline is staggered by sector and system classification:

The urgency is now, not 2035. Harvest-now-decrypt-later (HNDL) attacks mean data encrypted with RSA today can be stored and decrypted once a cryptographically relevant quantum computer (CRQC) exists. If your data has a shelf life longer than 10 years—medical records, financial data, trade secrets, classified intelligence—it is already at risk. The migration window is not 2035. It is today.

How H33 Implements FIPS 203 and FIPS 204 Natively

H33's post-quantum cryptographic infrastructure implements both ML-KEM (FIPS 203) and ML-DSA (FIPS 204) as native, pure-Rust modules with zero external dependencies. There are no OpenSSL bindings, no C wrappers, no FFI calls. The entire cryptographic stack is written in Rust and runs on AWS Graviton4 ARM infrastructure.

Our ML-KEM implementation supports all three parameter sets (ML-KEM-512, ML-KEM-768, ML-KEM-1024) and our ML-DSA implementation supports all three tiers (ML-DSA-44, ML-DSA-65, ML-DSA-87). In production, H33 processes 2.17 million authentications per second sustained, with each auth completing in 38.5 microseconds.

Integration in Three Lines

Migrating to FIPS 203/204 compliant cryptography with H33 requires no cryptographic expertise on your team. The API abstracts every detail:

// Key exchange (FIPS 203 - ML-KEM-768)
const { sharedSecret, ciphertext } = await h33.kem.encapsulate(recipientPublicKey);

// Digital signature (FIPS 204 - ML-DSA-65)
const signature = await h33.sign(document, privateKey);
const valid = await h33.verify(document, signature, publicKey);

That is the entire integration surface. Behind those calls, H33 handles parameter selection, constant-time arithmetic, side-channel-resistant sampling, key serialization, and NIST-compliant output encoding. You get a FIPS-compliant cryptographic operation. We handle every implementation detail that could introduce a vulnerability.

What Auditors Will Ask

If you are subject to SOC 2 Type II, FedRAMP, CMMC, or HIPAA audits, your auditors will increasingly ask about post-quantum readiness. Here is what to expect and how to answer:

FIPS 203/204 Compliance Checklist

Use this checklist to track your organization's compliance posture. Every item is actionable and auditable:

ItemRequirementStatus
1Complete cryptographic algorithm inventory across all systems
2Identify all RSA, ECDH, ECDSA, and DH usage in production
3Map each legacy algorithm to its FIPS 203/204 replacement
4Deploy ML-KEM (FIPS 203) for all key encapsulation operations
5Deploy ML-DSA (FIPS 204) for all digital signature operations
6Implement hybrid mode for systems requiring backward compatibility
7Update TLS configurations to support PQ key exchange
8Re-sign all code artifacts, certificates, and documents with ML-DSA
9Validate that key sizes meet minimum security level requirements
10Document migration for SOC 2 / FedRAMP / CMMC evidence collection
11Test interoperability with upstream and downstream partners
12Establish key rotation schedule for post-quantum keys

Key Size and Performance Comparison

One of the practical concerns with post-quantum algorithms is key and signature sizes. Here is what to expect:

AlgorithmPublic KeyPrivate KeyCiphertext / SignatureSecurity Level
RSA-2048256 B1,024 B256 B~112-bit classical
ECDSA P-25664 B32 B64 B~128-bit classical
ML-KEM-7681,184 B2,400 B1,088 B (CT)NIST Level 3 (PQ)
ML-DSA-651,952 B4,032 B3,309 B (sig)NIST Level 3 (PQ)
ML-KEM-10241,568 B3,168 B1,568 B (CT)NIST Level 5 (PQ)
ML-DSA-872,592 B4,896 B4,627 B (sig)NIST Level 5 (PQ)

Yes, post-quantum keys and signatures are larger. But the performance difference on modern hardware is negligible. H33 achieves 291 microseconds for a full ML-DSA sign-and-verify cycle on a single batch of 32 authentications. At scale, this translates to over 2 million verifications per second. The size increase is a minor bandwidth consideration; the security gain is existential.

Why Starting Now Matters

The harvest-now-decrypt-later threat is not theoretical. Nation-state actors are already collecting encrypted traffic at scale, storing it in data lakes, waiting for quantum computers capable of breaking RSA and ECC. The NSA has publicly acknowledged this threat. So has CISA. So has NIST.

If your organization handles data with a sensitivity window longer than 5-10 years—healthcare records, financial transactions, legal documents, intellectual property, government communications—that data is already vulnerable. Not because quantum computers exist today, but because the ciphertext being harvested today will be decryptable when they do.

The cost of migrating later is exponentially higher. Every month of delay means more encrypted data sitting in adversary storage, more systems to retrofit, more emergency engineering under deadline pressure. The organizations that will handle the quantum transition smoothly are the ones migrating now, methodically, while they have time to test, validate, and iterate.

Get Started

H33 provides a free tier that includes access to both ML-KEM (FIPS 203) and ML-DSA (FIPS 204) operations. You can integrate, test, and validate against your existing systems today—before the deadlines arrive, before the audit questions become findings, and before the cost of inaction compounds further.

Read the full post-quantum architecture documentation or explore the API reference to begin your migration.