Back to Blog
ReleaseFeatured

HPCrypt 2.0: Building the Future of Post-Quantum Cryptography

A deep dive into our latest release featuring ML-DSA and ML-KEM implementations that outperform existing solutions by up to 2x, preparing enterprises for the quantum computing era.

Mamone TarshaMamone Tarsha
November 18, 2025
7 min read

The Quantum Threat Is No Longer Theoretical

The cryptographic landscape is undergoing its most significant transformation since the adoption of public-key cryptography in the 1970s. With NIST's finalization of FIPS 203, 204, and 205 in August 2024, the post-quantum era has officially begun. Organizations worldwide are now racing to implement quantum-resistant algorithms before large-scale quantum computers become a reality.

HPCrypt 2.0 represents years of research and engineering effort to deliver production-ready post-quantum cryptography with uncompromising performance.

What Makes HPCrypt 2.0 Different

ML-DSA: Digital Signatures for the Quantum Age

The Module-Lattice Digital Signature Algorithm (ML-DSA, standardized as FIPS 204) replaces classical signature schemes like RSA and ECDSA. Our implementation delivers exceptional performance across all security levels:

Security LevelKey GenerationSigningVerification
ML-DSA-4422.5μs52.3μs28.9μs
ML-DSA-6538.7μs74.4μs40.9μs
ML-DSA-8761.2μs108.2μs58.3μs

These numbers represent a 2x improvement over alternative Rust implementations, achieved through careful algorithm design and architecture-specific optimizations.

ML-KEM: Secure Key Exchange

The Module-Lattice Key Encapsulation Mechanism (ML-KEM, standardized as FIPS 203) enables secure key establishment resistant to quantum attacks. Our implementation focuses on the critical encapsulation/decapsulation round-trip:

Security LevelEncapsulationDecapsulationRound-Trip
ML-KEM-51218.7μs19.2μs37.9μs
ML-KEM-76829.1μs30.5μs59.6μs
ML-KEM-102449.0μs51.3μs100.3μs

Architecture and Design Decisions

Pure Rust with Zero Unsafe Code

HPCrypt 2.0 is written entirely in safe Rust, eliminating entire classes of memory safety vulnerabilities. We achieve competitive performance without resorting to unsafe blocks through:

  • Careful memory layout optimization
  • Strategic use of const generics
  • Compile-time loop unrolling

Constant-Time Execution

Every operation in HPCrypt runs in constant time, preventing timing side-channel attacks:

use hpcrypt::ml_dsa::{MlDsa65, SigningKey, VerifyingKey};

// Key generation is constant-time
let signing_key = SigningKey::<MlDsa65>::generate(&mut rng);
let verifying_key = signing_key.verifying_key();

// Signing and verification are constant-time
let signature = signing_key.sign(message);
verifying_key.verify(message, &signature)?;

Platform-Specific Optimizations

While maintaining a pure Rust fallback, HPCrypt automatically detects and uses platform-specific intrinsics:

  • AVX2/AVX-512: Vectorized NTT operations on x86_64
  • NEON: ARM-optimized polynomial arithmetic
  • Portable: Efficient scalar fallback for all platforms

Migration Strategy

For organizations planning their post-quantum migration, we recommend a phased approach:

  1. Inventory: Catalog all cryptographic usage in your systems
  2. Hybrid Mode: Deploy ML-KEM alongside classical ECDH for key exchange
  3. Testing: Validate performance under production workloads
  4. Full Migration: Replace classical algorithms entirely

HPCrypt 2.0 supports hybrid modes out of the box, allowing gradual migration without service disruption.

What's Coming Next

  • WebAssembly Target: Browser-native post-quantum crypto

Get Started

HPCrypt 2.0 is available now on GitHub. Full documentation, migration guides, and benchmarking tools are included.

The quantum future is coming. With HPCrypt 2.0, you're ready for it.

Interested in learning more?

Get in touch with our team to discuss how we can help with your cryptography needs.

Book a Meeting