← CRA Glossary
Product Security Engineering

Cryptographic Agility

Cryptographic agility is the design property of a system that allows its cryptographic algorithms to be updated or replaced without requiring complete redesign of the product. It is a CRA essential requirement that products support algorithm updates throughout their lifecycle, particularly as quantum computing advances threaten current cryptographic standards.

Cryptographic agility is the design property of a system that allows its cryptographic algorithms to be updated or replaced without requiring complete redesign of the product. It is a CRA essential requirement that products support algorithm updates throughout their lifecycle, particularly as quantum computing advances threaten current cryptographic standards.

Product Security Engineering

What Is Cryptographic Agility?

Cryptographic agility is a design property that enables a system to switch cryptographic algorithms — for encryption, signing, key exchange, or hashing — without requiring a full redesign of the product architecture. A cryptographically agile product negotiates or selects algorithms from a configurable set, rather than having algorithms hardcoded into the firmware or software. This is important because cryptographic algorithms have finite lifetimes: advances in computing power, mathematical techniques, and ultimately quantum computing make today's strong algorithms potentially weak in future decades. Products that hardcode a single algorithm (e.g., 3DES, SHA-1) cannot be updated when that algorithm is deprecated, forcing complete hardware replacement rather than a software update.

CRA reference:Annex I

Cryptographic Agility in CRA Context

The CRA's Annex I requires that products use state-of-the-art cryptography appropriate to the product's context and that security mechanisms can be updated. Cryptographic agility is the architectural property that makes compliance with this requirement maintainable over the product's support period. ENISA's guidance on cryptographic recommendations (published as the ENISA Algorithms, Key Sizes and Parameters Report) provides annual recommendations on acceptable algorithms and key sizes. A product designed in 2025 must be able to implement ENISA's 2030 or 2035 recommendations through a software update, not by being replaced entirely. This has practical implications for products with long support periods (5-10 years), such as industrial equipment, medical devices, and infrastructure components.

CRA reference:Annex I

Post-Quantum Cryptography and Agility

The most pressing driver for cryptographic agility today is the anticipated threat from quantum computers to current public-key cryptography (RSA, ECDSA, DH). NIST published its first post-quantum cryptography (PQC) standards in 2024 (ML-KEM, ML-DSA, SLH-DSA — formerly Kyber, Dilithium, and SPHINCS+). The EU's NIS2 Directive and ENISA guidance are progressively recommending PQC transition planning. For CRA-covered products with support periods extending beyond 2030, cryptographic agility is critical:

  • Products must be able to update their key exchange and signature algorithms to PQC variants through OTA updates.
  • Hardcoded RSA or ECDSA key sizes or algorithms will require firmware replacement rather than update.
  • Hybrid classical/PQC modes (running both current and PQC algorithms simultaneously during transition) require algorithm negotiation capability — the foundation of cryptographic agility.
CRA reference:Annex I

Implementing Cryptographic Agility

Practical cryptographic agility implementation involves:

  • Algorithm abstraction layers: Use cryptographic libraries (OpenSSL, mbedTLS, Bouncy Castle) that provide algorithm-agnostic APIs, so the calling code does not need to be rewritten when an algorithm changes.
  • Configurable cipher suites: For TLS-based communications, configure the product to support multiple cipher suites ranked by preference, enabling deprecation of weak suites by simply removing them from the configured list via an OTA update.
  • Negotiated algorithm selection: Where protocols allow, implement algorithm negotiation so the product and its counterpart can select the strongest mutually supported algorithm.
  • Avoid hardcoded algorithm constants: Never hardcode algorithm identifiers (e.g., AES-128, SHA-256) directly into protocol logic — reference them through a configurable constants file.
  • Key size configurability: Design key generation to accept key size parameters rather than hardcoding key sizes, enabling key size increases through configuration updates.

CVD Portal makes Cryptographic Agility compliance straightforward.

Public CVD submission portal, acknowledgment tracking, Article 14 deadline alerts, and CSAF advisory generation. Free forever for EU manufacturers.

Start your free portal

Frequently asked

Is post-quantum cryptography required for CRA compliance today?+

The CRA requires the use of state-of-the-art cryptography appropriate to the product's context. As of 2025-2026, ENISA recommends planning for PQC migration but does not yet mandate it for all products. However, products with long support periods (7-10 years or more) that cannot be updated to PQC algorithms may struggle to demonstrate ongoing compliance with the 'state-of-the-art' requirement as PQC standards mature. Products launched in 2025-2026 should be designed with cryptographic agility to enable PQC migration through software update when ENISA and harmonised standards guidance confirms the requirement.

Does cryptographic agility conflict with certification requirements?+

In some regulated industries (Common Criteria, FIPS, medical device software validation), changing cryptographic algorithms requires re-certification of the affected component. This can appear to conflict with cryptographic agility. The resolution is to design agility within the bounds of pre-certified algorithm sets — for example, configuring which of several pre-approved algorithms to use — rather than adding entirely new uncertified algorithms without review. When PQC migration requires adding new algorithms, re-certification of the cryptographic module will typically be required, but this is a product update process rather than a full product redesign.

How does cryptographic agility relate to the CRA's 'secure by default' requirement?+

Cryptographic agility and secure by default are complementary. Secure by default requires that the product ships with the strongest available security settings enabled. Cryptographic agility ensures that when 'strongest available' is redefined over time (e.g., TLS 1.3 replaces TLS 1.2; PQC replaces RSA), the product can be updated to reflect the new standard without redesign. Together, they ensure the product is secure at launch and remains secure throughout its supported lifetime.

Browse the full CRA Compliance Checklist

See how Cryptographic Agility fits into your complete CRA compliance programme.

View checklists →