Documentation

Everything you need to install, configure, and troubleshoot the Qudo Cryptographic Module.

Download & Install

Get the Qudo provider for your OS and configure OpenSSL.

Get Started →
🔧

Troubleshooting

Common issues, root causes, and step-by-step resolutions.

Browse Issues →

Algorithm Performance

Key sizes, signature sizes, and latency for all PQC algorithms.

View Performance →
🧠

Choose Your Algorithm

Decision guide: pick ML-DSA, ML-KEM, or SLH-DSA based on your actual constraints.

Open Guide →
📜

Compliance & Regulations

CNSA 2.0 timeline, NIST/ETSI/PCI algorithm mapping, and a quotable compliance statement for your documentation.

View Compliance →

Qudo Cryptographic Module

OpenSSL provider implementing NIST-standardized post-quantum algorithms. Targeting FIPS 140-3 validation.

Version1.0.0
OpenSSL3.6+
PlatformsmacOS (arm64, x86_64), Linux
FIPS StatusTargeting FIPS 140-3

Supported Algorithms

FIPS 203ML-KEM-512, 768, 1024
FIPS 204ML-DSA-44, 65, 87
FIPS 205SLH-DSA (all variants)
HybridX25519MLKEM768, X448MLKEM1024
CompositeP384+ML-DSA-65, RSA3072+ML-DSA-65

Contact & Support

Need help with migration planning or enterprise support?

Documentation Guide

Each reference implementation in the Migrate section includes its own migration reference with:

Getting Started

1

Discover

Use the Crypto Inventory to scan your endpoints and identify what needs to migrate.

2

Get Started

Download and install the Qudo Cryptographic Module on your platform.

3

Migrate

Read the Migration Reference tab for the services relevant to your use case. It shows exactly what changes in your service and what stays the same.

4

Validate

Use the Benchmark tool and test harness to verify PQC is working correctly.