← H33.ai

Crypto Agility: Why It Fails Without a Full Stack

NIST recommends crypto agility — the ability to swap algorithms when one is broken. Most organizations interpret this as "use a library that supports multiple algorithms." That is not crypto agility. That is vendor lock-in with options.

Direct answer: Crypto agility means swapping a compromised algorithm in production without a system-wide outage. This is impossible when cryptography is embedded in databases, API gateways, authentication services, and backup systems independently. Real crypto agility requires a single attestation layer where algorithm selection is a configuration parameter, not a code change in 50 different systems.

What Crypto Agility Is Supposed to Mean

The NIST definition: the ability to transition between cryptographic algorithms with minimal disruption to the systems that depend on them. In the post-quantum context, this means: if ML-DSA is broken by a new mathematical attack, you can switch to SLH-DSA without redeploying your infrastructure.

What this requires in practice:

Why the Modular Vendor Approach Fails

The typical enterprise approach to crypto agility:

SystemCrypto LibraryAlgorithm ConfigUpdate Mechanism
API GatewayVendor AConfig fileRolling deploy
Database encryptionVendor BCompiledMaintenance window
AuthenticationVendor CEnvironment varService restart
Backup encryptionVendor DPolicy settingRe-encrypt all
Certificate authorityVendor EProfile selectionRe-issue all certs

When ML-DSA is compromised on a Friday afternoon, you need to disable it across all five vendors, each with different configuration mechanisms, different update procedures, and different rollback strategies. This is not agility. This is coordinated chaos.

The fundamental problem: Crypto agility requires coordinated algorithm changes across all systems simultaneously. Modular vendors make this harder, not easier, because each vendor manages algorithm state independently. More vendors means more coordination points means slower response to a compromise.

How Real Crypto Agility Works

One Layer, One Configuration

Place cryptographic attestation at a single layer in your architecture. Every system produces data; the attestation layer signs it. Algorithm selection happens in one place. When an algorithm is compromised:

The Algorithm Flags Byte

A well-designed attestation primitive includes a field that records which algorithm families are active. When verifying an attestation, the verifier checks which families were active at signing time and validates those signatures. If a family is later compromised, attestations that also include a non-compromised family remain valid.

This is not theoretical architecture. It is a concrete byte in a concrete data structure that determines verification behavior. Flip one bit, disable one family. The remaining families continue protecting everything.

Crypto Agility vs. Crypto Resilience

PropertyCrypto AgilityCrypto Resilience
DefinitionSwap algorithms when one breaksSurvive algorithm failure without swapping
AssumptionOne algorithm active at a timeMultiple algorithms active simultaneously
Response timeHours to days (deploy new algorithm)Instant (disable broken, keep remaining)
Data in flightVulnerable between compromise and swapProtected by remaining families

Crypto agility is necessary but insufficient. You also need crypto resilience: the ability to survive algorithm failure without ANY configuration change, because the other families are already protecting the data. Multi-family signing provides this by default.

The Enterprise Implementation

For an enterprise deploying crypto agility in production:

The crypto agility reality: If you need to coordinate algorithm changes across multiple vendors and systems, you don't have crypto agility. You have a plan to achieve crypto agility, and that plan has a response time measured in weeks, not minutes. Real agility requires one layer, one configuration point, and multiple families active simultaneously.

Read the Migration Guide →
Related

Eric Beans
CEO, H33.ai, Inc.
Patent pending. U.S. Patent Application Nos. 19/309,560 and 19/645,499.
H33-74 is a trademark of H33.ai, Inc.