Mike Baxter from Entrust has achieved NIST validation for the post‑quantum algorithms ML‑DSA, ML‑KEM and SLH‑DSA in the company’s nShield HSM firmware v13.8.0, released 22 August 2025, which now meets FIPS 140‑3 Level 3 certification requirements. The validation, conducted by the NIST Cryptographic Algorithm Validation Programme, confirms that the firmware natively supports these three NIST‑standardised post‑quantum schemes, enabling organisations to deploy quantum‑safe security without delay. This milestone positions Entrust as a leader in hardware security modules that are ready for the post‑quantum era.
Entrust nShield Achieves NIST Validation for Post Quantum Algorithms
Entrust announced that its nShield hardware security modules now carry formal validation from the National Institute of Standards and Technology (NIST) for the three post‑quantum primitives ML‑DSA, ML‑KEM and SLH‑DSA. Chief Technology and Product Officer Mike Baxter explained that the validation, achieved through NIST’s Cryptographic Algorithm Validation Programme (CAVP), confirms correct implementation within firmware release version 13.8.0, made available on 22 August 2025. The same firmware has been submitted for updated FIPS 140‑3 Level 3 certification via the Cryptographic Module Validation Programme (CMVP), demonstrating resilience against sophisticated physical and logical attacks and meeting NIST’s stringent security and operational requirements. By embedding the primitives directly into the HSM’s hardware, Entrust delivers tamper‑resistant protection for key material while enabling organisations to generate and manage cryptographic keys with confidence, flexibility and scalability. The company’s global partner network and support for customers in more than 150 countries reinforce its position as a benchmark for quantum‑safe security in hardware security modules.
Implications for Global Cybersecurity Standards and FIPS 140‑3 Certification
The dual validation signals convergence between post‑quantum readiness and existing federal compliance frameworks. Inclusion of NIST‑standardised post‑quantum algorithms within a FIPS 140‑3 Level 3 certified module provides a concrete example for regulators and industry bodies that quantum‑safe primitives can coexist with, and enhance, established security baselines. Organisations that must meet FIPS 140‑3 can now adopt quantum‑resistant cryptography without abandoning compliance, potentially accelerating the broader transition to post‑quantum infrastructures. The certification “is a key differentiator for our customers,” a statement that underscores the commercial and operational value of aligning with NIST’s evolving standards. The announcement positions Entrust as a benchmark for vendors seeking to demonstrate that their hardware can support both classical and post‑quantum algorithms under the most stringent federal guidelines, and a ripple effect is expected to prompt standard‑setting bodies to refine criteria and encourage uniform adoption across sectors.
Immediate Deployment Benefits for Enterprises and Governments in 2025
The firmware release delivers a production‑ready, NIST‑validated post‑quantum cryptography solution that enterprises and governments can deploy immediately. By embedding ML‑DSA, a lattice‑based digital signature scheme; ML‑KEM, a key encapsulation mechanism derived from the same lattice foundations; and SLH‑DSA, a hash‑based signature algorithm, the nShield’s secure processor supports key generation, signing and encapsulation within a tamper‑resistant enclave. The modular design permits scaling from small‑scale deployments to large‑volume key management centres, ensuring start‑ups and multinational organisations can adopt the same secure foundation. For enterprises, the confluence of quantum‑resistant security and established compliance means they can integrate the HSMs into existing infrastructure, protecting sensitive keys and certificates against both classical and future quantum attacks while maintaining current regulatory obligations. Governments benefit from Level 3 status, confirming the modules can withstand sophisticated assaults and providing a clear compliance pathway that reduces the risk of regulatory gaps during the transition to quantum‑safe environments.
Original Press Release
Source: Entrust View Original Source
