Back to Guides
EnterprisePost-Quantum

NSA CNSA 2.0 & Certificate Management

Post-Quantum Cryptography Transition for National Security Systems. What PKI teams need to know about quantum-resistant algorithms and certificates.

20 min readJanuary 2026NSA Guidance
CNSA 2.0 Certificate Management - Post-Quantum Transition Guide

Quick Answer

This guide is for PKI architects, security teams, and compliance officers preparing for the post-quantum cryptography transition.

CNSA 2.0 (Commercial National Security Algorithm Suite 2.0) is the NSA's updated cryptographic algorithm suite designed to protect National Security Systems (NSS) against quantum computer threats. It mandates a transition from RSA and ECC to quantum-resistant algorithms like ML-DSA (for signatures) and ML-KEM (for key exchange).

Why this matters beyond government: Defense contractors, vendors to federal agencies, and organizations handling sensitive data will need to align with CNSA 2.0. The transition starts NOW for software signing and extends through 2033 for all systems.

💡 Key Takeaway: Unlike CNSA 1.0 (which strengthened classical algorithms), CNSA 2.0 introduces entirely new algorithm families. Your CLM platform, CA infrastructure, and certificate workflows will all need updates.

Start with our Post-Quantum Cryptography Guide for foundational concepts.

What is CNSA 2.0?

The Commercial National Security Algorithm Suite 2.0 is the NSA's cryptographic guidance for protecting classified and sensitive national security information against the threat of cryptographically relevant quantum computers (CRQCs).

Who Must Comply?

  • National Security Systems (NSS) operators
  • Defense Industrial Base (DIB) contractors
  • Federal agencies (via CISA/OMB guidance)
  • Vendors providing crypto products to government

Non-NSS organizations can treat CNSA 2.0 as a high-water mark for PQ readiness planning.

The Quantum Threat

Quantum computers running Shor's algorithm can break RSA, ECDSA, and ECDH—the cryptography protecting most certificates today. "Harvest Now, Decrypt Later" attacks make this an urgent concern even before quantum computers arrive.

CNSA 2.0 vs CNSA 1.0

AspectCNSA 1.0 (2016)CNSA 2.0 (2022+)
Key ExchangeECDH P-384, DH 3072-bitML-KEM-1024
Digital SignaturesECDSA P-384, RSA 3072-bitML-DSA-87, LMS, XMSS
Symmetric EncryptionAES-256AES-256 (unchanged)
Hash FunctionsSHA-384SHA-384, SHA-512
Quantum ResistanceNoYes

Critical: CNSA 1.0 algorithms (RSA, ECDSA, ECDH) are being phased out. Do not deploy new CNSA 1.0-only systems. All new systems should plan for CNSA 2.0 or hybrid approaches.

CNSA 2.0 Algorithm Suite

Approved Algorithms

AlgorithmPurposeStandardNotes
AES-256Symmetric EncryptionFIPS 197Block cipher for data protection
ML-DSA-87Digital SignaturesFIPS 204Formerly CRYSTALS-Dilithium
ML-KEM-1024Key EncapsulationFIPS 203Formerly CRYSTALS-Kyber
SHA-384Hash FunctionFIPS 180-4General-purpose hashing
SHA-512Hash FunctionFIPS 180-4Higher security margin
LMSStateful Hash-Based SignaturesSP 800-208For firmware/software signing
XMSSStateful Hash-Based SignaturesSP 800-208For firmware/software signing

Explicitly NOT Approved for CNSA 2.0

AlgorithmReason
SLH-DSA (SPHINCS+)Signature sizes too large for NSS use cases
HSSMulti-tree variant not included in CNSA 2.0 suite
XMSS^MTMulti-tree variant not included
SHA-3SHA-2 preferred; SHA-3 not required
RSAVulnerable to quantum attacks (Shor's algorithm)
ECDSA/ECDHVulnerable to quantum attacks

Note on SLH-DSA (SPHINCS+): While NIST standardized SLH-DSA in FIPS 205, the NSA did not include it in CNSA 2.0 due to large signature sizes. Organizations outside NSS scope may still consider it for specific use cases.

Transition Timeline by Category

The NSA has defined different transition timelines based on system category. Each category has a "prefer" date (when you should start using CNSA 2.0) and an "exclusive" date (when CNSA 1.0 is no longer acceptable).

Software/Firmware Signing

Code signing for software and firmware updates

Prefer
2024
Exclusive
2030

Web Browsers/Cloud/Servers

TLS for public websites, internal APIs, and cloud control planes

Prefer
2025
Exclusive
2033

Traditional Networking

VPNs, routers, switches, network equipment

Prefer
2026
Exclusive
2030

Operating Systems

OS-level PKI, kernel signing, secure boot

Prefer
2027
Exclusive
2033

Visual Timeline

20242026202820302033
Software/Firmware Signing
Web/Cloud
Networking
Operating Systems
← Prefer datesExclusive dates →

Certificate-Specific Requirements

CA Hierarchy Transitions

Root CA Considerations

  • New PQC Root CAs will need to be established
  • Cross-signing with classical roots during transition
  • HSMs must support ML-DSA key generation

Issuing CA Transitions

  • Hybrid certificates (dual signatures) for interoperability
  • Gradual rollout by certificate type/criticality
  • CRL/OCSP infrastructure updates required

X.509 Profile Changes

FieldCNSA 1.0CNSA 2.0
Signature Algorithmecdsa-with-SHA384id-ML-DSA-87
Subject Public KeyEC P-384ML-DSA-87 / ML-KEM-1024
Key Size Impact~96 bytes (EC pubkey)~2.5 KB (ML-DSA-87 pubkey)
Signature Size Impact~96 bytes~4.6 KB (ML-DSA-87)

Certificate Size Warning: PQC certificates are significantly larger than classical certificates. Test TLS handshake performance, especially for constrained devices and high-volume endpoints.

Certificate Validity Considerations

Given the transition timeline, carefully consider certificate validity periods. For long-lived and high-assurance use cases, prefer hybrid (classical+PQC) certificates during the transition to maintain backward compatibility while gaining quantum resistance.

  • Short-lived certs (90 days - 1 year): Easier to transition—will naturally age out
  • Long-lived certs (5+ years): Issue hybrid certs now or plan mid-life re-issuance
  • Code signing certs: Timestamp services must also transition to PQC

CNSA 2.0 → CLM Controls Mapping

Map CNSA 2.0 requirements to your Certificate Lifecycle Management controls and processes.

CNSA 2.0 RequirementCLM ImplementationResource
Algorithm inventoryDiscover all certs, flag non-PQC algorithmsCertificate Discovery Guide
Transition planningCertificate expiry aligned with transition datesCertificate Lifecycle Guide
HSM key protectionPQC-capable HSM procurement/upgradeHSM Guide
Code signing transitionDual-sign artifacts, update timestamp serviceCode Signing Guide
Crypto agilityCLM platform supports multiple algorithm typesCrypto Agility Guide
Vendor/CA assessmentEvaluate CA PQC roadmaps, multi-CA strategyCA Hierarchy Guide

Stateful Hash-Based Signatures (LMS/XMSS)

Critical Warning: LMS and XMSS are stateful signature schemes. Reusing a one-time signature key compromises the entire private key. This requires specialized key management infrastructure.

What Makes Them Stateful?

LMS and XMSS pre-generate a finite tree of one-time signature keys. Each signature "consumes" a leaf of the tree. The signer must track which leaves have been used and never reuse a leaf.

Appropriate Use Cases

  • Firmware/software signing (predictable, low-volume)
  • Root CA certificates (rare signing events)
  • Long-lived code signing with HSM state management

NOT Appropriate For

  • TLS server certificates (high-volume handshakes)
  • Client authentication (many signing operations)
  • Any use case without reliable state persistence

Key Management Requirements

  • Persistent state storage: State must survive reboots, failovers, and disasters
  • Atomic operations: State update and signature must be atomic to prevent reuse
  • HSM support: Use HSMs with native LMS/XMSS support for state management
  • No parallelism: Cannot safely sign in parallel without partitioning the key tree

Recommended Approach: Use ML-DSA-87 for most certificate signing needs. Reserve LMS/XMSS for specific use cases (firmware signing, Root CA) where you have proper state management infrastructure.

Implementation Checklist

1Assessment Phase (Now)

  • Complete cryptographic inventory (all certificates, keys, algorithms in use)
  • Identify systems processing NSS or sensitive data
  • Assess HSM fleet PQC readiness
  • Document certificate validity periods vs. transition dates
  • Evaluate CLM platform PQC support roadmap

2Planning Phase (2025)

  • Develop PQC transition roadmap with milestones
  • Budget for HSM upgrades/replacements
  • Engage CA vendors on PQC certificate availability
  • Plan hybrid certificate strategy for interoperability
  • Test PQC algorithms in lab environment

3Software Signing Priority (2025-2026)

  • Deploy LMS/XMSS signing infrastructure with state management
  • Update build pipelines for dual-signing
  • Transition timestamp services to PQC
  • Verify firmware update verification supports new algorithms

4Network & Systems (2026-2030)

  • Deploy PQC-capable network equipment
  • Transition VPN infrastructure to ML-KEM
  • Update TLS configurations for PQC cipher suites
  • Complete CA hierarchy transition to ML-DSA
  • Retire classical-only certificate infrastructure

Cross-References & Resources