QNSP

Knowledge base

Reports, whitepapers, datasheets, guides — every entry is a real artifact.

No academic primers. No filler. Every link below points at an artifact already published on qnsp.cuilabs.io — suitable for forwarding to your board or your auditor.

40Curated resources
35Glossary terms
7Resource types
100%Linked to real artifacts

3 reports

Reports

Tamper-bound evidence files. Each is regenerated per release, SHA-3-256 bound, and downloadable as raw JSON for ingestion into your compliance pipeline.

2 whitepapers

Whitepapers

Architecture-grade documentation of how QNSP composes cryptographic primitives. Citation-dense — NIST, IETF, vendor FIPS records.

5 articles

Articles

Practical writing on PQC migration, vendor evaluation, compliance, and the platform engineering behind QNSP.

Article7 min read · 2026-05-14

Five PQC Vendor Red Flags You Can Catch in 10 Minutes

PQC vendor selection is on a 2027 clock. Most vendors selling 'quantum-ready' platforms can't pass a 10-minute scrutiny test. Here are the five red flags you can catch before due diligence even starts.

Article6 min read · 2026-05-14

Why 'Harvest Now, Decrypt Later' is Already on a 2027 Clock

CNSA 2.0 mandates PQC for US National Security Systems starting January 2027. But the real clock started years ago — every byte of encrypted traffic captured today by a state-level adversary is a candidate for future quantum decryption.

Article8 min read · 2026-05-14

Mapping MAS TRM to Post-Quantum Cryptography: The Singapore-Specific PQC Compliance Story

MAS TRM is the Singapore-specific compliance framework that most US-HQ PQC vendors ignore on their Trust Centers. Here's the 10-control mapping — what each section requires, and how a PQC platform actually maps onto it.

Article8 min read · 2026-05-14

What ML-KEM Actually Does: A Plain-English Walkthrough of FIPS 203

Most PQC content assumes you already know the difference between a KEM and a cipher. This post starts at the beginning. ML-KEM is QNSP's default KEM in every tier, and understanding it is the first step in understanding what 'post-quantum' actually means.

Article6 min read · 2026-05-14

Live Compliance Evaluation vs. Snapshot Reports: Why Continuous Beats Annual

A SOC 2 report tells you a vendor's controls were effective last quarter. Live compliance evaluation tells you they're effective right now. Here's why the difference matters — and how QNSP's compliance engine works.

17 datasheets

Datasheets

Per-product and per-algorithm reference. Every datasheet maps to a real backend service running on the QNSP platform today.

Datasheet18 services · 681 routes

QNSP Platform Architecture

18 production microservices across identity, decision, enforcement, data, ops, control, and evidence planes. 681 routes, 43 billable operation types, 4 crypto-policy enforcement tiers.

Datasheet

Capabilities

Maturity ladder (Discover → Enforce → Scale), named-service tiles (KMS, Vault, CBOM, Edge-Gateway, Audit, Enclaves), and the CISO pain-set this platform addresses.

Datasheet7 frameworks · 48 controls

Compliance Mapping — 7 frameworks, 48 controls

Live-evaluated control mapping across SOC 2, HIPAA, GDPR, PCI DSS, ISO 27001, PDPA (Singapore), MAS TRM. Each control linked to the QNSP service that evidences it. Per-tier activation.

DatasheetFIPS 203

ML-KEM — Module-Lattice-based Key Encapsulation Mechanism

NIST's primary post-quantum key encapsulation standard, finalised August 2024 as FIPS 203. ML-KEM is QNSP's default KEM in every tier and powers PQC TLS key agreement, KMS-wrapped data keys, and vault secret encryption.

DatasheetFIPS 204

ML-DSA — Module-Lattice-based Digital Signature Algorithm

NIST's primary post-quantum digital signature standard, finalised August 2024 as FIPS 204. ML-DSA powers JWT signing, audit-log integrity, code-signing, and authn token issuance across QNSP.

DatasheetFIPS 205

SLH-DSA — Stateless Hash-based Digital Signature Algorithm

NIST's hash-based digital signature standard, finalised August 2024 as FIPS 205. SLH-DSA's security rests only on the hardness of finding hash function preimages — the most conservative assumption available — making it the natural choice for long-archival signatures and government-tier policy.

DatasheetFIPS 206 (pending)

FN-DSA — FFT-based NTRU Digital Signature Algorithm

NIST's fourth standardised PQC signature scheme, formally FN-DSA under FIPS 206 (initial public draft pending as of May 2026, per direct correspondence with Dr. Dustin Moody, NIST PQC lead). Falcon's signatures are the most compact of the lattice-based PQC schemes, making it preferred for size-constrained transport.

Datasheet3 variants

HQC — Hamming Quasi-Cyclic Key Encapsulation Mechanism

Code-based KEM selected by NIST in March 2025 as a fifth-round alternate KEM standard, providing an independent cryptographic assumption (coding theory, not lattices) as defence-in-depth against ML-KEM cryptanalysis.

Datasheet3 variants

BIKE — Bit Flipping Key Encapsulation

Code-based KEM finalist (round 4 of NIST PQC standardisation) using QC-MDPC codes. Available in liboqs for QNSP customers seeking additional code-based alternatives.

Datasheet1 variants

Classic McEliece — Classic McEliece Code-Based KEM

The original code-based public-key cryptosystem, in continuous study since 1978 — by far the oldest cryptographic assumption in the PQC catalogue. Trades extremely large public keys for the most-studied security assumption available.

Datasheet3 variants

FrodoKEM — Frodo Key Encapsulation Mechanism

Plain Learning With Errors (LWE) KEM — same lattice family as ML-KEM but without the additional ring or module structure. Larger keys and ciphertexts but built on the most conservative lattice assumption.

Datasheet2 variants

NTRU — Number Theoretic Research Unit Cryptosystem

One of the oldest lattice-based KEMs, in continuous study since 1996. NTRU was a NIST PQC finalist but not selected for FIPS standardisation in favour of ML-KEM.

Datasheet1 variants

NTRU Prime — NTRU Prime (Streamlined / Light NTRU Prime)

NTRU variant designed to use a prime-degree ring polynomial, removing certain structural concerns. Notably deployed in OpenSSH's default post-quantum key exchange.

Datasheet1 variants

MAYO — Multivariate Quadratic Signatures (MAYO)

Multivariate quadratic signature scheme in the NIST PQC additional-signatures track. Short signatures and small public keys; trades signing speed against parameter size.

Datasheet1 variants

CROSS — Codes and Restricted Objects Signature Scheme

Code-based signature using the MPC-in-the-head paradigm over restricted syndrome decoding. NIST PQC additional-signatures track candidate.

Datasheet1 variants

UOV — Unbalanced Oil and Vinegar Signatures

Multivariate signature scheme based on the Unbalanced Oil and Vinegar (UOV) construction, one of the longest-studied multivariate schemes.

Datasheet1 variants

SNOVA — Simple Noncommutative-ring-based UOV Algorithm

Multivariate signature scheme using a non-commutative ring structure to reduce public-key size relative to plain UOV. NIST PQC additional-signatures track candidate.

4 guides

Guides

Buyer-side migration paths, vendor evaluation rubrics, and the operating model for moving production trust onto QNSP.

6 comparisons

Comparisons

Side-by-side QNSP vs the platforms enterprise teams already use — AWS KMS, Azure Key Vault, HashiCorp Vault, Fortanix DSM, SandboxAQ.

3 faqs

FAQ

Concrete answers — no marketing fluff — to the questions every prospective customer asks.

35 terms

PQC glossary

Buyer-grade definitions. Every entry cites a NIST publication, FIPS standard, IETF RFC, or QNSP source-of-truth file.

Algorithms (9)

ML-KEM · Kyber · CRYSTALS-Kyber

Module-Lattice-based Key Encapsulation Mechanism. NIST's primary post-quantum KEM standard, finalised as FIPS 203 in August 2024. Three parameter sets (512, 768, 1024) at NIST security levels 1, 3, and 5. QNSP default KEM in every tier.

FIPS 203

ML-DSA · Dilithium · CRYSTALS-Dilithium

Module-Lattice-based Digital Signature Algorithm. NIST's primary post-quantum signature standard, finalised as FIPS 204 in August 2024. Three parameter sets (44, 65, 87). Used by QNSP for JWT signing, audit-chain Merkle-root sealing, and CBOM attestation.

FIPS 204

SLH-DSA · SPHINCS+

Stateless Hash-Based Digital Signature Algorithm. NIST's hash-based signature standard, finalised as FIPS 205 in August 2024. Twelve parameter sets across SHA2 / SHAKE hash families. Conservative security based solely on hash-function strength — used by QNSP on Government tier when lattice assumptions are not acceptable.

FIPS 205

FN-DSA · Falcon

FFT-over-NTRU-Lattices Digital Signature Algorithm. NIST signature standard scheduled as FIPS 206 (draft). Two parameter sets (512, 1024). Smaller signatures than ML-DSA, used by QNSP for code-signing and TLS certificates where on-wire size matters.

HQC

Hamming Quasi-Cyclic. NIST-selected code-based KEM (March 2025) — second pillar alongside ML-KEM in NIST's PQC migration plan. Three parameter sets (128, 192, 256). Used by QNSP as the second KEM in defense-in-depth hybrid mode on Maximum and Government tiers.

NIST IR 8528

Classic McEliece

Code-based KEM from a 1978 cryptosystem with the longest cryptanalytic track record of any NIST candidate. Very large public keys (~261 KB at level 5) but very small ciphertexts (~96 bytes). NIST Round 4 finalist; QNSP supports it for HNDL-conservative deployments.

BIKE

Bit Flipping Key Encapsulation. NIST Round 4 KEM finalist, code-based, balanced key-size vs ciphertext-size. Three parameter sets (L1, L3, L5).

FrodoKEM

Plain Learning-with-Errors KEM without the algebraic structure of ML-KEM. Larger but conservative — selected by BSI (German government) for high-assurance applications.

MAYO

Multivariate signature scheme from NIST's onramp signature competition. Smaller signatures than ML-DSA, larger public keys.

PQC concepts (9)

PQC · Post-Quantum Cryptography

Cryptography designed to resist attack by both classical and quantum computers. Distinct from quantum cryptography (which uses quantum mechanics to transmit keys, e.g. QKD). All four NIST standards (FIPS 203/204/205/206) are PQC — they run on classical hardware and resist quantum attack.

CRQC · Cryptographically Relevant Quantum Computer

A quantum computer capable of breaking RSA-2048 or equivalent classical cryptography. NIST and major banks publicly estimate ~2030–2035. The CRQC arrival date is the deadline for completing PQC migration.

HNDL · Harvest Now, Decrypt Later

Adversary captures encrypted traffic today and stores it. When a CRQC arrives, every captured ciphertext is retroactively decryptable. Long-life records (medical, financial, classified, transcripts) are HNDL targets the moment they touch a wire.

KEM · Key Encapsulation Mechanism

A primitive that establishes a shared symmetric key between two parties without traditional public-key encryption. ML-KEM, HQC, BIKE, FrodoKEM, McEliece are all KEMs. Used to wrap AES-256-GCM data keys in QNSP vault + KMS.

Hybrid PQC · X25519MLKEM768

Composition of a classical KEM (X25519) and a PQC KEM (ML-KEM-768) where session security holds if either is unbroken. Standard for PQC TLS today — used by QNSP edge-gateway, AWS KMS, Google Cloud KMS, Cloudflare, and the major browsers.

Lattice-based cryptography

Cryptography whose security reduces to the hardness of problems on mathematical lattices (Learning With Errors, Module-LWE, NTRU). ML-KEM, ML-DSA, FN-DSA are all lattice-based. Most widely deployed PQC family in 2026.

Code-based cryptography

Cryptography whose security reduces to decoding random linear codes. McEliece (1978), HQC, BIKE, CROSS. Longest cryptanalytic track record of any PQC family.

Cryptographic agility · Crypto-agility

The architectural property that lets an organisation swap one cryptographic algorithm for another without changing application code or data-at-rest formats. QNSP crypto-policy tiers + KMS algorithm parameter implement this directly — application code calls `kms.encrypt(key)` and the policy decides which algorithm runs.

Cross-verification

Running the same cryptographic operation through two independent implementations and comparing results — defends against implementation bugs (not algorithm weakness). QNSP cross-verifies between liboqs (C/native) and @noble/post-quantum (pure-JS) on Maximum and Government tiers across the 18 algorithms shared by both providers.

Standards & programs (11)

FIPS 203

NIST Federal Information Processing Standard for ML-KEM. Final, published August 2024. Authoritative spec for ML-KEM-512 / 768 / 1024 parameter sets, key generation, encapsulation, and decapsulation procedures.

Read the standard

FIPS 204

NIST Federal Information Processing Standard for ML-DSA. Final, published August 2024. Authoritative spec for ML-DSA-44 / 65 / 87.

Read the standard

FIPS 205

NIST Federal Information Processing Standard for SLH-DSA. Final, published August 2024. Authoritative spec for SLH-DSA across SHA2 and SHAKE hash families.

Read the standard

FIPS 140-3

NIST standard for cryptographic module security validation. Distinct from FIPS 203/204/205 (which validate algorithms). QNSP integrates customer-managed FIPS 140-3 validated HSMs (Thales Luna, Entrust nShield, AWS CloudHSM, Azure Dedicated HSM, GCP HSM, Marvell LiquidSecurity) on Maximum and Government tiers.

CNSA 2.0 · Commercial National Security Algorithm Suite 2.0

NSA mandate to transition US National Security Systems to post-quantum algorithms. ML-KEM-1024, ML-DSA-87, SLH-DSA-256 are the CNSA 2.0 algorithm set. Compliance dates: 2030–2033 depending on system class. QNSP Government tier locks exactly to this algorithm set.

NSA CNSA 2.0 advisory

NIST ACVP · Automated Cryptographic Validation Protocol

NIST's automated protocol for testing cryptographic implementations against canonical test vectors. Run as part of the CAVP (Cryptographic Algorithm Validation Program). QNSP runs an ACVP-shaped conformance harness against both providers and publishes results at /verify/conformance with SHA-3-256 tamper-binding.

NIST CAVP

NIST SP 800-208

NIST Special Publication on stateful hash-based signatures (XMSS, LMS) — used for code-signing and firmware. QNSP supports the SLH-DSA family for these workloads.

NIST SP 800-90A/B/C

NIST Special Publications on random bit generation. 800-90A defines DRBG (deterministic generators); 800-90B defines entropy sources; 800-90C composes them into an RBG. QNSP entropy chain is documented at /trust/entropy with citations to each.

MAS TRM · Monetary Authority of Singapore — Technology Risk Management

Singapore's regulator-grade IT risk framework for licensed financial institutions. Released January 2021. QNSP evaluates 10 MAS TRM controls live in audit-service. Live evaluation page at /trust/compliance.

PDPA · Personal Data Protection Act (Singapore)

Singapore's data protection law (2012, revised 2021). QNSP evaluates 9 PDPA obligations including consent, purpose limitation, protection, retention, and breach notification.

DORA · Digital Operational Resilience Act (EU)

EU regulation covering ICT third-party risk and operational resilience for financial entities. Applies to insurers, asset managers, banks, payment providers. QNSP maps to DORA via its continuous compliance evidence chain.

QNSP platform (6)

CBOM · Cryptographic Bill of Materials

CycloneDX-compatible inventory of every cryptographic asset across an organisation's estate — algorithms, keys, certificates, TLS endpoints, code-signing keys. QNSP crypto-inventory-service exports CBOM with per-asset NIST classification and HNDL-exposure scoring.

BYOH · Bring Your Own HSM

Deployment model where the customer's hardware security module is the root of trust for QNSP KMS — sign / wrap / unwrap operations execute inside the customer HSM boundary; QNSP never holds the root key. Supports Thales Luna, Entrust nShield, Utimaco u.trust, AWS CloudHSM, Azure Dedicated HSM, Google Cloud HSM, IBM Cloud HSM, Marvell LiquidSecurity.

SSE-X · Searchable Symmetric Encryption with eXtended PQC

QNSP's searchable encryption layer — clients can query encrypted indexes without the server seeing plaintext. PQC-wrapped data keys protect the underlying AES-256-GCM symmetric encryption. Used in vault search, storage search, and encrypted vector search for RAG.

Crypto-policy tier

Per-tenant enforcement level that locks which PQC algorithms and parameter sets are allowed. Four tiers: default (all 90 algorithms), strict (FIPS-finalised KEMs + signatures), maximum (strongest parameter sets, cross-verification mandatory), government (CNSA 2.0 lock + HSM required). Defined in packages/security/src/crypto-policy.ts.

Audit chain

QNSP audit-service writes every key operation, vault access, and policy decision into a SHA3-512 Merkle tree. The tree's root is periodically signed with ML-DSA-65 (default) or ML-DSA-87 (Government tier). Customers can independently verify any historical operation against the published root signature.

Tenant isolation

Cryptographic separation between QNSP tenants — per-tenant keys, per-tenant audit chains, per-tenant policy. Enforced at every layer (edge-gateway, service mTLS via SPIFFE SVIDs, KMS authorization, vault access). A breach in one tenant cannot be replayed against another.

FAQ

Getting Started

4 concrete answers — no marketing fluff.

What is QNSP?

QNSP (Quantum-Native Security Platform) is a comprehensive security platform implementing NIST-standardized post-quantum cryptography. It provides 18 production microservices including auth, storage, search, KMS, vault, and AI orchestration — all protected with quantum-resistant encryption.

How does the free tier work?

The free tier is free forever for everyone. You get 10 GB quantum-secure storage, 50,000 API calls/month, 20 KMS keys, 25 vault secrets, PQC TLS on all connections, and full access to all SDKs (TypeScript, Python, Go, Rust). No credit card required, no time limits.

What happens when I exceed free tier limits?

When you approach your limits, you'll receive notifications via the cloud portal. You can upgrade to a paid tier anytime. There's no automatic overage billing — your account will be rate-limited until you upgrade or your monthly quota resets.

Can I upgrade or downgrade my plan?

Yes. You can upgrade anytime through the cloud portal with immediate effect. Downgrades take effect at the end of your current billing period. Annual plans offer 5–15% savings.

FAQ

Technical

3 concrete answers — no marketing fluff.

What post-quantum cryptography algorithms does QNSP use?

QNSP implements 90 PQC algorithms across 14 families. NIST-finalized: ML-KEM (FIPS 203), ML-DSA (FIPS 204), and SLH-DSA (FIPS 205). Additional families include BIKE, Classic McEliece, FrodoKEM, NTRU, MAYO, CROSS, UOV, and SNOVA.

What hardware enclaves does QNSP support?

QNSP supports 8 hardware enclave types: Intel SGX, AMD SEV, NVIDIA CC, Intel TDX, ARM TrustZone, ARM CCA/RME, AWS Nitro Enclaves, and IBM Secure Execution. All include cryptographic attestation.

How does QNSP integrate with HSMs?

QNSP supports PKCS#11 integration with major HSM vendors including Thales Luna, Entrust nShield, AWS CloudHSM, and Azure HSM. Root keys can be HSM-backed for high-security deployments.

FAQ

Compliance

3 concrete answers — no marketing fluff.

Is QNSP FIPS 140-3 certified?

QNSP implements NIST-finalized PQC algorithms (ML-KEM, ML-DSA, SLH-DSA) per FIPS 203/204/205. FIPS 140-3 certification depends on deployment model and HSM configuration. Enterprise tiers support customer-managed HSMs for FIPS compliance.

What compliance frameworks does QNSP support?

QNSP is designed to support SOC 2, ISO 27001, GDPR, HIPAA, and FedRAMP requirements. CSA STAR Level 1 self-assessment is publicly available. Actual compliance status depends on deployment model and customer configuration.

Where is customer data stored?

QNSP Cloud (hosted) runs on AWS ap-southeast-1 (Singapore). Enterprise tiers support region selection, VPC deployment, on-premises, and air-gapped deployments for data residency requirements.

Next

Start free or talk to a deployment lead