CNSA 2.0 Deadline: January 2027

Pre-Silicon PQC Verification for Mission-Critical Systems

Find security vulnerabilities in post-quantum cryptographic hardware before tape-out. Formal verification that catches what testing misses.

17
Vulnerabilities found in
production PQC accelerators
0
False positives on
verified designs
1024x
Faster than naive
verification

NSA CNSA 2.0 Compliance Timeline

Defense contractors must verify PQC implementations meet security requirements before deployment to National Security Systems.

Jan 2027
All NEW NSS equipment must be CNSA 2.0 compliant
2030
All deployed firmware must use CNSA 2.0 signatures
2033
Final mandatory compliance deadline
2035
Pure post-quantum algorithms required

The Hidden Risk in PQC Hardware

Masked implementations can leak MORE information than unmasked designs if implemented incorrectly.

Carry Bit Leakage

Each carry observation reveals ~0.81 bits about the secret key. Modular arithmetic without proper masking exposes your cryptographic secrets through power analysis.

🔓

Unmasked Intermediates

Shares combined before modular reduction expose the full secret. A single unmasked intermediate defeats the entire masking countermeasure.

💥

Glitch Attacks

DOM (Domain-Oriented Masking) without proper pipelining is vulnerable to transient glitches. Combinational logic can leak before registers capture clean values.

⏱️

Timing Side-Channels

Non-constant-time NTT operations leak secret polynomial coefficients. Variable-time execution enables timing attacks even on masked implementations.

🎯

Harvest Now, Decrypt Later

Adversaries capture encrypted traffic today, waiting for quantum computers to decrypt. Flawed PQC implementations offer false protection.

💰

Post-Tapeout Discovery = $Millions

Finding security flaws after silicon fabrication means respins, delays, and potential compromise. Shift-left verification saves millions.

QANARY: Formal Verification for PQC Hardware

The only pre-silicon verification framework that combines formal methods with side-channel analysis to prove your PQC implementations are secure.

  • Formal Glitch Verification - SMT-based proofs that masking holds even under glitch attacks (RbR + PINI security)
  • Carry Leakage Detection - Automatically identifies modular arithmetic operations that leak through carries
  • NTT Butterfly Verification - Symbolically proves ML-DSA/ML-KEM Number Theoretic Transform correctness
  • Timing Analysis - Cycle-exact FSM extraction proves constant-time execution
  • FIPS 203/204/205 Compliance - Validates against NIST test vectors for ML-KEM, ML-DSA, and SLH-DSA
# QANARY Analysis Output Target: pqc_ml_dsa_accelerator_v2 Status: VULNERABILITIES FOUND ## High Severity Location: ntt_masked_BFU_mult.v Type: Unmasked Intermediate Impact: Full secret exposure Fix: Add pipeline register before modular reduction ## Medium Severity Type: Carry Leakage Modules: 6 affected Leakage: ~0.81 bits per observation ## Timing Analysis Status: PASS - Constant time verified Cycles: 2,048 (deterministic)

Validated on Production Hardware

Real vulnerabilities found in PQC accelerators. Zero false positives on known-secure designs.

Fortune 100 Silicon Root of Trust Under Disclosure

ML-DSA accelerator for hardware security module

  • Unmasked intermediatesHIGH
  • Carry leakage (multiple)MEDIUM
  • DOM pipeline issuesMEDIUM
  • Timing analysisPASS
  • Embargo ends Q1 2026PENDING

Methodology Validation Zero False Positives

OpenTitan AES S-Box (LowRISC) - known-secure reference design

  • Glitch security (RbR)PASS
  • Glitch security (PINI)PASS
  • Information flowPASS
  • False positives0
  • Why this mattersWe don't cry wolf

Zero false positives on verified designs proves methodology soundness.

Responsible Disclosure: Our findings follow coordinated disclosure practices. Detailed vulnerability information is shared with vendors under embargo before public release. Full case studies available to qualified defense contractors under NDA.

Enterprise Licensing

Flexible licensing models for defense contractors and hardware teams.

Security Assessment

$25K/design

One-time analysis of your PQC hardware implementation with detailed report.

  • Full QANARY analysis
  • Detailed vulnerability report
  • Remediation guidance
  • NIST compliance verification
  • 30-day support window
Request Quote

Strategic Partnership

Custom

Deep integration for defense primes and government programs.

  • Everything in Site License
  • Dedicated engineering support
  • Custom tool development
  • Joint IP development
  • Embedded team option
  • ITAR/classified environments
Contact Us

Request a Technical Briefing

Learn how QANARY can help your team meet CNSA 2.0 requirements and verify PQC hardware security before tape-out.

Protected Contact

Our contact details are protected to prevent spam.

PGP Public Key

Complete verification to access PGP key

We practice what we preach. All sensitive communications are encrypted end-to-end.