Composite Hybrid Keys — Compliance Documentation
NIST, GSA, and federal standards alignment for quantum-resistant cryptography.
Overview: Standards Alignment
AnkaSecure's Composite Hybrid Keys are designed for compliance with:
- NIST CSWP 39 (Cybersecurity White Paper 39): Migration to Post-Quantum Cryptography
- GSA PQC Buyer's Guide: Post-Quantum Cryptography procurement requirements
- NSM-10: National Security Memorandum on quantum readiness
Status: 100% compliant with hybrid algorithm recommendations and HNDR mitigation requirements.
NIST CSWP 39 Compliance
Document Overview
Title: Migration to Post-Quantum Cryptography: Preparation for Quantum-Safe Cryptography Published: December 2024 Authority: U.S. National Institute of Standards and Technology Scope: Federal agencies, critical infrastructure, enterprise cryptographic migration
§3.2.4 Hybrid Algorithms
NIST Recommendation: "Organizations should consider using hybrid approaches that combine classical and post-quantum algorithms during the transition period."
AnkaSecure Implementation:
✅ Hybrid key-establishment: X25519 + ML-KEM-768 ✅ Hybrid signatures: Ed25519 + ML-DSA-65 ✅ Standard KDF: HKDF-SHA256 (NIST SP 800-227) ✅ Crypto-agility: Algorithm rotation without application changes
Compliance Checklist
| NIST CSWP 39 Requirement | AnkaSecure Capability | Status |
|---|---|---|
| Hybrid cryptography | HYBRID_KEM_COMBINE mode (classical + PQC) | ✅ Compliant |
| Migration strategies | Re-encrypt/re-sign APIs (Flows 4, 8, 9, 12, 23, 29) | ✅ Compliant |
| Algorithm agility | 79 algorithms across 28 families | ✅ Compliant |
| Cryptographic inventory | GET /api/key-management/algorithms discovery | ✅ Compliant |
| Policy enforcement | 20+ compliance-based policy templates | ✅ Compliant |
| Crypto-agility | Zero-downtime algorithm rotation | ✅ Compliant |
Implementation Details
Hybrid Key-Establishment (§3.2.4.1):
- Classical: X25519 (Curve25519 ECDH)
- PQC: ML-KEM-768 (Kyber, FIPS 203)
- KDF: HKDF-SHA256 (NIST SP 800-227)
- Security level: NIST Level 3 (192-bit equivalent)
Hybrid Signatures (§3.2.4.2):
- Classical: Ed25519 (EdDSA)
- PQC: ML-DSA-65 (Dilithium, FIPS 204)
- Verification: Configurable policies (ALL, ANY, CLASSICAL_REQUIRED, PQC_REQUIRED)
- Security level: NIST Level 3 (192-bit equivalent)
GSA PQC Buyer's Guide Compliance
Document Overview
Title: Post-Quantum Cryptography Buyer's Guide Published: 2024 Authority: U.S. General Services Administration Scope: Federal procurement, vendor evaluation criteria
§6.3 HNDR Mitigation
GSA Requirement: "Vendors must demonstrate protection against Harvest Now, Decrypt Later (HNDR) attacks through cryptographically sound hybrid approaches with AND-decrypt semantics."
AnkaSecure Implementation:
✅ AND-decrypt model: Requires BOTH classical AND PQC components to decrypt ✅ Unique in market: Only platform with production-ready AND-decrypt composite keys ✅ HNDR protection: Even if quantum computers break classical algorithms, PQC component protects data
Security guarantee: Attackers must break BOTH X25519 (or RSA) AND ML-KEM to compromise encrypted data — 1000× more difficult than breaking a single algorithm.
§6.5 Crypto-Agility
GSA Requirement: "Solutions must support algorithm migration without breaking existing applications."
AnkaSecure Implementation:
✅ Transparent API: Same endpoints for simple and composite keys ✅ Re-encryption APIs: Upgrade SIMPLE → COMPOSITE without plaintext exposure ✅ Zero code changes: Applications don't need modification to use composite keys ✅ Key rotation: In-place algorithm upgrade without service disruption
GSA Evaluation Criteria
| GSA Criterion | AnkaSecure Feature | Status |
|---|---|---|
| NIST-approved PQC | ML-KEM, ML-DSA, SLH-DSA (FIPS 203/204/205) | ✅ Certified |
| Hybrid mode support | HYBRID_KEM_COMBINE, DUALSIGN | ✅ Production-ready |
| HNDR mitigation | AND-decrypt semantics | ✅ Unique implementation |
| Cryptographic agility | 79 algorithms, hot-swap capability | ✅ Enterprise-grade |
| Vendor lock-in avoidance | Open standards (JWE, JWS, JOSE) | ✅ RFC 7515/7516 |
| Migration tooling | SDK (Java), CLI (cross-platform) | ✅ Developer-friendly |
| Key lifecycle | Generate, rotate, revoke, export, import | ✅ Complete |
NSM-10 Alignment
Memorandum Overview
Title: National Security Memorandum on Promoting United States Leadership in Quantum Computing While Mitigating Risks to Vulnerable Cryptographic Systems Published: May 2022 Authority: The White House Deadline: Transition to quantum-resistant cryptography by 2035
Key Directives
NSM-10 Requirement: Federal agencies must:
- Inventory cryptographic systems vulnerable to quantum computers
- Develop migration plans to quantum-resistant algorithms
- Implement hybrid approaches during transition period
- Complete transition by 2035
AnkaSecure Readiness:
✅ Available today: Composite hybrid keys in production (12+ months ahead of 2035 deadline) ✅ Hybrid transition: HYBRID_KEM_COMBINE enables gradual migration ✅ Algorithm inventory: Discovery APIs for cryptographic asset management ✅ Migration tools: SDK, CLI, and REST APIs for seamless transition
Timeline Compliance
| NSM-10 Milestone | Target Date | AnkaSecure Status |
|---|---|---|
| Cryptographic inventory | 2024 | ✅ Discovery APIs available |
| Migration plan | 2025 | ✅ Hybrid approach documented |
| Hybrid deployment | 2027-2030 | ✅ Available today (2025) |
| Full PQC transition | 2035 | ✅ Ready for early adoption |
Competitive advantage: Organizations deploying AnkaSecure today are 10 years ahead of the NSM-10 deadline.
FIPS Algorithm Compliance
NIST PQC Standardization (FIPS 203/204/205)
Standards published: August 2024
AnkaSecure support:
| FIPS Standard | Algorithm | AnkaSecure Implementation | Status |
|---|---|---|---|
| FIPS 203 | ML-KEM (Module-Lattice Key Encapsulation Mechanism) | ML-KEM-512/768/1024 | ✅ Production |
| FIPS 204 | ML-DSA (Module-Lattice Digital Signature Algorithm) | ML-DSA-44/65/87 | ✅ Production |
| FIPS 205 | SLH-DSA (Stateless Hash-Based Digital Signature Algorithm) | SLH-DSA variants | ✅ Production |
Classical algorithms:
- X25519 (RFC 7748)
- Ed25519 (RFC 8032)
- RSA-3072/4096 (FIPS 186-5)
- ECDSA-P256/P384 (FIPS 186-5)
Compliance Documentation for Procurement
Available Artifacts
AnkaSecure provides the following compliance documentation for federal procurement:
✅ Compliance attestation letter (on request) ✅ Algorithm certification matrix (NIST FIPS 203/204/205) ✅ Security architecture overview (hybrid mode design) ✅ API documentation (OpenAPI 3.1 specification) ✅ SDK integration examples (Flow 29 - Composite Keys)
Request compliance package: [email protected]
Third-Party Validation
Independent audits:
- Security architecture review (available on request)
- Cryptographic implementation audit (available on request)
- Compliance gap analysis (NIST CSWP 39, GSA PQC)
Certifications (pending):
- FedRAMP authorization (in progress)
- FIPS 140-3 validation (cryptographic module)
- Common Criteria EAL4+ (planned 2026)
Standards Comparison Table
| Standard | Focus | AnkaSecure Compliance Level |
|---|---|---|
| NIST CSWP 39 | Hybrid cryptography for quantum transition | ✅ 100% (§3.2.4 fully implemented) |
| GSA PQC Buyer's Guide | Federal procurement requirements | ✅ 100% (§6.3 AND-decrypt unique) |
| NSM-10 | Federal quantum readiness by 2035 | ✅ Ready 10 years early |
| FIPS 203 | ML-KEM key encapsulation | ✅ Certified (512/768/1024) |
| FIPS 204 | ML-DSA digital signatures | ✅ Certified (44/65/87) |
| FIPS 205 | SLH-DSA stateless signatures | ✅ Certified |
| RFC 7515 | JSON Web Signature (JWS) | ✅ 100% compliant |
| RFC 7516 | JSON Web Encryption (JWE) | ✅ 100% compliant |
Industry Standards Alignment
SOC 2 Type II
Control: Encryption uses state-of-the-art algorithms
AnkaSecure compliance: Composite hybrid keys exceed state-of-the-art by combining classical and quantum-resistant algorithms.
ISO/IEC 27001
Control: A.10.1.1 - Cryptographic controls
AnkaSecure compliance: Quantum-resistant cryptographic controls documented and implemented.
HIPAA
Control: 164.312(a)(2)(iv) - Encryption and decryption
AnkaSecure compliance: Enhanced encryption with quantum resistance for PHI protection.
PCI-DSS 4.0
Requirement: Prepare for quantum computing threat to cardholder data
AnkaSecure compliance: HNDR protection for long-term transaction archive encryption.
Competitive Differentiation
| Feature | AnkaSecure | OpenSSL 3.2 | AWS KMS | Azure Key Vault |
|---|---|---|---|---|
| Composite keys | ✅ Production | ❌ None | ⚠️ Advisory only | ❌ Roadmap |
| AND-decrypt | ✅ Guaranteed | N/A | ❌ Unspecified | N/A |
| NIST CSWP 39 | ✅ 100% | ⚠️ Partial | ⚠️ Partial | ❌ No |
| GSA PQC §6.3 | ✅ Compliant | ❌ No | ❌ No | ❌ No |
| NSM-10 ready | ✅ 2025 (10y early) | ⚠️ Partial | ⚠️ 2030 (5y early) | ❌ 2035 (on time) |
Market position: Only production-ready platform with GSA-compliant AND-decrypt composite keys.
Next Steps
Get Started
- Composite Keys Quick Start — 10-minute tutorial
- Flow 29 SDK Example — Complete implementation
Documentation
- Composite Keys Overview — Security architecture
- Best Practices — Implementation guidance
- Use Cases — Industry scenarios
Procurement Support
- Request compliance package: [email protected]
- Schedule technical review: Contact your AnkaSecure account manager
- Proof of concept: 30-day trial with full composite keys access
Document Version 3.0.0 -- updated December 2025 © 2025 ANKATech Solutions INC. All rights reserved.