Csi Cnsa 2.0 Faq
Csi Cnsa 2.0 Faq
Sections
Background
CNSA 2.0
Timeframe
Preparation
CNSSP 15
Quantum alternatives
CSfC and NIAP
Future cryptographic algorithms
Hybrids
Further information
Background
Q: To whom are these requirements addressed?
National Security System (NSS) owners and operators, who need to know the
requirements for their systems
NSA is not using these requirements to dictate to any other entity outside of NSS what
algorithms they should use, although NSA recognizes that interoperability requirements
or other interests may lead to scenarios where these recommendations are used by a
larger community.
A: In place of ordinary bits used by today’s computers, quantum computers use “qubits”
that behave in surprising ways, efficiently performing certain mathematical algorithms
exponentially faster than a classical computer. Small examples of quantum computers
have been built.
Q: Can I continue to use larger sizes of RSA or ECC to address the threat?
A: No. RSA and Elliptic Curve Cryptography are the main algorithms that need to be
replaced to achieve quantum resistance.
Q: What is the Commercial National Security Algorithm Suite 2.0 (CNSA 2.0)?
A: CNSA 2.0 is the suite of QR algorithms approved for NSS use. The following table
lists the algorithms and their functions, specifications, and parameters.
CNSA 2.0
Q: Where should CNSA 2.0 algorithms be used?
A: CNSA 2.0 algorithms will be required for all products that employ public-standard
algorithms in NSS, whether a future design or currently fielded. Any usage of Suite B or
CNSA 1.0 algorithms will be required to transition to CNSA 2.0. The Timeframe section
of this FAQ and CNSSP 15 provide transition timeframe information. More details will be
released on an ongoing basis as industry adjusts to the new technology.
A: NSA chose algorithms from among those selected for standardization by the National
Institute of Standards and Technology (NIST), the U.S. Government lead for
commercial algorithm approval. NSA believes they offer optimal performance for given
NSS security requirements.
Q: Does NSA intend to produce guidance for CNSA 2.0 similar to the IETF RFCs1
produced for CNSA 1.0?
A: NSA will provide direction for using CNSA 2.0 algorithms securely in a variety of use
cases, and is working with the IETF to produce informational guides to aide with
protocol deployment through the RFC series. RFCs detail protocol options in addition to
algorithm choices, and NSA expects to provide protocol guidance to ensure smooth and
secure operation with CNSA 2.0 algorithms.
1
Internet Engineering Task Force Requests for Comments.
A: High-grade equipment will follow the guidance in CJCSN 65104 and CNSSAM 01-07-
NSM5. Commercial equipment will follow CNSA 1.0 until the transition mandated by
CNSSP 156, expected to occur sometime between 2025 and 2030, depending on
equipment type. In accordance with NSM-10 and CNSSP-11, QR algorithms should be
implemented in NSS mission systems as National Information Assurance Partnership
(NIAP) validated products or in accordance with other implementation-specific
guidance. Typically, this will include, but not be limited to, requiring modules be
validated by the NIST Cryptographic Module Validation Program (CMVP).
A: ML-KEM and ML-DSA are fully specified standards described by NIST in FIPS 203
and 204, respectively. CRYSTALS-Kyber is the name of the proposed algorithm
submitted to NIST that eventually became ML-KEM, and similarly CRYSTALS-Dilithium
became ML-DSA. In particular, the CRYSTALS algorithms had a variety of versions that
were slightly tweaked prior to the publication of the FIPS documents. Once NIST
announced the drafting of CRYSTALS-Kyber and CRYSTALS-Dilithium into standards,
NSA announced that the standards would be part of CNSA 2.0. NSA clarified the CNSA
2.0 language when the FIPS documents were published. Only ML-KEM and ML-DSA
2
Memorandum on Improving the Cybersecurity of National Security, Department of Defense, and Intelligence Community Systems,
19 January 2022.
3
National Security Memorandum on Promoting United States Leadership in Quantum Computing While Mitigating Risks to
Vulnerable Cryptographic Systems, 4 May 2022.
4
Chairman of the Joint Chiefs of Staff Notice 6510, Information Assurance Cryptographic Device Modernization Requirements,
August 2019.
5
Committee on National Security Systems Advisory Memorandum 01-07-NSM, Cryptographic Equipment Modernization Planning,
20 March 2022.
6
Committee on National Security Systems Policy 15, Use of Public Standards for Secure Information Sharing.
A: From NIST SP 800-208, NSA has only approved LMS and XMSS for use in NSS.
The multi-tree algorithms HSS and XMSSMT are not allowed.
Q: I'm going to adopt LMS or XMSS for software/firmware validation for NSS.
Which components need to be validated, and how? If my hardware security
module (HSM) is not FIPS-validated, can I get a waiver?
Code sources (signers) that are NSS are required to produce signatures according to
NIST SP 800-208, which requires hardware validated by NIST’s Cryptographic Module
Validation Program (CMVP), or via other NSA guidance. Waivers will not be granted for
this.
While some code sources (signers) are not considered NSS themselves and may not
be subject to CNSA requirements, they are expected to use code that meets the same
7
NIST Special Publication 800-208, Recommendation for Stateful Hash-Based Signature Schemes.
development and operational quality as the validated code, that is, code that can pass
CAVP testing for use in NSS components.
Note: To avoid weakening the security of these signatures, one should implement
signing and state management in hardware, such as an HSM. Backup flows, which may
involve transferring keys between modules, must prevent state re-use.
A: NIAP validates products against its published Protection Profiles, which will start
including quantum-resistant signatures consistent with NSA’s published transition
timelines. For commercial vendors, NSA does not anticipate NIAP Protection Profiles
performing signature generation within the Target of Evaluation (TOE) boundary, only
signature verification. As signature generation is the component of LMS/XMSS that
requires state management, if only signature verification is being performed, only CAVP
validation (not CMVP) will be expected to meet CNSA 2.0 for such products.
NIST standardized the algorithms in NIST SP 800-208 earlier and has CAVP
validation available, while other quantum-resistant signatures may not be as
easily available for integration;
systems that are designed for extensibility and cryptographic agility, a quantum-
resistant root of trust may be required in the firmware years before the rest of the
system upgrades to quantum-resistance. NSA prioritizes this in its timelines to avoid
unexpected costs and security issues later in the NSS transition.
The SHA-2 selections are sufficient for security, and their ubiquity in the commercial
world ensures interoperability. Using SHA-3 or SHAKE outside those narrowly defined
applications where it is completely self-contained, such as when called within an
algorithm function, significantly increases the interoperability testing burden and breaks
many use cases for CNSA 2.0.
These reports include summaries of all the cryptography under consideration and many
references.
A: Yes, however firmware roots of trust are a critical component to upgrade and NSA
expects this to be implemented for some long-lived signatures in 2025, before validated
ML-DSA is widely available. At this time, validated LMS and XMSS are commercially
available. NSA prefers to see this transition begin now (using LMS and XMSS) rather
than wait for ML-DSA due to the long timeframes involved in moving from small
components and/or early designs to completed products.
Validated ML-DSA is approved for all signing use cases and when it is available it may
be the most appropriate choice for some software/firmware signing use cases. For
example, when a user’s software signing strategy requires more signatures than can be
reasonably used with a single LMS or XMSS key, or in software development
environments with a distributed signing system, it would be reasonable to use ML-DSA.
A: Not at the present time. HashML-DSA is a variant on ML-DSA in FIPS 204, which
describes a method of compressing a message before signing while intentionally
breaking interoperability with ML-DSA to prevent a vulnerability in the case of key re-
use. Because HashML-DSA does not offer any functionality not already offered by the
CNSA hash functions combined in a standard way with ML-DSA-87, and because
standard ML-DSA-87 is expected to be widely supported, NSA anticipates there will be
no need for HashML-DSA in NSS. Hence, at this time, HashML-DSA is not allowed. If at
a later date protocol usage demands it, NSA will provide specific guidance on its limited
usage at that time.
A: SHA-384 remains approved in the CNSA 2.0, as NSA believes it provides sufficient
security for NSS. Designers often prefer to use SHA-512 for performance reasons. This
is now supported by CNSA 2.0; however, customers need to be certain that using SHA-
512 does not lead to interoperability issues.
Just as SHA-512 was added to CNSA, NSA may in the future add another NIST
algorithm if it achieves ubiquity in a key area of the ecosystem, satisfies NSA’s
independent security requirements, and is unlikely to interfere with interoperability.
quantum resistant, and other algorithms should not be employed. Further, CNSSP-11
requires that commercial products used in NSS be NIAP validated, and this validation
will generally require CNSA 2.0 compliance.
Timeframe
Q: What timeframe information can NSA provide for adoption of CNSA 2.0?
A: NSA intends that all NSS will be quantum-resistant by 2035, in accordance with the
goal espoused in NSM-10. NSA’s recent update to CNSSP 15 has set several dates to
aid in this transition in the commercial space, with the hope of completing much of the
transition sooner.
Any NSS currently validated against a NIAP or CSfC profile continues to be approved
for the life of that validation, and no requirement to transition will be enforced prior to
December 31, 2025. However, any NSS not CNSA 1.0 compliant has six months from
the publication date of the updated CNSSP 15 to come into compliance with CNSA 2.0,
or 90 days to request a waiver.
CNSSP 15 states that by January 1, 2027, all new acquisitions for NSS will be required
to be CNSA 2.0 compliant unless otherwise noted.
By December 31, 2030, all equipment and services that cannot support CNSA 2.0 must
be phased out unless otherwise noted, and by December 31, 2031, CNSA 2.0
algorithms are mandated for use unless otherwise noted.
Q: When will IETF RFCs containing guidance on configurations for CNSA 2.0
compliant protocols be available?
A: IETF and other SDOs are independent bodies that are in charge of their own
publication schedules. Due to the interest in this guidance beyond standard NSA
customers, and to facilitate quantum-resistant deployment more broadly, NSA is
working with IETF and other SDOs to produce RFCs and other documentation with the
appropriate level of security and implementation analysis. NSA encourages CNSA 2.0
adoption in standards and deployment in vendor products, but it is not a requirement
beyond NSS.
1. It updated the list of allowed algorithm standards, which was previously defined
as CNSA 1.0, to now require CNSA 2.0. This deprecated all quantum-vulnerable
algorithms, added quantum-resistant public key mechanisms, as well as added
SHA-512 into general usage and SHA3 into specific applications.
2. It set out dates for the transition from CNSA 1.0 to CNSA 2.0, including adoption
dates for new systems, as well as deprecation dates for currently deployed
systems.
3. It revoked the previous eight years of waivers to CNSSP 15, which therefore
requires modernization of several NSS.
Q: How does CNSSP 15 relate to CNSSI 1253, NIST SP 800-53, and the RMF
process?
A: CNSS Instruction 12538 mandates using the Risk Management Framework (RMF) as
documented in NIST SP 800-399 and NIST SP 800-5310 in managing National Security
Information Systems. NIST SP 800-53 includes security controls (e.g., SC-12) that
relate to cryptography. NSS requires the “NSA Approved” selection. Unless NSA states
otherwise, the “NSA Approved” cryptography selection includes CNSA 2.0 algorithm
requirements as well as all other relevant NSA guidance on product validation and
operation.
8
Committee on National Security Systems Instruction 1253, Security Categorization and Control Selection for National Security
Systems.
9
NIST Special Publication 800-39, Managing Information Security Risk: Organization, Mission, and Information System View.
10
NIST Special Publication 800-53 Rev.5, Security and Privacy Controls for Information Systems and Organizations.
A: NSA establishes NSS requirements. Often these systems require protection for long
periods against sophisticated targeted efforts and well-resourced adversaries in
potential wartime settings. NIST establishes cryptographic standards for other
government systems.
NSA selected the algorithms in CNSSP 15 from those chosen by NIST in order to
satisfy both NSA requirements for NSS and to simplify implementation and
interoperability by aligning with NIST standards for general government use. If you are
uncertain whether NSS requirements apply to a specific system, contact NSA for
assistance. Also see NIST SP 800-5911.
Quantum alternatives
Q: Can I mitigate the quantum threat to NSS by using a pre-shared key?
A: Many commercial protocols allow a pre-shared key option that may mitigate the
quantum threat, and some allow the combination of pre-shared and asymmetric keys in
the same negotiation. However, this issue can be complex. Customers who wish to
explore this option should contact NSA or follow guidance the CSfC program provides.
A: Quantum computing techniques are generally considered much less effective against
symmetric algorithms than against current widely used public-key algorithms. While
public-key cryptography requires fundamental design changes, symmetric algorithms
are considered secure, provided the key size is sufficiently large. CNSA 2.0 symmetric
algorithms, which essentially are the same as their CNSA 1.0 counterparts, are
quantum-resistant.
Q: Why does NSA care about quantum computing today? Isn’t quantum
computing a long way off?
11
NIST Special Publication 800-59, Guideline for Identifying an Information System as a National Security System.
decade to achieve. NSA does not know when there will be a CRQC. Expert
assessments disagree significantly about timing. Because NSS often have very long
lifecycles, NSA must produce requirements today for systems that will be used many
decades in the future. Consequently, the data these systems protect will still require
cryptographic protection for decades after these systems are at end of life. There is
growing research in the area of quantum computing, and enough progress that NSA
must act now to protect NSS by providing the requirements for the transition to CNSA
2.0.
A: No. The technology involved is of significant scientific interest, but it only addresses
some security threats and requires significant engineering modifications to NSS
communications systems. NSA does not generally consider QKD a practical security
solution for protecting NSS. NSS owners should not use or research QKD at this time
without consulting NSA directly. For specific questions, NSS owners can contact NSA.
A: Quantum random number generators are hardware random number generators that
use specific quantum effects to generate nondeterministic randomness. The decision on
which RNG is appropriate in a specific scenario depends on many factors. In addition,
any properly certified/approved RNG should be acceptable if you implement it within the
constraints of that approval.
Q: I have long data life concerns and want to adopt CSfC solutions. How can I
ensure my communications and data remain secure against an adversary with a
quantum computer?
A: Some CSfC solutions may be implemented today using symmetric, pre-shared keys
that protect against the long-term quantum computing threat. NSA considers using pre-
shared symmetric keys in a standards-compliant fashion a better near-term post-
quantum solution than implementing unvalidated post-quantum asymmetric algorithms.
Eventually, NSA will provide Capability Packages—to coincide with commercial
technological development—to support CNSA 2.0 algorithms.
Many of these topics involve novel security properties requiring further scrutiny. NSS
owners should consult NSA before using any cryptography that CNSA 1.0 or CNSA 2.0
and other published guidance do not specify. In particular, the following have no
generally approved solutions:
A: NSA has programs for certifying solutions built to protect classified information. This
certification process applies to developments intended specifically for government use
or control. NSA also manages efforts, such as NIAP and the CSfC program, that require
strict compliance with traditional cryptographic standards and designs.
NSA does not accept direct requests from commercial vendors to validate their products
or offer a general use vendor certification for novel cryptographic solutions. If an NSS
customer believes they have a mission need to use cryptography beyond what is
currently available, they should engage with NSA directly to discuss their unique
situation.
Q: Will NSA be adopting the standards from NIST’s Lightweight Cryptography
effort?
A: NSA does not intend to add the ciphers resulting from NIST’s Lightweight
Cryptography effort to CNSA. The Lightweight Cryptography effort resulted in the
selection of symmetric primitives based on the Ascon family. Their targeted security is
substantially less than AES-256, rendering them generally unsuitable for NSS use
cases. If CNSA 2.0 algorithms do not meet mission system performance requirements,
early consultation with NSA is required.
Hybrids
Q: What is a hybrid cryptographic solution?
A: A hybrid solution for a protocol is one using multiple algorithms to perform the same
function, such as key agreement or authentication. The solution uses algorithms in a
way that requires an attacker to break each one to compromise system security. Hybrid
solutions can consist of many traditional or QR algorithms. “Component algorithms” are
individual algorithms used in a hybrid solution.
A: NSA has confidence in CNSA 2.0 algorithms and will not require NSS developers to
use hybrid certified products for security purposes. However, product availability and
interoperability requirements may lead to adopting hybrid solutions.
NSA recognizes that some protocols may require using hybrid-like constructions to
accommodate the larger sizes of ML-KEM-1024 or ML-DSA-87 and will work with
industry and SDOs to identify the best options for implementation.
Rather than ease the transition to quantum resistance, hybrid deployments introduce
additional interoperability concerns because all the algorithms and the method of
hybridization must be features common to all parties to a communication. Similarly,
hybrid deployments add a second transition later as users eventually move away from
classical algorithms in the future entirely and use only quantum-resistant algorithms. At
the same time, hybrid solutions make the implementations more complex, so one must
balance the risk of flaws in an increasingly complex implementation with the risk of a
cryptanalytic breakthrough. Because more security products fail due to implementation
or configuration errors than failures in their underlying cryptographic algorithms,
In many scenarios, adding a hybrid option will require the standards community to
determine non-obvious choices, such as how to negotiate hybrid algorithms or how to
combine keys securely, which may slow down the process of standardization past
NSA’s deployment goals.
Where NSA recognizes a need to support a hybrid solution, extensive work will be
performed to ensure that it can be safely implemented, including engineering to a high
degree of robustness, and facilitation of a straightforward transition to QR-only
solutions.
Further information
Q: Where can I get more information?
A: For CSfC-specific questions, customers should contact the Commercial Solutions for
Classified Program Management Office at [email protected].
Other specific questions from NSS users may be addressed via e-mail to
[email protected] or through normal business channels.
Disclaimer of endorsement
The information and opinions contained in this document are provided "as is" and without any warranties or
guarantees. Reference herein to any specific commercial product, process, or service by trade name, trademark,
manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by the United
States Government, and this guidance shall not be used for advertising or product endorsement purposes.
Purpose
This document was developed in furtherance of NSA’s cybersecurity missions, including its responsibilities to identify
and disseminate threats to National Security Systems, Department of Defense, and Defense Industrial Base
information systems, and to develop and issue cybersecurity specifications and mitigations. This information may be
shared broadly to reach all appropriate stakeholders.
Contact
Cybersecurity Report Inquiries and Feedback: [email protected]
Defense Industrial Base Inquiries and Cybersecurity Services: [email protected]
Media Inquiries / Press Desk: 443-634-0721, [email protected]