As September gathers pace, the semiconductor story on post-quantum cryptography (PQC) is broadening from “roadmaps” to tangible building blocks across tool-chains, firmware, and controllers.

What’s new (and useful) right now

  • STMicroelectronics ships a PQC firmware pack with NIST-validated primitives. The X-CUBE-PQC library for STM32H563xx adds ML-KEM and ML-DSA with CAVP validation, alongside LMS/XMSS support—aimed at secure boot, updates, and crypto-agility in embedded designs. This is a practical on-ramp for engineering teams that want to prototype PQC now on mainstream Cortex-M33 MCUs.
  • Microchip bakes PQC into its embedded controller line for PCs and edge systems. The MEC175xB familyis positioned for CNSA 2.0 transitions, with built-in support for ML-KEM, ML-DSA, and LMS to harden secure boot and firmware verification—useful for OEMs who need silicon-level assurances in platform controllers.
  • NXP maps PQC into the hardware root of trust. In its post-quantum security overview, NXP explicitly targets fast secure boot, secure debug/update, and authenticated messaging with PQC anchored in the root of trust—helpful framing for teams planning staged migrations and hybrid deployments.
  • Infineon’s certification milestone sets a bar for assurance. Separate from its MCU news, Infineon (with Germany’s BSI) announced the first Common Criteria EAL6 certification for a PQC algorithm implementation (ML-KEM) in a security controller—relevant for sectors that treat formal evaluation as table stakes.

Why it matters

  • Secure-boot and update paths are going quantum-ready first. Across vendors, the earliest PQC touchpoints are firmware verification and update flows (LMS/XMSS today; lattice schemes gaining traction), which is exactly where long-lived devices face the highest risk exposure.
  • Validation beats aspiration. ST’s CAVP notes and Infineon’s Common Criteria work signal a shift from slideware to artifacts that auditors can actually check.
  • Crypto-agility is the common theme. Libraries and controllers are being shaped to run classical + PQC (hybrid) and evolve as NIST profiles and CNSA 2.0 timelines harden in procurement.

What to watch through month-end

  • Tooling for key provisioning and hybrid signing that reduces developer friction on first deployments (e.g., LMS today, lattice tomorrow).
  • Clearer performance+latency data for PQC secure-boot on resource-constrained MCUs (boot times, memory budgets).
  • Any vendor moves timed to late-September events that push PQC from pilots to default options in new silicon spins.

Editor’s note: We’re tracking additional September drops; expect a consolidated end-of-month piece tying these building blocks to CNSA 2.0 adoption paths and sector-specific implications (industrial, energy, automotive).

Specific Sources

  • STMicroelectronics X-CUBE-PQC library: ST official product page & documentation – firmware expansion pack for STM32H563xx with NIST-validated ML-KEM, ML-DSA, and support for LMS/XMSS. ST X-CUBE-PQC
  • Microchip MEC175xB Embedded Controllers: Press release & product page – PQC-enabled embedded controllers with CNSA 2.0 support (ML-KEM, ML-DSA, LMS). Microchip MEC175xB Product Page
  • NXP PQC Root of Trust positioning: NXP security architecture page – outlines PQC in hardware root of trust for secure boot, debug, update, and authenticated communications. NXP Post-Quantum Cryptography Overview
  • Infineon & BSI Certification News: Infineon press release – world’s first Common Criteria EAL6 certificate for PQC algorithm (ML-KEM) in a security controller. Infineon News Release

Discover more from The Quantum Space

Subscribe to get the latest posts sent to your email.

Leave a Reply

Trending

Discover more from The Quantum Space

Subscribe now to keep reading and get access to the full archive.

Continue reading

Discover more from The Quantum Space

Subscribe now to keep reading and get access to the full archive.

Continue reading