Documentation
/
Core Concepts
/
Cryptographic Agility

Cryptographic Agility

Why identity systems need the ability to evolve cryptographic methods

SHA-1 was considered secure. Then it wasn't. MD5 was considered secure. Then it wasn't. RSA-1024 was considered secure. Then it wasn't. Every cryptographic algorithm has a shelf life, and when that life ends, systems that hardcoded a single algorithm face a painful choice: force every user to re-enroll, or keep running on compromised crypto.

Hawcx is built so you never face that choice.

Why this matters

For developers: You never pick a hashing algorithm, key length, or cipher suite. Hawcx handles cryptographic decisions and can upgrade them transparently. No migration scripts, no "please reset your password" emails, no downtime.

For security teams: When NIST deprecates an algorithm or a quantum breakthrough makes current crypto vulnerable, Hawcx can rotate to post-quantum algorithms without touching a single user credential. Your compliance posture stays current automatically.

How it works

Traditional auth systems bake cryptographic choices into stored credentials:

  • "We use bcrypt with cost factor 12" → changing means rehashing every password
  • "We use ECDSA P-256 for passkeys" → changing means re-enrolling every user

Hawcx's device-bound proofs are ephemeral, generated fresh each session. There are no long-lived credentials tied to a specific algorithm. This means:

  • Algorithm upgrades happen at the protocol level, not the data level
  • Key material is regenerated each session with the current best algorithm
  • No migration because users don't re-enroll, reset, or even notice
  • Post-quantum readiness since when PQC algorithms are standardized, Hawcx adopts them without user impact

The cost of not having this

Organizations without cryptographic agility face:

ScenarioWithout agilityWith Hawcx
Algorithm deprecated by NISTForce password reset for all usersTransparent upgrade, zero user impact
Quantum computing breakthroughRe-enroll every passkey userProtocol-level switch, no re-enrollment
Compliance audit requires stronger cryptoMulti-month migration projectConfiguration change
Vulnerability found in current cipherEmergency maintenance windowRolling upgrade, no downtime

Cryptographic agility isn't a feature; it's insurance against every future algorithm vulnerability. And with Hawcx, it's built in from day one.